CN109067521A - A kind of public key distribution method based on block chain - Google Patents
A kind of public key distribution method based on block chain Download PDFInfo
- Publication number
- CN109067521A CN109067521A CN201810841999.0A CN201810841999A CN109067521A CN 109067521 A CN109067521 A CN 109067521A CN 201810841999 A CN201810841999 A CN 201810841999A CN 109067521 A CN109067521 A CN 109067521A
- Authority
- CN
- China
- Prior art keywords
- public key
- information
- block
- user
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Power Engineering (AREA)
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of public key distribution methods based on block chain, comprising the following steps: the first step, user to agent node application by public key trustship in block chain;Second step, user generates public, private key pair, and generates public key information, and the public key information of oneself is broadcast in block chain network;Third step, node verify the public key information received, and local cache is added;4th step, node start the generation for carrying out next block after generating or receiving a new block;5th step requests public key information to block chain when user needs to obtain the public key of other users.
Description
Technical field
The present invention relates to field of computer information security, specifically a kind of public key distribution model based on block chain.
Technical background
In public key cryptography system, a problem is the public affairs of the public key and communication target node that how to guarantee that user obtains
Key is consistent, that is, authentication public key problem.In order to avoid public key information is distorted by attacker, suitable public key cryptosyst is established
It can reduce the risk that the public key information of node is tampered.Traditional public key distribution approach is credible based on one present in system
Central node, be responsible for by believable central node the public key in system generation and distribution work.
Since traditionally distributed system deposits the problem for the common recognition for being difficult to reach an agreement in systems, distributed system
It is very restricted in information storage related application.After the common recognition Forming Mechanism for introducing block chain, one can be provided
A more feasible implementation.It, being capable of structure between each node can be realized in distributed network by block chain technology
Build a unified public key record sheet.User, which is stored in the public key in public key cryptosyst, can higher anti-change performance.This hair
It is bright by by block chain Technology application in public key distribute link, propose a distributed public key dissemination system.
Summary of the invention
The purpose of the present invention is construct a public key cryptosyst.This method passes through each node that block chain network is in network
Between set up common recognition, transmit public key information among the nodes, guarantee that the public key information stored in each node is consistent.To realize
Above-mentioned purpose, the invention adopts the following technical scheme:
A kind of public key distribution method based on block chain, comprising the following steps:
The first step, user to agent node application by public key trustship in block chain
User sends to agent node and requests, and requests the power being within a certain period of time stored in public key in block chain network
Benefit, agent node generate the ID of a pair of interim public, private key pair and user after through application, and agent node will be interim public
Key, User ID, the beginning and ending time of user's trustship, the ID of agent node, signature algorithm and information type mark are packaged into one
Packet, using being published in network after the public key signature of agent node, agent node sends out cipher key pair information and User ID
The user of request is given, user issues the public key of oneself after information is by the confirmation of block chain;
Second step, user generates public, private key pair, and generates public key information, and the public key information of oneself is broadcast to block chain
In network
User is after the key for generating oneself, by entry-into-force time section, User ID, signature algorithm and the info class of key
Type mark is packaged into additional information and is attached to after the public key of generation, generates complete public key information, and user believes complete public key
Breath is signed, and used private key of signing is the corresponding private key of effective public key information being present in block chain, so that receiving
The node of information can verify public key information;
Third step, node verify the public key information received, and local cache is added
When node receives a public key information from network, use is found by the signer ID stored in additional information
Family is stored in the public key information in block chain;Prove that information is generated by user itself by way of verifying signature;It is logical in information
After crossing signature verification, public key information can be stored into local cache by node, while forward the public key information of user;
4th step, node start the generation for carrying out next block after generating or receiving a new block
Node first verifies the block received, guarantees that block meets the difficulty target of current block chain, and turn
The block that hair meets difficulty target arranges the public key information of local cache when the block newly received is located on main chain,
It is compared with the information in the block that receives, the public key information being not included in chain is generated into a Hash tree, above one
The cryptographic Hash of block head, the Hash tree root of block body, timestamp and four part of random value are content generation area build, pass through adjusting
The content of random value starts to generate new block;
When new block is not located on main chain, block chain generates bifurcated, and the length of chain is not more than in section where new block
When the length for the chain that point is working, node only stores block, only when the chain newly arrived makes a branch lengths
More than the chain of node work at present, after becoming new main chain, just it is switched on new chain and works, when switching between chain,
Two chains of block are compared, the information stored in original main chain is avoided to lose;
5th step requests public key information to block chain when user needs to obtain the public key of other users
When user needs the public key information of other users, initiate to request to block chain network, the node in block chain network
After receiving the request, in the public key information for locally searching requested user, the message of request will not be forwarded to other nodes,
When node locally find effective information when, client public key information Merkel corresponding with information branch is packaged into report
Text returns to the user for initiating request, and user is simply verified after receiving information, to information, the node of Merkel tree
Value is obtained by the child node of node by Hash operation, after obtaining public key information and corresponding Merkel branch, Yong Hutong
It crosses operation and obtains the value of Merkel's tree root, by being compared with the information being stored in block head, the information for verifying transmitting is
It is no to be modified.
The present invention due to using the technology described above, has the advantage that
The present invention carries out common recognition generation to the public key information in distributed system using block chain technology.So that in distribution
A public key cryptosyst is established in system technically becomes feasible.Overcome distributed system be difficult to the problem of reaching common understanding it
Afterwards, public key dissemination system is established in distributed system as feasible concept.After overcoming the problem of common recognition is difficult to set up,
Distributed system can play, the advantage of strong antijamming capability high relative to centring system response efficiency.Area is based in order to verify
Safety possessed by the public key cryptosyst of block chain verifies public affairs with this by simulating to problem common in public key cryptosyst
Key system can fight some common attack patterns, demonstrate man-in-the-middle attack and information distorts two kinds of common attackers
Formula is difficult to threaten to the public key cryptosyst based on block chain.
Detailed description of the invention
Fig. 1 is the schematic diagram of block catenary system storage organization
Fig. 2 is the schematic diagram of public key cryptosyst working method.
Fig. 3 is that attacker distorts the success rate r of information and attacker controls the relationship that operation power accounts between system proportional q.
Specific embodiment
Below by specific embodiments and the drawings, the present invention is further illustrated.This example is only limitted to illustrate the present invention
A kind of implementation method, do not represent the limitation to coverage area of the present invention.
The present invention passes through block by being split to storage system in the composition node in network using block chain technology
The responsibility of node shared key storage in chain network, constructs a public key cryptosyst.This method is by block chain network
Common recognition is set up between each node in network, transmits public key information among the nodes, guarantees the public affairs stored in each node
Key information is consistent.After guaranteeing to possess identical public key information backup between node, distributed system can be by Pubic-Key search
Task is given each participation node and is provided, and user can also obtain verification information from multiple nodes when requesting public key information and carry out
Intersect and compares.Method includes the following steps:
Step (1): node to agent node application by public key trustship in block catenary system.
User sends to agent node and requests, and requests the power being within a certain period of time stored in public key in block chain network
Benefit.Agent node generates the ID of a pair of interim public, private key pair and user after through application.Agent node will be interim public
Key and relevant information package are at an information report, using being published in network after the public key signature of agent node.Public key information
It can be indicated by following form: { e, S, f (hash ({ e, S }), d) }.The meaning that wherein various pieces indicate is as follows: e represents user
Temporary public key, the additional information of S representative information report, including User ID, the beginning and ending time of user's trustship, agent node ID,
Signature algorithm and information type mark.F (x, d) is the public key signature algorithm of user's selection, and parameter d is the private of agent node
Key, hash (x) are hash algorithm specified in system.Cipher key pair information and User ID are sent to the use of request by agent node
Family.User can issue the public key of oneself after information is by the confirmation of block chain.
Step (2): user generates public, private key pair, and generates public key information.The public key information of oneself is broadcast to by user
In block chain network.
User is locally generated the public, private key pair of itself.The generation of public, private key pair does not need additional information, user
Key information need not necessarily need to be based on the information of user, the binding issue of user and key is solved by the anti-alterability of public key cryptosyst.
The private key information of user is locally saved by user, needs not move through network transmission.User, which is locally generated, to be wished to be stored in
Public, private key pair in block chain, and it is locally generated public key information.The format of public key information is similar with temporary public key information, can
It is indicated by following form: { ei, S, f (hash ({ ei, S }), dit1)}.The meaning that wherein various pieces indicate is as follows: i shows currently
For the i-th pair key of node, wherein public key is ei, private key di.Effective public key information is stored when node is no in block chain
When, the key used is the temporary key obtained from trustship node.S is additional information, including node i d, public key algorithm, public key
The beginning and ending time come into force, if for additional informations such as temporary public keys.After node generates public key information, deposited using itself
The private key stored up in block chain encrypts information.F (x, d) is the public key signature algorithm of user's selection, and hash (x) is system
Specified in hash algorithm.
Step (3): node verifies the public key information received, and local cache is added.
When node receives a public key information from network, use is found by the signer ID stored in additional information
Family is stored in the public key information in block chain.Prove that information is generated by user itself by way of verifying signature.It is logical in information
After crossing signature verification, public key information can be stored into local cache by node, while forward the public key information of user.
Step (4): node starts the generation for carrying out next block after generating or receiving a new block.
Node first verifies the block received, guarantees that block meets the difficulty target of current block chain, and turn
Hair meets the block of difficulty target.When the block newly received is located on main chain, the public key information of local cache is arranged,
It is compared with the information in the block that receives, the public key information being not included in chain is generated into a Hash tree.Above one
The cryptographic Hash of block head, the Hash tree root of block body, timestamp and four part of random value are content generation area build.Pass through adjusting
The content of random value starts to generate new block.
When new block is not located on main chain, block chain generates bifurcated.The length of chain is not more than in section where new block
When the length for the chain that point is working, node only simply stores block, only when the chain newly arrived makes a branch
Chain length is more than that the chain of node work at present is just switched on new chain and works after becoming new main chain.It is cut between chain
When changing, two chains of block are compared, the information stored in original main chain is avoided to lose.
Step (5): when user needs and other users communicate, public key information can be requested to block chain.
The node for receiving request at first is responsible for responding request, and the information of return includes the complete public affairs of requested user
Key information and corresponding Hash tree branch are tested by what the Hash tree root stored in Hash tree branch and block head can be convenient
Whether correct demonstrate,prove public key information.When node of the user to the service that provides is distrusted, can be carried out to other node solicited messages
Cross validation.
Since block chain is there are the characteristic of delayed acknowledgement, user needs the advancing updating public key letter before public key fails
Breath, when some user has multiple not yet expired public keys in block chain, it is believed that before the public key information covering started the latest
Information as effective information.When newest public key has been stored in block chain network but has not yet enabled, network will not will not yet
The information of enabling returns to user as effective information.
Step (6): it is big to have that memory space occupies for block chain, public key cryptosyst can by some measures come
Reduce negative impact.
Block catenary system protects the safety for the information being newly added due to needing to be continuously generated block, and total number of blocks is not
It is evitable to will increase.Due to needing to trace historical transactional information in ideal money application, it is therefore desirable to retain all areas
Block.In public key cryptosyst, the expired public key of user is invalid information, can abandon invalid information to reduce storage pressure.
Node can once check root zone block when block updates, and when root node does not include effective information, abandon root node,
Select descendant node as new root node.Node, which abandons old node, will not make block chain missing valid information, will not be to block
The consistency of chain impacts.
In the step (1), user needs to make requests to the node being present in network when network is added.This
Step when cipher key system carries out commercial, can be realized by extension block chain information content to user using the public key cryptosyst time into
Row limitation, user need the approval by ISP using public key cryptosyst, and ISP can determine user certain
Service is able to use in time, more than after time range, user cannot be serviced using public key.
In the step (4), since block chain allows the characteristic of bifurcated, the information being present on block chain main chain is not
Determine the information being consistent in all nodes.When block chain constantly extends, the area extended after the block of information is stored
Block number increases, and the probability that block is substituted constantly reduces.It, can be with when the probability that block is substituted drops to tolerance or less
Think that information has been safely stored among node.One threshold value n for delaying confirmation would generally be set.I.e. when in main chain
There are after n block after block, it is believed that information is stored in node safely.Threshold value can voluntarily be selected by user, when n is smaller
When, higher confirmation is had, but has higher risk.When n is larger, validation of information efficiency is lower, but information is tampered
Risk it is lower.Since the information being stored in block chain is there are the characteristic of delayed acknowledgement, node is needed in more new information
Shift to an earlier date the regular hour to release news, avoids the problem that the expired generation of user password.When not considering network delay, need
At least shift to an earlier date the time of (n+1) * t, wherein t is the time that network generates block.
In the step (5), since complete information is larger, the block head of user terminal memory block chain point with
Save memory space.Node is not only responsible for maintenance block information, is also responsible for requesting public key information to be responded user.Work as user
It, can be to node solicited message when needing the public key information of other users.Block chain stores information using the structure of Hash tree,
User can easily verify the public key information of acquisition by the Hash tree root stored in Hash tree branch and block head
Correctness.Conveniently can also intersect and test by obtaining Hash tree branch from multiple nodes in block chain network
Card.
Claims (1)
1. a kind of public key distribution method based on block chain, comprising the following steps:
The first step, user to agent node application by public key trustship in block chain
User sends to agent node and requests, and public key is stored in the right in block chain network, generation within a certain period of time by request
Node is managed after through application, generates the ID of a pair of interim public, private key pair and user, agent node by temporary public key, use
Family ID, the beginning and ending time of user's trustship, the ID of agent node, signature algorithm and information type mark are packaged into an information
Packet, using being published in network after the public key signature of agent node, cipher key pair information and User ID are sent to by agent node
The user of request, user issue the public key of oneself after information is by the confirmation of block chain;
Second step, user generates public, private key pair, and generates public key information, and the public key information of oneself is broadcast to block chain network
In
User is after the key for generating oneself, by entry-into-force time section, User ID, signature algorithm and the information type mark of key
Will is packaged into additional information and is attached to after the public key of generation, generates complete public key information, user to complete public key information into
Row signature, used private key of signing is the corresponding private key of effective public key information being present in block chain, so that receiving information
Node public key information can be verified;
Third step, node verify the public key information received, and local cache is added
When node receives a public key information from network, user is found by the signer ID stored in additional information and is deposited
The public key information being stored in block chain;Prove that information is generated by user itself by way of verifying signature;Pass through label in information
After name verifying, public key information can be stored into local cache by node, while forward the public key information of user;
4th step, node start the generation for carrying out next block after generating or receiving a new block
Node first verifies the block received, guarantees that block meets the difficulty target of current block chain, and forward symbol
The block for closing difficulty target arranges the public key information of local cache when the block newly received is located on main chain, and receives
To block in information be compared, by the public key information being not included in chain generate a Hash tree, the above block
The cryptographic Hash of head, the Hash tree root of block body, timestamp and four part of random value are content generation area build, random by adjusting
The content of value starts to generate new block;
When new block is not located on main chain, block chain generates bifurcated, and the length of chain is not more than in node just where new block
In the length of the chain of work, node only stores block, is only more than when the chain newly arrived makes a branch lengths
The chain of node work at present is just switched on new chain and works, when switching between chain, to area after becoming new main chain
Two chains of block are compared, and the information stored in original main chain is avoided to lose;
5th step requests public key information to block chain when user needs to obtain the public key of other users
When user needs the public key information of other users, initiate to request to block chain network, the node in block chain network is being received
To after request, in the public key information for locally searching requested user, the message of request will not be forwarded to other nodes, work as section
Client public key information Merkel corresponding with information branch is packaged into message and returned by point when locally finding effective information
Back to the user for initiating request, user simply verified after receiving information, to information, the value of the node of Merkel tree by
The child node of node is obtained by Hash operation, and after obtaining public key information and corresponding Merkel branch, user passes through fortune
Calculation obtains the value of Merkel's tree root, by being compared with the information being stored in block head, verify transmitting information whether by
Change.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810841999.0A CN109067521A (en) | 2018-07-27 | 2018-07-27 | A kind of public key distribution method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810841999.0A CN109067521A (en) | 2018-07-27 | 2018-07-27 | A kind of public key distribution method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109067521A true CN109067521A (en) | 2018-12-21 |
Family
ID=64835808
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810841999.0A Pending CN109067521A (en) | 2018-07-27 | 2018-07-27 | A kind of public key distribution method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109067521A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109767218A (en) * | 2019-01-08 | 2019-05-17 | 中国工商银行股份有限公司 | Block chain certificate processing method and system |
WO2020140931A1 (en) * | 2019-01-03 | 2020-07-09 | 菜鸟智能物流控股有限公司 | Blockchain access control method and apparatus, and electronic device |
CN111861336A (en) * | 2020-07-23 | 2020-10-30 | 中国联合网络通信集团有限公司 | Logistics monitoring method, device and system |
CN112163004A (en) * | 2020-10-14 | 2021-01-01 | 上海万向区块链股份公司 | List processing and updating display system and method based on multi-chain data fusion |
CN114567426A (en) * | 2021-12-31 | 2022-05-31 | 电子科技大学广东电子信息工程研究院 | Data sharing method and system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016022864A2 (en) * | 2014-08-06 | 2016-02-11 | Blockchain Technologies Corporation | System and method for securely receiving and counting votes in an election |
CN106534085A (en) * | 2016-10-25 | 2017-03-22 | 杭州云象网络技术有限公司 | Privacy protection method based on block chain technology |
CN107070644A (en) * | 2016-12-26 | 2017-08-18 | 北京科技大学 | A kind of decentralization public key management method and management system based on trust network |
US20170257358A1 (en) * | 2016-03-04 | 2017-09-07 | ShoCard, Inc. | Method and System for Authenticated Login Using Static or Dynamic Codes |
CN107231351A (en) * | 2017-05-25 | 2017-10-03 | 远光软件股份有限公司 | The management method and relevant device of electronic certificate |
CN107566117A (en) * | 2017-07-14 | 2018-01-09 | 浙商银行股份有限公司 | A kind of block chain key management system and method |
CN107769925A (en) * | 2017-09-15 | 2018-03-06 | 山东大学 | Public key infrastructure system and its certificate management method based on block chain |
CN108052530A (en) * | 2017-11-10 | 2018-05-18 | 杭州云象网络技术有限公司 | A kind of decentralization CA construction methods and its system based on alliance's chain |
US20180183587A1 (en) * | 2016-12-23 | 2018-06-28 | Vmware, Inc. | Blockchain-Assisted Public Key Infrastructure for Internet of Things Applications |
-
2018
- 2018-07-27 CN CN201810841999.0A patent/CN109067521A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2016022864A2 (en) * | 2014-08-06 | 2016-02-11 | Blockchain Technologies Corporation | System and method for securely receiving and counting votes in an election |
US20170257358A1 (en) * | 2016-03-04 | 2017-09-07 | ShoCard, Inc. | Method and System for Authenticated Login Using Static or Dynamic Codes |
CN106534085A (en) * | 2016-10-25 | 2017-03-22 | 杭州云象网络技术有限公司 | Privacy protection method based on block chain technology |
US20180183587A1 (en) * | 2016-12-23 | 2018-06-28 | Vmware, Inc. | Blockchain-Assisted Public Key Infrastructure for Internet of Things Applications |
CN107070644A (en) * | 2016-12-26 | 2017-08-18 | 北京科技大学 | A kind of decentralization public key management method and management system based on trust network |
CN107231351A (en) * | 2017-05-25 | 2017-10-03 | 远光软件股份有限公司 | The management method and relevant device of electronic certificate |
CN107566117A (en) * | 2017-07-14 | 2018-01-09 | 浙商银行股份有限公司 | A kind of block chain key management system and method |
CN107769925A (en) * | 2017-09-15 | 2018-03-06 | 山东大学 | Public key infrastructure system and its certificate management method based on block chain |
CN108052530A (en) * | 2017-11-10 | 2018-05-18 | 杭州云象网络技术有限公司 | A kind of decentralization CA construction methods and its system based on alliance's chain |
Non-Patent Citations (1)
Title |
---|
王华群 等: ""区块链中的密码学技术"", 《南京邮电大学学报(自然科学版)》 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020140931A1 (en) * | 2019-01-03 | 2020-07-09 | 菜鸟智能物流控股有限公司 | Blockchain access control method and apparatus, and electronic device |
CN109767218A (en) * | 2019-01-08 | 2019-05-17 | 中国工商银行股份有限公司 | Block chain certificate processing method and system |
CN109767218B (en) * | 2019-01-08 | 2021-11-02 | 中国工商银行股份有限公司 | Block chain certificate processing method and system |
CN111861336A (en) * | 2020-07-23 | 2020-10-30 | 中国联合网络通信集团有限公司 | Logistics monitoring method, device and system |
CN111861336B (en) * | 2020-07-23 | 2023-10-17 | 中国联合网络通信集团有限公司 | Logistics monitoring method, device and system |
CN112163004A (en) * | 2020-10-14 | 2021-01-01 | 上海万向区块链股份公司 | List processing and updating display system and method based on multi-chain data fusion |
CN114567426A (en) * | 2021-12-31 | 2022-05-31 | 电子科技大学广东电子信息工程研究院 | Data sharing method and system |
CN114567426B (en) * | 2021-12-31 | 2023-10-13 | 电子科技大学广东电子信息工程研究院 | Data sharing method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109067521A (en) | A kind of public key distribution method based on block chain | |
CN112153608B (en) | Vehicle networking cross-domain authentication method based on side chain technology trust model | |
CN111601258B (en) | Vehicle networking node data safety communication method based on block chain | |
Larisch et al. | CRLite: A scalable system for pushing all TLS revocations to all browsers | |
KR101483818B1 (en) | A bidirectional entity authentication method based on the credible third party | |
KR101405509B1 (en) | Method and system for entity public key acquiring, certificate validation and authentication by introducing an online credible third party | |
JP5975594B2 (en) | Communication terminal and communication system | |
CN112583596B (en) | Complete cross-domain identity authentication method based on block chain technology | |
US20220109683A1 (en) | Verification method for fast source and path embedded with random authentication | |
CN113672942B (en) | PKI certificate cross-domain authentication method based on blockchain | |
CN106210064B (en) | A kind of extensive remotely-sensed data distribution method of controllable P 2 P based on authorization | |
Xi et al. | A trust management scheme based on behavior feedback for opportunistic networks | |
CN112968884A (en) | Block chain heterogeneous consensus method and terminal for preventing hacker attack | |
CN115102695B (en) | Block chain-based internet of vehicles certificate authentication method | |
CN112116349B (en) | High-throughput-rate-oriented random consensus method and device for drawing account book | |
Lu et al. | FLIP: An efficient privacy-preserving protocol for finding like-minded vehicles on the road | |
CN101867933A (en) | Secure routing method based on public key digital signature and routing malicious detection | |
WO2023236551A1 (en) | Decentralized trusted access method for cellular base station | |
CN107005913B (en) | Verification method, user equipment and the adjacent service functional entity of adjacent service communication | |
CN115174570A (en) | Cross-chain consensus method and system based on dynamic committee | |
CN115001723B (en) | Group communication method and system based on tree structure and asymmetric key pool | |
CN115883646A (en) | Cross-chaining method, system, storage medium and server | |
CN103906046A (en) | Safe point-to-point on-demand routing method based on identity hiding | |
Yang et al. | Blockchain-based conditional privacy-preserving authentication protocol with implicit certificates for vehicular edge computing | |
Koisser et al. | {V'CER}: Efficient Certificate Validation in Constrained Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
AD01 | Patent right deemed abandoned |
Effective date of abandoning: 20211203 |
|
AD01 | Patent right deemed abandoned |