CN109067521A - A kind of public key distribution method based on block chain - Google Patents

A kind of public key distribution method based on block chain Download PDF

Info

Publication number
CN109067521A
CN109067521A CN201810841999.0A CN201810841999A CN109067521A CN 109067521 A CN109067521 A CN 109067521A CN 201810841999 A CN201810841999 A CN 201810841999A CN 109067521 A CN109067521 A CN 109067521A
Authority
CN
China
Prior art keywords
public key
information
block
user
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810841999.0A
Other languages
Chinese (zh)
Inventor
平鉴川
刘敬浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin University
Original Assignee
Tianjin University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianjin University filed Critical Tianjin University
Priority to CN201810841999.0A priority Critical patent/CN109067521A/en
Publication of CN109067521A publication Critical patent/CN109067521A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of public key distribution methods based on block chain, comprising the following steps: the first step, user to agent node application by public key trustship in block chain;Second step, user generates public, private key pair, and generates public key information, and the public key information of oneself is broadcast in block chain network;Third step, node verify the public key information received, and local cache is added;4th step, node start the generation for carrying out next block after generating or receiving a new block;5th step requests public key information to block chain when user needs to obtain the public key of other users.

Description

A kind of public key distribution method based on block chain
Technical field
The present invention relates to field of computer information security, specifically a kind of public key distribution model based on block chain.
Technical background
In public key cryptography system, a problem is the public affairs of the public key and communication target node that how to guarantee that user obtains Key is consistent, that is, authentication public key problem.In order to avoid public key information is distorted by attacker, suitable public key cryptosyst is established It can reduce the risk that the public key information of node is tampered.Traditional public key distribution approach is credible based on one present in system Central node, be responsible for by believable central node the public key in system generation and distribution work.
Since traditionally distributed system deposits the problem for the common recognition for being difficult to reach an agreement in systems, distributed system It is very restricted in information storage related application.After the common recognition Forming Mechanism for introducing block chain, one can be provided A more feasible implementation.It, being capable of structure between each node can be realized in distributed network by block chain technology Build a unified public key record sheet.User, which is stored in the public key in public key cryptosyst, can higher anti-change performance.This hair It is bright by by block chain Technology application in public key distribute link, propose a distributed public key dissemination system.
Summary of the invention
The purpose of the present invention is construct a public key cryptosyst.This method passes through each node that block chain network is in network Between set up common recognition, transmit public key information among the nodes, guarantee that the public key information stored in each node is consistent.To realize Above-mentioned purpose, the invention adopts the following technical scheme:
A kind of public key distribution method based on block chain, comprising the following steps:
The first step, user to agent node application by public key trustship in block chain
User sends to agent node and requests, and requests the power being within a certain period of time stored in public key in block chain network Benefit, agent node generate the ID of a pair of interim public, private key pair and user after through application, and agent node will be interim public Key, User ID, the beginning and ending time of user's trustship, the ID of agent node, signature algorithm and information type mark are packaged into one Packet, using being published in network after the public key signature of agent node, agent node sends out cipher key pair information and User ID The user of request is given, user issues the public key of oneself after information is by the confirmation of block chain;
Second step, user generates public, private key pair, and generates public key information, and the public key information of oneself is broadcast to block chain In network
User is after the key for generating oneself, by entry-into-force time section, User ID, signature algorithm and the info class of key Type mark is packaged into additional information and is attached to after the public key of generation, generates complete public key information, and user believes complete public key Breath is signed, and used private key of signing is the corresponding private key of effective public key information being present in block chain, so that receiving The node of information can verify public key information;
Third step, node verify the public key information received, and local cache is added
When node receives a public key information from network, use is found by the signer ID stored in additional information Family is stored in the public key information in block chain;Prove that information is generated by user itself by way of verifying signature;It is logical in information After crossing signature verification, public key information can be stored into local cache by node, while forward the public key information of user;
4th step, node start the generation for carrying out next block after generating or receiving a new block
Node first verifies the block received, guarantees that block meets the difficulty target of current block chain, and turn The block that hair meets difficulty target arranges the public key information of local cache when the block newly received is located on main chain, It is compared with the information in the block that receives, the public key information being not included in chain is generated into a Hash tree, above one The cryptographic Hash of block head, the Hash tree root of block body, timestamp and four part of random value are content generation area build, pass through adjusting The content of random value starts to generate new block;
When new block is not located on main chain, block chain generates bifurcated, and the length of chain is not more than in section where new block When the length for the chain that point is working, node only stores block, only when the chain newly arrived makes a branch lengths More than the chain of node work at present, after becoming new main chain, just it is switched on new chain and works, when switching between chain, Two chains of block are compared, the information stored in original main chain is avoided to lose;
5th step requests public key information to block chain when user needs to obtain the public key of other users
When user needs the public key information of other users, initiate to request to block chain network, the node in block chain network After receiving the request, in the public key information for locally searching requested user, the message of request will not be forwarded to other nodes, When node locally find effective information when, client public key information Merkel corresponding with information branch is packaged into report Text returns to the user for initiating request, and user is simply verified after receiving information, to information, the node of Merkel tree Value is obtained by the child node of node by Hash operation, after obtaining public key information and corresponding Merkel branch, Yong Hutong It crosses operation and obtains the value of Merkel's tree root, by being compared with the information being stored in block head, the information for verifying transmitting is It is no to be modified.
The present invention due to using the technology described above, has the advantage that
The present invention carries out common recognition generation to the public key information in distributed system using block chain technology.So that in distribution A public key cryptosyst is established in system technically becomes feasible.Overcome distributed system be difficult to the problem of reaching common understanding it Afterwards, public key dissemination system is established in distributed system as feasible concept.After overcoming the problem of common recognition is difficult to set up, Distributed system can play, the advantage of strong antijamming capability high relative to centring system response efficiency.Area is based in order to verify Safety possessed by the public key cryptosyst of block chain verifies public affairs with this by simulating to problem common in public key cryptosyst Key system can fight some common attack patterns, demonstrate man-in-the-middle attack and information distorts two kinds of common attackers Formula is difficult to threaten to the public key cryptosyst based on block chain.
Detailed description of the invention
Fig. 1 is the schematic diagram of block catenary system storage organization
Fig. 2 is the schematic diagram of public key cryptosyst working method.
Fig. 3 is that attacker distorts the success rate r of information and attacker controls the relationship that operation power accounts between system proportional q.
Specific embodiment
Below by specific embodiments and the drawings, the present invention is further illustrated.This example is only limitted to illustrate the present invention A kind of implementation method, do not represent the limitation to coverage area of the present invention.
The present invention passes through block by being split to storage system in the composition node in network using block chain technology The responsibility of node shared key storage in chain network, constructs a public key cryptosyst.This method is by block chain network Common recognition is set up between each node in network, transmits public key information among the nodes, guarantees the public affairs stored in each node Key information is consistent.After guaranteeing to possess identical public key information backup between node, distributed system can be by Pubic-Key search Task is given each participation node and is provided, and user can also obtain verification information from multiple nodes when requesting public key information and carry out Intersect and compares.Method includes the following steps:
Step (1): node to agent node application by public key trustship in block catenary system.
User sends to agent node and requests, and requests the power being within a certain period of time stored in public key in block chain network Benefit.Agent node generates the ID of a pair of interim public, private key pair and user after through application.Agent node will be interim public Key and relevant information package are at an information report, using being published in network after the public key signature of agent node.Public key information It can be indicated by following form: { e, S, f (hash ({ e, S }), d) }.The meaning that wherein various pieces indicate is as follows: e represents user Temporary public key, the additional information of S representative information report, including User ID, the beginning and ending time of user's trustship, agent node ID, Signature algorithm and information type mark.F (x, d) is the public key signature algorithm of user's selection, and parameter d is the private of agent node Key, hash (x) are hash algorithm specified in system.Cipher key pair information and User ID are sent to the use of request by agent node Family.User can issue the public key of oneself after information is by the confirmation of block chain.
Step (2): user generates public, private key pair, and generates public key information.The public key information of oneself is broadcast to by user In block chain network.
User is locally generated the public, private key pair of itself.The generation of public, private key pair does not need additional information, user Key information need not necessarily need to be based on the information of user, the binding issue of user and key is solved by the anti-alterability of public key cryptosyst. The private key information of user is locally saved by user, needs not move through network transmission.User, which is locally generated, to be wished to be stored in Public, private key pair in block chain, and it is locally generated public key information.The format of public key information is similar with temporary public key information, can It is indicated by following form: { ei, S, f (hash ({ ei, S }), dit1)}.The meaning that wherein various pieces indicate is as follows: i shows currently For the i-th pair key of node, wherein public key is ei, private key di.Effective public key information is stored when node is no in block chain When, the key used is the temporary key obtained from trustship node.S is additional information, including node i d, public key algorithm, public key The beginning and ending time come into force, if for additional informations such as temporary public keys.After node generates public key information, deposited using itself The private key stored up in block chain encrypts information.F (x, d) is the public key signature algorithm of user's selection, and hash (x) is system Specified in hash algorithm.
Step (3): node verifies the public key information received, and local cache is added.
When node receives a public key information from network, use is found by the signer ID stored in additional information Family is stored in the public key information in block chain.Prove that information is generated by user itself by way of verifying signature.It is logical in information After crossing signature verification, public key information can be stored into local cache by node, while forward the public key information of user.
Step (4): node starts the generation for carrying out next block after generating or receiving a new block.
Node first verifies the block received, guarantees that block meets the difficulty target of current block chain, and turn Hair meets the block of difficulty target.When the block newly received is located on main chain, the public key information of local cache is arranged, It is compared with the information in the block that receives, the public key information being not included in chain is generated into a Hash tree.Above one The cryptographic Hash of block head, the Hash tree root of block body, timestamp and four part of random value are content generation area build.Pass through adjusting The content of random value starts to generate new block.
When new block is not located on main chain, block chain generates bifurcated.The length of chain is not more than in section where new block When the length for the chain that point is working, node only simply stores block, only when the chain newly arrived makes a branch Chain length is more than that the chain of node work at present is just switched on new chain and works after becoming new main chain.It is cut between chain When changing, two chains of block are compared, the information stored in original main chain is avoided to lose.
Step (5): when user needs and other users communicate, public key information can be requested to block chain.
The node for receiving request at first is responsible for responding request, and the information of return includes the complete public affairs of requested user Key information and corresponding Hash tree branch are tested by what the Hash tree root stored in Hash tree branch and block head can be convenient Whether correct demonstrate,prove public key information.When node of the user to the service that provides is distrusted, can be carried out to other node solicited messages Cross validation.
Since block chain is there are the characteristic of delayed acknowledgement, user needs the advancing updating public key letter before public key fails Breath, when some user has multiple not yet expired public keys in block chain, it is believed that before the public key information covering started the latest Information as effective information.When newest public key has been stored in block chain network but has not yet enabled, network will not will not yet The information of enabling returns to user as effective information.
Step (6): it is big to have that memory space occupies for block chain, public key cryptosyst can by some measures come Reduce negative impact.
Block catenary system protects the safety for the information being newly added due to needing to be continuously generated block, and total number of blocks is not It is evitable to will increase.Due to needing to trace historical transactional information in ideal money application, it is therefore desirable to retain all areas Block.In public key cryptosyst, the expired public key of user is invalid information, can abandon invalid information to reduce storage pressure. Node can once check root zone block when block updates, and when root node does not include effective information, abandon root node, Select descendant node as new root node.Node, which abandons old node, will not make block chain missing valid information, will not be to block The consistency of chain impacts.
In the step (1), user needs to make requests to the node being present in network when network is added.This Step when cipher key system carries out commercial, can be realized by extension block chain information content to user using the public key cryptosyst time into Row limitation, user need the approval by ISP using public key cryptosyst, and ISP can determine user certain Service is able to use in time, more than after time range, user cannot be serviced using public key.
In the step (4), since block chain allows the characteristic of bifurcated, the information being present on block chain main chain is not Determine the information being consistent in all nodes.When block chain constantly extends, the area extended after the block of information is stored Block number increases, and the probability that block is substituted constantly reduces.It, can be with when the probability that block is substituted drops to tolerance or less Think that information has been safely stored among node.One threshold value n for delaying confirmation would generally be set.I.e. when in main chain There are after n block after block, it is believed that information is stored in node safely.Threshold value can voluntarily be selected by user, when n is smaller When, higher confirmation is had, but has higher risk.When n is larger, validation of information efficiency is lower, but information is tampered Risk it is lower.Since the information being stored in block chain is there are the characteristic of delayed acknowledgement, node is needed in more new information Shift to an earlier date the regular hour to release news, avoids the problem that the expired generation of user password.When not considering network delay, need At least shift to an earlier date the time of (n+1) * t, wherein t is the time that network generates block.
In the step (5), since complete information is larger, the block head of user terminal memory block chain point with Save memory space.Node is not only responsible for maintenance block information, is also responsible for requesting public key information to be responded user.Work as user It, can be to node solicited message when needing the public key information of other users.Block chain stores information using the structure of Hash tree, User can easily verify the public key information of acquisition by the Hash tree root stored in Hash tree branch and block head Correctness.Conveniently can also intersect and test by obtaining Hash tree branch from multiple nodes in block chain network Card.

Claims (1)

1. a kind of public key distribution method based on block chain, comprising the following steps:
The first step, user to agent node application by public key trustship in block chain
User sends to agent node and requests, and public key is stored in the right in block chain network, generation within a certain period of time by request Node is managed after through application, generates the ID of a pair of interim public, private key pair and user, agent node by temporary public key, use Family ID, the beginning and ending time of user's trustship, the ID of agent node, signature algorithm and information type mark are packaged into an information Packet, using being published in network after the public key signature of agent node, cipher key pair information and User ID are sent to by agent node The user of request, user issue the public key of oneself after information is by the confirmation of block chain;
Second step, user generates public, private key pair, and generates public key information, and the public key information of oneself is broadcast to block chain network In
User is after the key for generating oneself, by entry-into-force time section, User ID, signature algorithm and the information type mark of key Will is packaged into additional information and is attached to after the public key of generation, generates complete public key information, user to complete public key information into Row signature, used private key of signing is the corresponding private key of effective public key information being present in block chain, so that receiving information Node public key information can be verified;
Third step, node verify the public key information received, and local cache is added
When node receives a public key information from network, user is found by the signer ID stored in additional information and is deposited The public key information being stored in block chain;Prove that information is generated by user itself by way of verifying signature;Pass through label in information After name verifying, public key information can be stored into local cache by node, while forward the public key information of user;
4th step, node start the generation for carrying out next block after generating or receiving a new block
Node first verifies the block received, guarantees that block meets the difficulty target of current block chain, and forward symbol The block for closing difficulty target arranges the public key information of local cache when the block newly received is located on main chain, and receives To block in information be compared, by the public key information being not included in chain generate a Hash tree, the above block The cryptographic Hash of head, the Hash tree root of block body, timestamp and four part of random value are content generation area build, random by adjusting The content of value starts to generate new block;
When new block is not located on main chain, block chain generates bifurcated, and the length of chain is not more than in node just where new block In the length of the chain of work, node only stores block, is only more than when the chain newly arrived makes a branch lengths The chain of node work at present is just switched on new chain and works, when switching between chain, to area after becoming new main chain Two chains of block are compared, and the information stored in original main chain is avoided to lose;
5th step requests public key information to block chain when user needs to obtain the public key of other users
When user needs the public key information of other users, initiate to request to block chain network, the node in block chain network is being received To after request, in the public key information for locally searching requested user, the message of request will not be forwarded to other nodes, work as section Client public key information Merkel corresponding with information branch is packaged into message and returned by point when locally finding effective information Back to the user for initiating request, user simply verified after receiving information, to information, the value of the node of Merkel tree by The child node of node is obtained by Hash operation, and after obtaining public key information and corresponding Merkel branch, user passes through fortune Calculation obtains the value of Merkel's tree root, by being compared with the information being stored in block head, verify transmitting information whether by Change.
CN201810841999.0A 2018-07-27 2018-07-27 A kind of public key distribution method based on block chain Pending CN109067521A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810841999.0A CN109067521A (en) 2018-07-27 2018-07-27 A kind of public key distribution method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810841999.0A CN109067521A (en) 2018-07-27 2018-07-27 A kind of public key distribution method based on block chain

Publications (1)

Publication Number Publication Date
CN109067521A true CN109067521A (en) 2018-12-21

Family

ID=64835808

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810841999.0A Pending CN109067521A (en) 2018-07-27 2018-07-27 A kind of public key distribution method based on block chain

Country Status (1)

Country Link
CN (1) CN109067521A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109767218A (en) * 2019-01-08 2019-05-17 中国工商银行股份有限公司 Block chain certificate processing method and system
WO2020140931A1 (en) * 2019-01-03 2020-07-09 菜鸟智能物流控股有限公司 Blockchain access control method and apparatus, and electronic device
CN111861336A (en) * 2020-07-23 2020-10-30 中国联合网络通信集团有限公司 Logistics monitoring method, device and system
CN112163004A (en) * 2020-10-14 2021-01-01 上海万向区块链股份公司 List processing and updating display system and method based on multi-chain data fusion
CN114567426A (en) * 2021-12-31 2022-05-31 电子科技大学广东电子信息工程研究院 Data sharing method and system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016022864A2 (en) * 2014-08-06 2016-02-11 Blockchain Technologies Corporation System and method for securely receiving and counting votes in an election
CN106534085A (en) * 2016-10-25 2017-03-22 杭州云象网络技术有限公司 Privacy protection method based on block chain technology
CN107070644A (en) * 2016-12-26 2017-08-18 北京科技大学 A kind of decentralization public key management method and management system based on trust network
US20170257358A1 (en) * 2016-03-04 2017-09-07 ShoCard, Inc. Method and System for Authenticated Login Using Static or Dynamic Codes
CN107231351A (en) * 2017-05-25 2017-10-03 远光软件股份有限公司 The management method and relevant device of electronic certificate
CN107566117A (en) * 2017-07-14 2018-01-09 浙商银行股份有限公司 A kind of block chain key management system and method
CN107769925A (en) * 2017-09-15 2018-03-06 山东大学 Public key infrastructure system and its certificate management method based on block chain
CN108052530A (en) * 2017-11-10 2018-05-18 杭州云象网络技术有限公司 A kind of decentralization CA construction methods and its system based on alliance's chain
US20180183587A1 (en) * 2016-12-23 2018-06-28 Vmware, Inc. Blockchain-Assisted Public Key Infrastructure for Internet of Things Applications

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016022864A2 (en) * 2014-08-06 2016-02-11 Blockchain Technologies Corporation System and method for securely receiving and counting votes in an election
US20170257358A1 (en) * 2016-03-04 2017-09-07 ShoCard, Inc. Method and System for Authenticated Login Using Static or Dynamic Codes
CN106534085A (en) * 2016-10-25 2017-03-22 杭州云象网络技术有限公司 Privacy protection method based on block chain technology
US20180183587A1 (en) * 2016-12-23 2018-06-28 Vmware, Inc. Blockchain-Assisted Public Key Infrastructure for Internet of Things Applications
CN107070644A (en) * 2016-12-26 2017-08-18 北京科技大学 A kind of decentralization public key management method and management system based on trust network
CN107231351A (en) * 2017-05-25 2017-10-03 远光软件股份有限公司 The management method and relevant device of electronic certificate
CN107566117A (en) * 2017-07-14 2018-01-09 浙商银行股份有限公司 A kind of block chain key management system and method
CN107769925A (en) * 2017-09-15 2018-03-06 山东大学 Public key infrastructure system and its certificate management method based on block chain
CN108052530A (en) * 2017-11-10 2018-05-18 杭州云象网络技术有限公司 A kind of decentralization CA construction methods and its system based on alliance's chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王华群 等: ""区块链中的密码学技术"", 《南京邮电大学学报(自然科学版)》 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020140931A1 (en) * 2019-01-03 2020-07-09 菜鸟智能物流控股有限公司 Blockchain access control method and apparatus, and electronic device
CN109767218A (en) * 2019-01-08 2019-05-17 中国工商银行股份有限公司 Block chain certificate processing method and system
CN109767218B (en) * 2019-01-08 2021-11-02 中国工商银行股份有限公司 Block chain certificate processing method and system
CN111861336A (en) * 2020-07-23 2020-10-30 中国联合网络通信集团有限公司 Logistics monitoring method, device and system
CN111861336B (en) * 2020-07-23 2023-10-17 中国联合网络通信集团有限公司 Logistics monitoring method, device and system
CN112163004A (en) * 2020-10-14 2021-01-01 上海万向区块链股份公司 List processing and updating display system and method based on multi-chain data fusion
CN114567426A (en) * 2021-12-31 2022-05-31 电子科技大学广东电子信息工程研究院 Data sharing method and system
CN114567426B (en) * 2021-12-31 2023-10-13 电子科技大学广东电子信息工程研究院 Data sharing method and system

Similar Documents

Publication Publication Date Title
CN109067521A (en) A kind of public key distribution method based on block chain
CN112153608B (en) Vehicle networking cross-domain authentication method based on side chain technology trust model
CN111601258B (en) Vehicle networking node data safety communication method based on block chain
Larisch et al. CRLite: A scalable system for pushing all TLS revocations to all browsers
KR101483818B1 (en) A bidirectional entity authentication method based on the credible third party
KR101405509B1 (en) Method and system for entity public key acquiring, certificate validation and authentication by introducing an online credible third party
JP5975594B2 (en) Communication terminal and communication system
CN112583596B (en) Complete cross-domain identity authentication method based on block chain technology
US20220109683A1 (en) Verification method for fast source and path embedded with random authentication
CN113672942B (en) PKI certificate cross-domain authentication method based on blockchain
CN106210064B (en) A kind of extensive remotely-sensed data distribution method of controllable P 2 P based on authorization
Xi et al. A trust management scheme based on behavior feedback for opportunistic networks
CN112968884A (en) Block chain heterogeneous consensus method and terminal for preventing hacker attack
CN115102695B (en) Block chain-based internet of vehicles certificate authentication method
CN112116349B (en) High-throughput-rate-oriented random consensus method and device for drawing account book
Lu et al. FLIP: An efficient privacy-preserving protocol for finding like-minded vehicles on the road
CN101867933A (en) Secure routing method based on public key digital signature and routing malicious detection
WO2023236551A1 (en) Decentralized trusted access method for cellular base station
CN107005913B (en) Verification method, user equipment and the adjacent service functional entity of adjacent service communication
CN115174570A (en) Cross-chain consensus method and system based on dynamic committee
CN115001723B (en) Group communication method and system based on tree structure and asymmetric key pool
CN115883646A (en) Cross-chaining method, system, storage medium and server
CN103906046A (en) Safe point-to-point on-demand routing method based on identity hiding
Yang et al. Blockchain-based conditional privacy-preserving authentication protocol with implicit certificates for vehicular edge computing
Koisser et al. {V'CER}: Efficient Certificate Validation in Constrained Networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
AD01 Patent right deemed abandoned

Effective date of abandoning: 20211203

AD01 Patent right deemed abandoned