CN107425973B - Public key modification method and device - Google Patents

Public key modification method and device Download PDF

Info

Publication number
CN107425973B
CN107425973B CN201710313053.2A CN201710313053A CN107425973B CN 107425973 B CN107425973 B CN 107425973B CN 201710313053 A CN201710313053 A CN 201710313053A CN 107425973 B CN107425973 B CN 107425973B
Authority
CN
China
Prior art keywords
public key
user terminal
user
updated
timestamp
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710313053.2A
Other languages
Chinese (zh)
Other versions
CN107425973A (en
Inventor
田新雪
马书惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201710313053.2A priority Critical patent/CN107425973B/en
Publication of CN107425973A publication Critical patent/CN107425973A/en
Application granted granted Critical
Publication of CN107425973B publication Critical patent/CN107425973B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the invention provides a public key modification method and a public key modification device. The method comprises the following steps: a node in a peer-to-peer network receives application information sent by a user terminal; verifying at least one signature information; and if the verification is passed, the node records the user name of the user terminal, the updated public key and the timestamp of the updated public key. The embodiment of the invention receives the application information sent by the user terminal through the node, the application information comprises a user name of the user terminal, an updated public key, a timestamp of the updated public key and at least one piece of signature information, the signature information is obtained by signing the user name of the user terminal, the updated public key and the timestamp of the updated public key by other user terminals which have a relationship with the user terminal, when a hacker or an attacker modifies the public key on the behalf of the user terminal, the public key of the user terminal cannot be modified because the signature information of other user terminals which are associated with the user terminal cannot be obtained, thereby improving the safety of modifying the public key.

Description

Public key modification method and device
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a public key modification method and device.
Background
Public key encryption, also called asymmetric key encryption (public key encryption), belongs to the second-level discipline of network security in communication technology, and refers to an encryption method composed of a corresponding pair of unique keys (i.e., a public key and a private key). The key issuing and managing method solves the problems of key issuing and management, and is the core of the current commercial passwords. In the public key cryptosystem, a private key is not disclosed, and a public key is disclosed.
The Public Key and the Private Key are a Key pair (i.e., a Public Key and a Private Key) obtained by an algorithm, the Public Key is a Public part of the Key pair, and the Private Key is an unpublished part. The public key is typically used to encrypt session keys, verify digital signatures, or encrypt data that can be decrypted with a corresponding private key. The key pair derived by such an algorithm can be guaranteed to be unique worldwide. When using this key pair, if one of the keys is used to encrypt a piece of data, the other key must be used to decrypt the piece of data. For example, encrypting data with a public key necessitates decryption with the private key, and if encrypting with the private key, also must decrypt with the public key, otherwise decryption will not succeed.
The public key is generally recorded in a distributed account book, and is recorded by a user with the accounting right and broadcasted to other users. The private key is stored by the user, the user may be stored in a mobile medium or a personal computer, and if the mobile medium is lost, the networked computer may be hacked, so if the private key of a certain user is revealed for some reason, it is a very serious security accident, and therefore the public key of the user needs to be modified, but the security of the public key modification method provided in the prior art is low.
Disclosure of Invention
The embodiment of the invention provides a public key modification method and a public key modification device, which are used for improving the safety of modifying a public key.
One aspect of the embodiments of the present invention is to provide a public key modification method, including:
a node in a peer-to-peer network receives application information sent by a user terminal, wherein the application information comprises a user name of the user terminal, an updated public key, a timestamp of the updated public key and at least one piece of signature information, and the at least one piece of signature information is obtained by signing the user name of the user terminal, the updated public key and the timestamp of the updated public key by other user terminals which have a relationship with the user terminal;
the node verifying the at least one signature information;
and if the verification is passed, the node records the user name of the user terminal, the updated public key and the timestamp of the updated public key.
Another aspect of the embodiments of the present invention is to provide a public key modification apparatus, including:
the system comprises a receiving module, a sending module and a sending module, wherein the receiving module is used for receiving application information sent by a user terminal, the application information comprises a user name of the user terminal, an updated public key, a timestamp of the updated public key and at least one piece of signature information, and the at least one piece of signature information is obtained by signing the user name of the user terminal, the updated public key and the timestamp of the updated public key by other user terminals which have a relationship with the user terminal;
the verification module is used for verifying the at least one signature message;
and the recording module is used for recording the user name of the user terminal, the updated public key and the timestamp of the updated public key when the verification is passed.
The public key modification method and device provided by the embodiment of the invention receive the application information sent by the user terminal through the node, the application information comprises the user name of the user terminal, the updated public key, the timestamp of the updated public key and at least one piece of signature information, the signature information is the information obtained by signing the user name of the user terminal, the updated public key and the timestamp of the updated public key by other user terminals which have a relationship with the user terminal, the node may verify the application information based on the at least one signature information, and when a hacker or attacker modifies the public key on behalf of the user terminal, because the signature information of other user terminals associated with the user terminal cannot be obtained, the nodes in the peer-to-peer network cannot verify the application information sent by the hacker or attacker, i.e. a hacker or attacker cannot modify the public key of the user terminal, thereby improving the security of modifying the public key.
Drawings
Fig. 1 is a flowchart of a public key modification method according to an embodiment of the present invention;
fig. 2 is a structural diagram of a public key modification apparatus according to an embodiment of the present invention;
fig. 3 is a block diagram of a public key modification apparatus according to another embodiment of the present invention.
Detailed Description
Fig. 1 is a flowchart of a public key modification method according to an embodiment of the present invention. The embodiment of the invention provides a public key modification method, which comprises the following steps:
step S101, a node in the peer-to-peer network receives registration information sent by the user terminal, wherein the registration information comprises a user name of the user terminal, an original public key, a timestamp of the original public key and user names of other user terminals.
When a user terminal a joins a Peer-to-Peer network (Peer-to-Peer, P2P) for the first time, a pair of its own private Key-a11 and public Key-a1 is generated, where the public Key-a1 may be used as the original public Key of the user terminal a, and a subsequent user terminal a may modify its own public Key. The user terminal a sends registration information to a node in the peer-to-peer network, where the registration information includes the user name of the user terminal a, such as a, the original public Key, such as Key-a1, the timestamp of the original public Key, such as 2016-03-1313: 22:24, and the user names of other user terminals associated with the user terminal a, such as user terminal B and user terminal C, such as B and C, which is only an illustrative example, and the present embodiment does not limit the number of other user terminals associated with the user terminal a and the specific user terminal. The specific format of the registration information is shown in table 1:
TABLE 1
User name Public key Time stamp Other users
A Key-A1 2016-03-13 13:22:24 B,C
Step S102, the node receives application information sent by a user terminal, wherein the application information comprises a user name of the user terminal, an updated public key, a timestamp of the updated public key and at least one piece of signature information, and the at least one piece of signature information is obtained after other user terminals which have a relationship with the user terminal sign the user name of the user terminal, the updated public key and the timestamp of the updated public key.
If the medium of the private key stored by the user a is lost or the user a considers that the computer of the user a is invaded, the private key of the user a may be acquired by a hacker, the user a may initiate an application for modifying the public key a of the user a to the P2P network through the user terminal a, specifically, the user a sends application information to a node in the P2P network through the user terminal a, and the specific format of the application information is shown in table 2:
TABLE 2
User name Public key Time stamp Signature of user B Signature of user C
A Key-A2 2017-02-23 13:22:24 Signature information-B Signature information-C
As shown in table 2, the user a modifies the public Key of the user a from Key-a1 to Key-a2 through the user terminal a, and the application information includes the user name a of the user terminal a, the updated public Key-a2, the timestamp 2017-02-2313:22:24 of the updated public Key, the signature of the user B, i.e., signature information-B, and the signature of the user C, i.e., signature information-C, wherein the generation process of the signature information-B is as follows: the user terminal A sends the user name A, the updated public Key Key-A2 and the timestamp 2017-02-2313:22:24 of the updated public Key of the user terminal A to the user terminal B, the user terminal B encrypts the user name A, the updated public Key Key-A2 and the timestamp 2017-02-2313:22:24 of the user terminal A by using a private Key of the user terminal B to obtain signature information-B integrally, the user terminal B sends the signature information-B to the user terminal A, and the user terminal A puts the signature information-B into application information shown in the table 2 and issues the application information to a peer-to-peer network; similarly, the generation process of the signature information-C and the signature information-B is consistent in principle, and is not described herein again.
Step S103, the node verifies the at least one signature message.
And the node determines the user names of other user terminals which have the association relation with the user terminal. And the node acquires the public keys of the other user terminals according to the user names of the other user terminals.
After the node in the peer-to-peer network receives the application information shown in table 2, according to the registration information sent by the user terminal a in step S101 shown in table 1, it determines that the user names of other user terminals having a relationship with the user terminal a are B and C, the node obtains the public Key of the user terminal B, e.g., Key-B, and the public Key of the user terminal C, e.g., Key-C, based on the user name B of the user terminal B and the user name C of the user terminal C, wherein, when the user terminal B and the user terminal C join the peer-to-peer network for the first time, a pair of own private key and public key is generated, and publishes its own username and public key to the peer-to-peer network in the format shown in table 1, and, therefore, the nodes in the peer-to-peer network can respectively obtain the public Key of the user terminal B, such as Key-B, and the public Key of the user terminal C, such as Key-C, according to the registration information historically published by the user terminal B and the user terminal C.
And the node decrypts the at least one signature message by adopting the public key of the other user terminal to obtain the decrypted message. Since the signature information-B is obtained by the user terminal B by encrypting the user name A, the updated public Key Key-A2 and the timestamp 2017-02-2313:22:24 of the updated public Key of the user terminal A by using the private Key of the user terminal B, the nodes in the peer-to-peer network can decrypt the signature information-B by using the public Key of the user terminal B, such as Key-B, to obtain decrypted information.
And step S104, if the verification is passed, the node records the user name of the user terminal, the updated public key and the timestamp of the updated public key.
And the decrypted information is consistent with the user name of the user terminal, the updated public key and the timestamp of the updated public key. If the node decrypts the signature information-B by using the public Key of the user terminal B, such as Key-B, to obtain the decrypted information which is consistent with the user name A, the updated public Key Key-A2 and the timestamp 2017-02-2313:22:24 of the user terminal A, which are published by the user terminal A and shown in the table 2, the node indicates that the user terminal B has confirmed the application information of the user terminal A; similarly, if the node decrypts the signature information-C by using the public Key of the user terminal C, for example, Key-C, and then obtains the decrypted information, which is consistent with the user name a of the user terminal a, the updated public Key-a2, and the timestamp 2017-02-2313:22:24 of the updated public Key, which are published by the user terminal a and shown in table 2, it indicates that the user terminal C has confirmed the application information of the user terminal a.
When the node decrypts the signature information-B by using the public Key of the user terminal B, such as Key-B, to obtain the decrypted information which is consistent with the user name A, the updated public Key Key-A2 and the timestamp 2017-02-2313:22:24 of the user terminal A as shown in the table 2 and published by the user terminal A, and decrypts the signature information-C by using the public Key of the user terminal C, such as Key-C, to obtain the decrypted information which is consistent with the user name A, the updated public Key Key-A2 and the timestamp 2017-02-2313:22:24 of the user terminal A as shown in the table 2 and published by the user terminal A, the node determines that the application information of the user terminal A is verified, records the user name A, the updated public Key Key-A2 and the timestamp 2017-02-2313:22:24 of the updated public Key, at the same time, the original public Key, e.g., Key-A1, is replaced with the updated public Key, Key-A2, and the timestamp of the original public Key, e.g., 2016-03-1313: 22:24, is replaced with the timestamp of the updated public Key, 2017-02-2313:22: 24. In addition, the node can also broadcast the user name A of the user terminal A, the updated public Key Key-A2 and the timestamp 2017-02-2313:22:24 of the updated public Key to other nodes in the peer-to-peer network, so that other nodes also replace the original public Key, such as Key-A1, with the updated public Key Key-A2 and replace the timestamp, such as 2016-03-1313: 22:24, of the original public Key with the timestamp 2017-02-2313:22:24 of the updated public Key, thereby realizing the mechanism of modifying the own public Key by the user terminal.
In addition, if the node decrypts the signature information-B by using the public Key of the user terminal B, for example, Key-B, to obtain the decrypted information inconsistent with the user name a of the user terminal a, the updated public Key-a2, and the timestamp 2017-02-2313:22:24 of the updated public Key, which are published by the user terminal a and shown in table 2, or the node decrypts the signature information-C by using the public Key of the user terminal C, for example, Key-C, to obtain the decrypted information inconsistent with the user name a of the user terminal a, the updated public Key-a2, and the timestamp 2017-02-2313:22:24 of the updated public Key, which are published by the user terminal a and shown in table 2, which are published by the user terminal a, the node verifies and identifies the application information published by the user terminal a and discards the application information shown in table 2.
The embodiment of the invention receives the application information sent by the user terminal through the node, the application information comprises the user name of the user terminal, the updated public key, the timestamp of the updated public key and at least one piece of signature information, the signature information is obtained by signing the user name of the user terminal, the updated public key and the timestamp of the updated public key by other user terminals which have a relationship with the user terminal, the node may verify the application information based on the at least one signature information, and when a hacker or attacker modifies the public key on behalf of the user terminal, because the signature information of other user terminals associated with the user terminal cannot be obtained, the nodes in the peer-to-peer network cannot verify the application information sent by the hacker or attacker, i.e. a hacker or attacker cannot modify the public key of the user terminal, thereby improving the security of modifying the public key.
Fig. 2 is a structural diagram of a public key modification apparatus according to an embodiment of the present invention. The public key modification apparatus provided in the embodiment of the present invention may execute the processing procedure provided in the embodiment of the public key modification method, as shown in fig. 2, where 20 includes: the system comprises a receiving module 21, a verifying module 22 and a recording module 23, wherein the receiving module 21 is configured to receive application information sent by a user terminal, the application information includes a user name of the user terminal, an updated public key, a timestamp of the updated public key, and at least one piece of signature information, and the at least one piece of signature information is information obtained by signing, by other user terminals related to the user terminal, the user name of the user terminal, the updated public key, and the timestamp of the updated public key; the verification module 22 is used for verifying the at least one signature message; the recording module 23 is configured to record the user name of the user terminal, the updated public key, and the timestamp of the updated public key when the verification passes.
The embodiment of the invention receives the application information sent by the user terminal through the node, the application information comprises the user name of the user terminal, the updated public key, the timestamp of the updated public key and at least one piece of signature information, the signature information is obtained by signing the user name of the user terminal, the updated public key and the timestamp of the updated public key by other user terminals which have a relationship with the user terminal, the node may verify the application information based on the at least one signature information, and when a hacker or attacker modifies the public key on behalf of the user terminal, because the signature information of other user terminals associated with the user terminal cannot be obtained, the nodes in the peer-to-peer network cannot verify the application information sent by the hacker or attacker, i.e. a hacker or attacker cannot modify the public key of the user terminal, thereby improving the security of modifying the public key.
Fig. 3 is a block diagram of a public key modification apparatus according to another embodiment of the present invention. On the basis of the foregoing embodiment, the receiving module 21 is further configured to receive registration information sent by the user terminal, where the registration information includes a user name of the user terminal, an original public key, a timestamp of the original public key, and user names of the other user terminals.
The verification module 22 is specifically configured to decrypt the at least one signature information by using the public key of the other user terminal, so as to obtain decrypted information. The verification pass comprises: and the decrypted information is consistent with the user name of the user terminal, the updated public key and the timestamp of the updated public key.
In addition, the public key modification apparatus 20 further includes: a determining module 24 and an obtaining module 25, wherein the determining module 24 is configured to determine user names of other user terminals having an association with the user terminal; the obtaining module 25 is configured to obtain the public key of the other user terminal according to the user name of the other user terminal.
The public key modification apparatus provided in the embodiment of the present invention may be specifically configured to execute the method embodiment provided in fig. 1, and specific functions are not described herein again.
The embodiment of the invention receives the application information sent by the user terminal through the node, the application information comprises the user name of the user terminal, the updated public key, the timestamp of the updated public key and at least one piece of signature information, the signature information is obtained by signing the user name of the user terminal, the updated public key and the timestamp of the updated public key by other user terminals which have a relationship with the user terminal, the node may verify the application information based on the at least one signature information, and when a hacker or attacker modifies the public key on behalf of the user terminal, because the signature information of other user terminals associated with the user terminal cannot be obtained, the nodes in the peer-to-peer network cannot verify the application information sent by the hacker or attacker, i.e. a hacker or attacker cannot modify the public key of the user terminal, thereby improving the security of modifying the public key.
In summary, the embodiment of the present invention receives, by a node, application information sent by a user terminal, where the application information includes a user name of the user terminal, an updated public key, a timestamp of the updated public key, and at least one piece of signature information, and the signature information is obtained by signing, by another user terminal having a relationship with the user terminal, the user name of the user terminal, the updated public key, and the timestamp of the updated public key, the node may verify the application information based on the at least one signature information, and when a hacker or attacker modifies the public key on behalf of the user terminal, because the signature information of other user terminals associated with the user terminal cannot be obtained, the nodes in the peer-to-peer network cannot verify the application information sent by the hacker or attacker, i.e. a hacker or attacker cannot modify the public key of the user terminal, thereby improving the security of modifying the public key.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the device described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (6)

1. A public key modification method, comprising:
a node in a peer-to-peer network receives application information sent by a user terminal, wherein the application information comprises a user name of the user terminal, an updated public key, a timestamp of the updated public key and at least one piece of signature information, and the at least one piece of signature information is obtained by signing the user name of the user terminal, the updated public key and the timestamp of the updated public key by other user terminals which have a relationship with the user terminal;
the node verifying the at least one signature information;
if the verification is passed, the node records the user name of the user terminal, the updated public key and the timestamp of the updated public key;
the node verifying the at least one signature message, comprising:
the node decrypts the at least one signature information by adopting the public key of the other user terminal to obtain decrypted information;
the verification pass comprises:
and the decrypted information is consistent with the user name of the user terminal, the updated public key and the timestamp of the updated public key.
2. The method of claim 1, wherein before the node in the peer-to-peer network receives the application information sent by the user terminal, the method further comprises:
and the node receives registration information sent by the user terminal, wherein the registration information comprises a user name of the user terminal, an original public key, a timestamp of the original public key and user names of other user terminals.
3. The method according to claim 2, wherein before the node decrypts the at least one signature information by using the public key of the other user terminal, the method further comprises:
the node determines user names of other user terminals which have a relationship with the user terminal;
and the node acquires the public keys of the other user terminals according to the user names of the other user terminals.
4. A public key modification apparatus, comprising:
the system comprises a receiving module, a sending module and a sending module, wherein the receiving module is used for receiving application information sent by a user terminal, the application information comprises a user name of the user terminal, an updated public key, a timestamp of the updated public key and at least one piece of signature information, and the at least one piece of signature information is obtained by signing the user name of the user terminal, the updated public key and the timestamp of the updated public key by other user terminals which have a relationship with the user terminal;
the verification module is used for verifying the at least one signature message;
the recording module is used for recording the user name of the user terminal, the updated public key and the timestamp of the updated public key when the verification is passed;
the verification module is specifically configured to decrypt the at least one signature information by using the public key of the other user terminal to obtain decrypted information;
the verification pass comprises:
and the decrypted information is consistent with the user name of the user terminal, the updated public key and the timestamp of the updated public key.
5. The public key modification apparatus according to claim 4, wherein the receiving module is further configured to receive registration information sent by the user terminal, where the registration information includes a user name of the user terminal, an original public key, a timestamp of the original public key, and user names of the other user terminals.
6. The public key modification apparatus according to claim 5, further comprising:
the determining module is used for determining user names of other user terminals which have a relationship with the user terminal;
and the obtaining module is used for obtaining the public keys of the other user terminals according to the user names of the other user terminals.
CN201710313053.2A 2017-05-05 2017-05-05 Public key modification method and device Active CN107425973B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710313053.2A CN107425973B (en) 2017-05-05 2017-05-05 Public key modification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710313053.2A CN107425973B (en) 2017-05-05 2017-05-05 Public key modification method and device

Publications (2)

Publication Number Publication Date
CN107425973A CN107425973A (en) 2017-12-01
CN107425973B true CN107425973B (en) 2020-03-31

Family

ID=60425423

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710313053.2A Active CN107425973B (en) 2017-05-05 2017-05-05 Public key modification method and device

Country Status (1)

Country Link
CN (1) CN107425973B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109271189A (en) * 2018-09-26 2019-01-25 郑州云海信息技术有限公司 A kind of processing method and relevant apparatus of embedded system firmware

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102122332A (en) * 2011-02-16 2011-07-13 北京天地融科技有限公司 Method and system for managing password of electronic signing tool
CN102469453A (en) * 2010-11-12 2012-05-23 国民技术股份有限公司 Security certificate method and system
CN104821941A (en) * 2015-04-21 2015-08-05 南京邮电大学 Smart card password authentication and password changing method
CN105530246A (en) * 2015-12-04 2016-04-27 华为技术有限公司 Method, device and system for managing virtual machine

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050120106A1 (en) * 2003-12-02 2005-06-02 Nokia, Inc. System and method for distributing software updates to a network appliance

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102469453A (en) * 2010-11-12 2012-05-23 国民技术股份有限公司 Security certificate method and system
CN102122332A (en) * 2011-02-16 2011-07-13 北京天地融科技有限公司 Method and system for managing password of electronic signing tool
CN104821941A (en) * 2015-04-21 2015-08-05 南京邮电大学 Smart card password authentication and password changing method
CN105530246A (en) * 2015-12-04 2016-04-27 华为技术有限公司 Method, device and system for managing virtual machine

Also Published As

Publication number Publication date
CN107425973A (en) 2017-12-01

Similar Documents

Publication Publication Date Title
US20230231702A1 (en) ECDHE Key Exchange for Mutual Authentication Using a Key Server
CN106664202B (en) Method, system and computer readable medium for providing encryption on multiple devices
US10003582B2 (en) Technologies for synchronizing and restoring reference templates
CN110022217B (en) Advertisement media service data credible storage system based on block chain
US20190394175A1 (en) Systems and methods for permissioned blockchain infrastructure with fine-grained access control and confidentiality-preserving publish/subscribe messaging
CN108933667B (en) Management method and management system of public key certificate based on block chain
EP2954448B1 (en) Provisioning sensitive data into third party network-enabled devices
CN111130770B (en) Information certification method and system based on blockchain, user terminal, electronic equipment and storage medium
KR101985179B1 (en) Blockchain based id as a service
US8315395B2 (en) Nearly-stateless key escrow service
CN113556363B (en) Data sharing method and system based on decentralized and distributed proxy re-encryption
US20110276490A1 (en) Security service level agreements with publicly verifiable proofs of compliance
CN102427442A (en) Combining request-dependent metadata with media content
CN106941404B (en) Key protection method and device
CN110351276B (en) Data processing method, device and computer readable storage medium
CN110351364B (en) Data storage method, device and computer readable storage medium
US8732481B2 (en) Object with identity based encryption
CN113868684B (en) Signature method, device, server, medium and signature system
CN111241492A (en) Product multi-tenant secure credit granting method, system and electronic equipment
WO2021036511A1 (en) Method for data encryption, storage and reading, terminal device, and storage medium
CN109948370A (en) A kind of method for processing business based on block chain, device and electronic equipment
CN115906181A (en) Encrypted file right confirming method, device and system based on block chain attribute
CN110138558B (en) Transmission method and device of session key and computer-readable storage medium
Zwattendorfer et al. A federated cloud identity broker-model for enhanced privacy via proxy re-encryption
US20230146229A1 (en) Entity, gateway device, information processing device, information processing system, and information processing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant