CN109670826A - Anti- quantum calculation block chain method of commerce based on unsymmetrical key pond - Google Patents

Anti- quantum calculation block chain method of commerce based on unsymmetrical key pond Download PDF

Info

Publication number
CN109670826A
CN109670826A CN201811444511.7A CN201811444511A CN109670826A CN 109670826 A CN109670826 A CN 109670826A CN 201811444511 A CN201811444511 A CN 201811444511A CN 109670826 A CN109670826 A CN 109670826A
Authority
CN
China
Prior art keywords
user terminal
key
random number
public key
quantum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811444511.7A
Other languages
Chinese (zh)
Other versions
CN109670826B (en
Inventor
富尧
钟民
钟一民
杨羽成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ruban Quantum Technology Co Ltd
Original Assignee
Ruban Quantum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ruban Quantum Technology Co Ltd filed Critical Ruban Quantum Technology Co Ltd
Priority to CN201811444511.7A priority Critical patent/CN109670826B/en
Publication of CN109670826A publication Critical patent/CN109670826A/en
Application granted granted Critical
Publication of CN109670826B publication Critical patent/CN109670826B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters

Abstract

The invention discloses a kind of anti-quantum calculation block chain method of commerce based on unsymmetrical key pond, including a plurality of clients, identical pool of keys is stored in the quantum key card of each user terminal configuration, it initiates the user terminal transaction that will sign and is uploaded to the network platform, the reception user terminal of transaction verification extracts the public key pointer random number for initiating user terminal in conjunction with one's own side's pool of keys initiates user terminal public key and then extracts to produce signature, realizes transaction verification by producing signature.Public key is stored and disclosed using quantum key card; quantum key card is independent hardware isolated equipment; a possibility that reduction steals key by Malware or malicious operation protects corresponding private key in turn; digital signature based on public and private key is further encrypted by random number key; and random number key is encrypted by private key, and forms the digital signature of encryption.Even if in the presence of quantum computer, it is also difficult to be derived private key.Therefore the program is not easy to be cracked by quantum computer.

Description

Anti- quantum calculation block chain method of commerce based on unsymmetrical key pond
Technical field
The present invention relates to block chain field more particularly to the method for commerce of block chain.
Background technique
Block chain is a kind of completely new distributed basis framework and calculation paradigm, is stored using orderly linked data structure Data ensure data safety using cryptological technique using common recognition algorithm more new data.In the transaction based on block chain, really The privacy of the data safety and client of protecting transaction is the necessary condition that block chain can further develop.For this purpose, cryptological technique Especially public-key cryptographic keys are widely used in block chain.
As most people is understood, quantum computer has great potential in password cracking.Mainstream is non-now Symmetrically (public key) Encryption Algorithm, such as RSA cryptographic algorithms, it is most of to be all based in factorization or the finite field of big integer The two difficult math questions of the calculating of discrete logarithm.Their difficulty that cracks also is dependent on the efficiency solved these problems.Tradition On computer, it is desirable that solve the two difficult math questions, the cost time is the exponential time (to crack the time with the growth of public key length Increased with exponential), this is unacceptable in practical applications.It and is that your elegant algorithm for making to measure of quantum computer can be with In polynomial time (time is cracked as the growth of public key length is increased with the speed of k power, wherein k is long with public key Spend unrelated constant) carry out integer factorization or discrete logarithm and calculate, thus for RSA, discrete logarithm Encryption Algorithm it is broken Solution provides may.
Problem of the existing technology:
(1) corresponding private key, existing block chain counterparty are obtained quickly through public key due to quantum calculation function Method is easy to be cracked by quantum computer.
(2) in the prior art, the outputting and inputting for digital signature based on public and private key can be known to enemy, in quantum meter In the presence of calculation machine, it may be derived private key, block catenary system is caused to be cracked by quantum computer.
Summary of the invention
Based on this, it is necessary in view of the above-mentioned problems, providing a kind of anti-quantum calculation block chain based on unsymmetrical key pond Method of commerce, including a plurality of clients are stored with identical pool of keys, the quantum in the quantum key card of each user terminal configuration The key zone of key card is made of unsymmetrical key pond and unsymmetrical key two parts, wherein the unsymmetrical key pond is used for All client public key are stored, the unsymmetrical key is one's own side's private key, when transaction is initiated, initiates user terminal acquisition and receives user terminal Public key pointer random number and obtain being transferred to wallet address in conjunction with special algorithm, this is transferred to wallet address, transfers accounts and number and produces Amount information combination respective algorithms obtain the first particular value, and the initiation user terminal encrypts the first particular value generation and produces label Name;Wherein, by it is described produce amount information, number of transferring accounts, be transferred to wallet address, encryption produce signature, encryption it is truly random Number and the public key pointer random number for initiating user terminal have been signed as one trades and is uploaded to the network platform, and the encryption turns It signs out and signature generation is produced by the quantum key card generation true random number encryption in initiation user terminal;The encryption it is truly random Number true random number as described in the initiation user terminal private key encryption obtains.
Each of block chain node has matched quantum key card, and the side of issuing of quantum key card is quantum key The supervisor side of card, the generally administrative department of certain enterprise or public institution, the side of being awarded of quantum key card are quantum key card The member that is managed of supervisor side, generally employees at different levels of certain enterprise or public institution.User side in quantum key card is close Each of key is all downloaded from down the same quantum network service station, and for the supervisor side of the same quantum key card, issue The pool of keys stored in quantum key card is completely the same.Preferably, the pool of keys size stored in quantum key card can be with It is 1G, 2G, 4G, 8G, 16G, 32G, 64G, 128G, 256G, 512G, 1024G, 2048G, 4096G etc..Its capacity depends on master Requirement of the Guan Fang to safety, capacity is bigger, and safety is higher.
In the present invention, the key zone of quantum key card is by unsymmetrical key pond (public key) and unsymmetrical key (private key) two Part forms.Wherein, public key area possesses this public key for organizing all users, and private key area stores the private key of this user.
The storage mode of public key is as shown in Figure 3, the specific steps are as follows: takes public key pointer random number at random to some user Rk obtains public key pointer rkp in conjunction with specific public key pointer function frkp and from the correspondence position in corresponding unsymmetrical key pond Set the public key krk for being stored in the user.
Optionally, the reception user terminal has one or more, initiates user terminal using disclosed in each reception user terminal Public key pointer random number is accordingly transferred to wallet address to and in conjunction with special algorithm, and wherein special algorithm is hash algorithm.
Optionally, it is described produce amount information for one or more, initiate user terminal will respectively produce amount information respectively with It is transferred to wallet address, is transferred accounts and number and is produced amount information and combine and do corresponding operation and obtain one or more first particular values, Described in the algorithm of corresponding operation be hash algorithm.A kind of anti-quantum calculation block chain counterparty based on unsymmetrical key pond Method, including a plurality of clients are stored with identical pool of keys in the quantum key card of each user terminal configuration, when transaction is initiated, hair Rise user terminal by produce amount information, number of transferring accounts, be transferred to wallet address, encryption produce signature, encryption true random number and The public key pointer random number for initiating user terminal is uploaded to the network platform, the reception user of transaction verification as a transaction of having signed End extracts the public key pointer random number for initiating user terminal in conjunction with one's own side's pool of keys to be initiated user terminal public key and then extracts to produce Signature, the reception user terminal will obtain the first particular value using signature is produced described in the initiation user terminal public key decryptions, benefit Wallet address is transferred to respective algorithms calculating, produces amount information and number the second particular value of acquisition of transferring accounts, more described first Particular value and the second particular value realize transaction verification.
Optionally, the user terminal public key generation method of initiating includes: that will initiate the public key pointer random number knot of user terminal It closes public key pointer function and obtains public key pointer, extract corresponding public key from one's own side's unsymmetrical key pond using the public key pointer.
Optionally, the extracting method for producing signature includes: to initiate the true random number of encryption described in user terminal public key decryptions to obtain To true random number, the true random number decrypts producing for the encryption and signs and then obtain producing signature.
Optionally, for the amount information that produces for one or more, the reception user terminal will respectively produce amount information point Not to be transferred to wallet address, the number and producing of transferring accounts does corresponding operation to obtain one or more second specific in conjunction with amount information Value.
Optionally, be transferred to described in calculating wallet address, it is described transfer accounts number and produce amount information obtain the second particular value Algorithm it is identical as the algorithm that obtains first particular value is calculated, the reception user terminal first particular value and institute The second particular value size is stated, realizes transaction verification, wherein the algorithm is hash algorithm.
A kind of anti-quantum calculation block chain method of commerce based on unsymmetrical key pond, including a plurality of clients, each user Hold in the quantum key card of configuration and be stored with identical pool of keys, the key zone of the quantum key card by unsymmetrical key pond and Unsymmetrical key two parts composition, wherein the unsymmetrical key pond is for storing all client public key, the unsymmetrical key For one's own side's private key, step includes:
It initiates the user terminal transaction that will sign and is uploaded to the network platform, wherein amount information will be produced, number of transferring accounts, be transferred to Wallet address, encryption produce signature, encryption true random number and initiate user terminal public key pointer random number as one The signature that produces of signature transaction, the encryption produces signature by the quantum key card generation true random number encryption in initiation user terminal It generates;The true random number of encryption true random number as described in the initiation user terminal private key encryption obtains, wherein initiates user End obtains being transferred to wallet address by public key pointer random number combination special algorithm disclosed in user terminal is received, this is with being transferred to wallet Location transfers accounts and number and produces amount information combination respective algorithms and obtain the first particular value, the initiation user terminal encryption described the Signature is produced in the generation of one particular value;
Transaction is broadcast to all nodes of this block chain network;
Each node in block chain network verifies the transaction, wherein the reception user terminal of transaction verification will be sent out The public key pointer random number for playing user terminal is extracted in conjunction with one's own side's pool of keys to be initiated user terminal public key and then extracts to produce signature, institute The first particular value will be obtained using signature is produced described in the initiation user terminal public key decryptions by stating reception user terminal, utilize corresponding calculate Method calculating, which is transferred to wallet address, transfers accounts and number and produces amount information and obtain the second particular value, first particular value and the Two particular values realize transaction verification;
One block is formed to a transaction;
Block chain is added in new block;
Complete transaction.
The above-mentioned anti-quantum calculation block chain method of commerce based on unsymmetrical key pond, including a plurality of clients, each user It holds in the quantum key card of configuration and is stored with identical pool of keys, initiate the user terminal transaction that will sign and be uploaded to the network platform, The public key pointer random number for initiating user terminal is extracted in conjunction with one's own side's pool of keys and initiates user by the reception user terminal of transaction verification End public key extracts in turn produces signature, realizes transaction verification by producing signature.Public key is stored and disclosed using quantum key card, A possibility that quantum key card is independent hardware isolated equipment, and reduction steals key by Malware or malicious operation and then guarantor Corresponding private key is protected, the digital signature based on public and private key is further encrypted by random number key, and random number key is added by private key It is close, form the digital signature of encryption.Even if in the presence of quantum computer, it is also difficult to be derived private key.Therefore should Scheme is not easy to be cracked by quantum computer.
Detailed description of the invention
Fig. 1 is the process schematic provided in an embodiment of the present invention for generating transaction;
Fig. 2 is the process schematic of trading signature provided in an embodiment of the present invention;
Fig. 3 is wallet address generating process schematic diagram provided in an embodiment of the present invention;
Fig. 4 is public key storage mode flow chart provided in an embodiment of the present invention;
Fig. 5 is public key reading manner flow chart provided in an embodiment of the present invention
Specific embodiment
Block chain is a kind of data structure for sequentially in time forming data block with the mode of similar chained list, and with Cryptography mode guarantees to distort and the distributed decentralization account book that can not forge, can secure storage is simple, has elder generation Afterwards relationship, the data that can be verified in system.Wherein, cryptography mainly uses public key cryptography.This patent treatment region Process of exchange in block chain, general thought are to be substituted by disclosed public key in the prior art to be stored in unsymmetrical key pond Only to public key disclosed in quantum key card.
Embodiment 1
By user terminal A to for a transaction of user terminal B, wherein initiating user terminal is user terminal A, receiving user terminal is The specific steps of user terminal B, transaction are as shown in Figure 1, the specific steps are as follows:
Step 1: it initiates user terminal, that is, user terminal A and initiates transaction request: when initiating transaction, trade initiator, that is, user terminal A It needs to sign to transaction using the private key ka of oneself.
Step 1.1: obtain initiating the public key of user terminal:
As shown in Figure 2, the private key i.e. private key ka of user terminal A is produced in Fig. 2;Public key i.e. user terminal A is produced in Fig. 2 Public key kpa;
Public key kpa is obtained by the public key pointer random number rka of user terminal A, process is as shown in Figure 4, the specific steps are as follows:
Specific public key pointer function frkp is combined to obtain public key pointer rkp using the public key pointer random number rk of oneself, Then public key kp is taken out from the corresponding position in corresponding unsymmetrical key pond.Public key is generated by public key pointer random number rka to breathe out It is uncommon, regenerate the wallet address of A.
Step 1.2: it obtains producing signature and encrypt:
As shown in Fig. 2, the signature for producing signature i.e. user terminal A production in Fig. 2;The amount information that produces in Fig. 2 i.e. should Pen produces the information such as the ID to trade belonging to the amount of money;It is transferred to the wallet address i.e. wallet address of user terminal B in Fig. 2, if there is it His recipient then further includes the wallet address of other recipients;
The disclosed public key pointer random number rkb that user terminal A will receive user terminal by this transaction acceptance person passes through Hash algorithm obtains public key Hash, further obtains being transferred to wallet address, if there are also other recipients for this transaction, also Obtain the wallet address of other recipients.Certainly according to the design needs, the public key for receiving user terminal can be according to other this fields Other algorithms known to technical staff, which are calculated, further obtains being transferred to wallet address.User terminal A is (main to this transaction content Content is to transfer accounts number and to be transferred to wallet address, and produce amount information;It wherein produces amount information and shows the pen turn The source of the amount of money and legitimacy out specifically include the ID to trade belonging to this amount of money and during this amount of money trades belonging to it Serial number produces the amount of money so that all members can find in the historical record of block chain, to prove its legitimacy;Produce gold Volume information may include 1 or more and different produce amount of money source) it carries out Hash and obtains the first particular value H, reuse user The private key ka of end A encrypts the first particular value H and obtains producing signature, and similarly according to the design needs, initiating user terminal can be according to it He is skilled person will appreciate that other algorithms carry out this transaction content the first particular value is calculated.User terminal A matching Quantum key card in real random number generator generate true random number ksa, produce signature for encrypting, and with private key ka encryption True random number ksa.If produce amount information include more it is different produce amount of money source, more are turned using same procedure Out the amount of money respectively obtain 1 encryption produce signature.
Step 1.3: by produce amount information, number of transferring accounts, be transferred to wallet address, encryption produce signature, encryption it is true The transaction that random number k sa and the public key pointer random number rka for initiating user terminal have signed as one.
Step 2: transaction is broadcast to all nodes of this block chain network;
Step 3: each node in block chain network verifies the transaction;
During transaction verification, each node in block chain network can be used as verifying node.Verifying node passes through use The public key pointer random number rka of family end A obtains the public key kpa of A.
Wallet address, and the sheet with A is calculated to what public key pointer random number rka carried out that public key turns wallet in verifying node Wallet address corresponding to secondary turnover is compared, and if the same proves that wallet address is correct, otherwise the transaction verification loses It loses;Wherein wallet address sources corresponding to this turnover of A produce amount information in this, i.e., verifying node can be from this It is secondary to produce the affiliated historical trading for obtaining producing the amount of money in amount information, and read from the historical trading this transaction of A Wallet address corresponding to volume.Verifying node can be obtained truly random using the true random number of the public key kpa decryption encryption of user terminal A Number ksa, further obtains producing signature.Using the public key kpa decryption for initiating user terminal produce signature obtain transferring accounts number, produce Amount information and Hash H i.e. the first particular value for being transferred to wallet address, the Hash H ' i.e. second for calculating this transaction content are special Definite value, and the first particular value H and the second particular value H ' is compared, verifying is completed, if producing amount information includes more different Amount of money source is produced, then produces the corresponding encryption of the amount of money to more using same procedure and produces signature and verify.Its It is transferred to wallet address described in middle calculating and the number of transferring accounts obtains the algorithm of the second particular value and calculates and obtains first spy The algorithm of definite value is identical, is transferred to wallet address according to the design needs, described in calculating and the number of transferring accounts obtains the second particular value Algorithm be not limited to hash algorithm, as long as can calculate obtain characteristic value.
Step 4: multiple transaction form a block;
Step 5: block chain is added in new block;
Step 6: transaction is completed.
Using only to public key disclosed in quantum key card, and quantum key card storage of public keys is used, quantum key card is only Vertical hardware isolated equipment, a possibility that stealing key by Malware or malicious operation, substantially reduce.Due to quantum computer It is unable to get client public key, is then also unable to get corresponding private key, therefore the program is not easy to be cracked by quantum computer.Separately Outside, in the present invention, the digital signature based on public and private key is further encrypted by random number key, and random number key is added by private key It is close, form the digital signature of encryption.Even if in the presence of quantum computer, it is also difficult to be derived private key.Therefore should Scheme is not easy to be cracked by quantum computer.
Each technical characteristic of embodiment described above can be combined arbitrarily, for simplicity of description, not to above-mentioned reality It applies all possible combination of each technical characteristic in example to be all described, as long as however, the combination of these technical characteristics is not deposited In contradiction, all should be considered as described in this specification.
The embodiments described above only express several embodiments of the present invention, and the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the inventive concept of the premise, various modifications and improvements can be made, these belong to protection of the invention Range.Therefore, the scope of protection of the patent of the invention shall be subject to the appended claims.

Claims (9)

1. a kind of anti-quantum calculation block chain method of commerce based on unsymmetrical key pond, which is characterized in that including multiple users It holds, is stored with identical pool of keys in the quantum key card of each user terminal configuration, the key zone of the quantum key card is by non-right Claim pool of keys and unsymmetrical key two parts composition, wherein the unsymmetrical key pond is described for storing all client public key Unsymmetrical key is one's own side's private key, when transaction is initiated, initiates user terminal and obtains the public key pointer random number for receiving user terminal and tie It closes special algorithm to obtain being transferred to wallet address, this is transferred to wallet address, transfers accounts and number and produces amount information combination respective algorithms The first particular value is obtained, the initiation user terminal encrypts the first particular value generation and produces signature;Wherein, gold is produced by described Volume information, number of transferring accounts, the public key for producing signature, the true random number of encryption and initiation user terminal for being transferred to wallet address, encryption Pointer random number has been signed as one trades and is uploaded to the network platform, and the encryption produces signature by initiation user terminal Quantum key card generate true random number encryption produce signature generate;The true random number of the encryption is private by the initiation user terminal Key encrypts the true random number and obtains.
2. the anti-quantum calculation block chain method of commerce according to claim 1 based on unsymmetrical key pond, feature exist In the reception user terminal has one or more, and it is random using public key pointer disclosed in each reception user terminal to initiate user terminal Several to be accordingly transferred to wallet address to and in conjunction with special algorithm, wherein special algorithm is hash algorithm.
3. the anti-quantum calculation block chain method of commerce according to claim 1 based on unsymmetrical key pond, feature exist In, it is described produce amount information for one or more, initiate user terminal will respectively produce amount information respectively be transferred to wallet address, It transfers accounts and number and produces amount information and combine and do corresponding operation and obtain one or more first particular values, wherein the corresponding operation Algorithm be hash algorithm.
4. a kind of anti-quantum calculation block chain method of commerce based on unsymmetrical key pond, including a plurality of clients, each user terminal Identical pool of keys is stored in the quantum key card of configuration, when transaction is initiated, amount information will be produced, transfer accounts by initiating user terminal Number, the public key pointer random number work for producing signature, the true random number of encryption and initiation user terminal for being transferred to wallet address, encryption The network platform is uploaded to for a transaction of having signed, which is characterized in that the reception user terminal of transaction verification will initiate user terminal Public key pointer random number is extracted in conjunction with one's own side's pool of keys to be initiated user terminal public key and then extracts to produce signature, the reception user End will obtain the first particular value using signature is produced described in the initiation user terminal public key decryptions, be transferred to using respective algorithms calculating Amount information is produced and number of transferring accounts obtains the second particular value in wallet address, first particular value and second specific Value realizes transaction verification.
5. the anti-quantum calculation block chain method of commerce according to claim 4 based on unsymmetrical key pond, feature exist In the user terminal public key generation method of initiating includes: that will initiate the public key pointer random number combination public key pointer letter of user terminal Number obtains public key pointer, extracts corresponding public key from one's own side's unsymmetrical key pond using the public key pointer.
6. the anti-quantum calculation block chain method of commerce according to claim 5 based on unsymmetrical key pond, feature exist In the extracting method for producing signature includes: to initiate the true random number of encryption described in user terminal public key decryptions to obtain true random number, institute It states true random number and decrypts producing signature and then obtaining producing signature for the encryption.
7. the anti-quantum calculation block chain method of commerce according to claim 4 based on unsymmetrical key pond, feature exist In, it is described produce amount information for one or more, the reception user terminal will respectively produce amount information respectively be transferred to wallet Address transfers accounts and number and produces amount information and combine and do corresponding operation and obtain one or more second particular values.
8. the anti-quantum calculation block chain method of commerce according to claim 4 based on unsymmetrical key pond, feature exist In, be transferred to described in calculating wallet address, it is described transfer accounts number and produce amount information obtain the second particular value algorithm and calculating The algorithm for obtaining first particular value is identical, reception user terminal first particular value and second particular value Size realizes transaction verification, wherein the algorithm is hash algorithm.
9. a kind of anti-quantum calculation block chain method of commerce based on unsymmetrical key pond, including a plurality of clients, each user terminal It is stored with identical pool of keys in the quantum key card of configuration, the key zone of the quantum key card is by unsymmetrical key pond and non- Symmetric key two parts composition, wherein for storing all client public key, the unsymmetrical key is in the unsymmetrical key pond One's own side's private key, which is characterized in that step includes:
It initiates the user terminal transaction that will sign and is uploaded to the network platform, wherein amount information will be produced, number of transferring accounts, be transferred to wallet Address, the public key pointer random number for producing signature, the true random number of encryption and initiation user terminal encrypted have been signed as one The signature that produces of transaction, the encryption produces signature life by the quantum key card generation true random number encryption in initiation user terminal At;The true random number of encryption true random number as described in the initiation user terminal private key encryption obtains, wherein initiates user terminal Public key pointer random number combination special algorithm disclosed in user terminal will be received to obtain being transferred to wallet address, this is with being transferred to wallet Location transfers accounts and number and produces amount information combination respective algorithms and obtain the first particular value, the initiation user terminal encryption described the Signature is produced in the generation of one particular value;
Transaction is broadcast to all nodes of this block chain network;
Each node in block chain network verifies the transaction, wherein the reception user terminal of transaction verification will initiate to use The public key pointer random number at family end is extracted in conjunction with one's own side's pool of keys to be initiated user terminal public key and then extracts to produce signature, described to connect The first particular value will be obtained using signature is produced described in the initiation user terminal public key decryptions by receiving user terminal, utilize respective algorithms meter Calculation, which is transferred to wallet address, transfers accounts and number and produces amount information and obtain the second particular value, first particular value and second special Definite value realizes transaction verification;
One block is formed to a transaction;
Block chain is added in new block;
Complete transaction.
CN201811444511.7A 2018-11-29 2018-11-29 Anti-quantum computation block chain transaction method based on asymmetric key pool Active CN109670826B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811444511.7A CN109670826B (en) 2018-11-29 2018-11-29 Anti-quantum computation block chain transaction method based on asymmetric key pool

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811444511.7A CN109670826B (en) 2018-11-29 2018-11-29 Anti-quantum computation block chain transaction method based on asymmetric key pool

Publications (2)

Publication Number Publication Date
CN109670826A true CN109670826A (en) 2019-04-23
CN109670826B CN109670826B (en) 2020-11-17

Family

ID=66143402

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811444511.7A Active CN109670826B (en) 2018-11-29 2018-11-29 Anti-quantum computation block chain transaction method based on asymmetric key pool

Country Status (1)

Country Link
CN (1) CN109670826B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110365472A (en) * 2019-05-30 2019-10-22 如般量子科技有限公司 Quantum communications service station digital signature method based on unsymmetrical key pond pair, system
CN110545169A (en) * 2019-07-16 2019-12-06 如般量子科技有限公司 Block chain method and system based on asymmetric key pool and implicit certificate
CN110620668A (en) * 2019-08-09 2019-12-27 如般量子科技有限公司 Block chain-based quantum computation resistant public key pool updating method and system
CN111970130A (en) * 2020-10-21 2020-11-20 深圳职业技术学院 Quantum block chain establishment method and system
CN113765665A (en) * 2021-11-10 2021-12-07 济南量子技术研究院 Block chain network based on quantum key and data secure transmission method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357396A (en) * 2016-09-23 2017-01-25 浙江神州量子网络科技有限公司 Digital signature method, digital signature system and quantum key card
CN106790253A (en) * 2017-01-25 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Authentication method and device based on block chain
CN108235799A (en) * 2017-12-27 2018-06-29 深圳达闼科技控股有限公司 Block generation method, device, storage medium and block chain network
CN108566273A (en) * 2018-03-01 2018-09-21 如般量子科技有限公司 Identity authorization system based on quantum network
CN108737114A (en) * 2018-06-19 2018-11-02 天津中兴云链技术有限公司 A kind of endorsement method and device of the block catenary system based on quantum key distribution
CN108764874A (en) * 2018-05-17 2018-11-06 深圳前海微众银行股份有限公司 Anonymous refund method, system and storage medium based on block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106357396A (en) * 2016-09-23 2017-01-25 浙江神州量子网络科技有限公司 Digital signature method, digital signature system and quantum key card
CN106790253A (en) * 2017-01-25 2017-05-31 中钞信用卡产业发展有限公司北京智能卡技术研究院 Authentication method and device based on block chain
CN108235799A (en) * 2017-12-27 2018-06-29 深圳达闼科技控股有限公司 Block generation method, device, storage medium and block chain network
CN108566273A (en) * 2018-03-01 2018-09-21 如般量子科技有限公司 Identity authorization system based on quantum network
CN108764874A (en) * 2018-05-17 2018-11-06 深圳前海微众银行股份有限公司 Anonymous refund method, system and storage medium based on block chain
CN108737114A (en) * 2018-06-19 2018-11-02 天津中兴云链技术有限公司 A kind of endorsement method and device of the block catenary system based on quantum key distribution

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110365472A (en) * 2019-05-30 2019-10-22 如般量子科技有限公司 Quantum communications service station digital signature method based on unsymmetrical key pond pair, system
CN110545169A (en) * 2019-07-16 2019-12-06 如般量子科技有限公司 Block chain method and system based on asymmetric key pool and implicit certificate
CN110545169B (en) * 2019-07-16 2022-08-12 如般量子科技有限公司 Block chain method and system based on asymmetric key pool and implicit certificate
CN110620668A (en) * 2019-08-09 2019-12-27 如般量子科技有限公司 Block chain-based quantum computation resistant public key pool updating method and system
CN111970130A (en) * 2020-10-21 2020-11-20 深圳职业技术学院 Quantum block chain establishment method and system
CN111970130B (en) * 2020-10-21 2021-01-05 深圳职业技术学院 Quantum block chain establishment method and system
CN113765665A (en) * 2021-11-10 2021-12-07 济南量子技术研究院 Block chain network based on quantum key and data secure transmission method

Also Published As

Publication number Publication date
CN109670826B (en) 2020-11-17

Similar Documents

Publication Publication Date Title
US20230208627A1 (en) Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system
ES2687182T3 (en) Determine a common secret for the secure exchange of information and hierarchical and deterministic cryptographic keys
KR101999188B1 (en) Secure personal devices using elliptic curve cryptography for secret sharing
CN109670826A (en) Anti- quantum calculation block chain method of commerce based on unsymmetrical key pond
US20160191513A1 (en) Binding a data transaction to a person's identity using biometrics
CN114730420A (en) System and method for generating signatures
CN107666388A (en) Block chain information encryption method based on complete homomorphic cryptography method
US9438589B2 (en) Binding a digital file to a person's identity using biometrics
CN109510818A (en) Data transmission system, method, apparatus, equipment and the storage medium of block chain
CN107612934A (en) A kind of block chain mobile terminal computing system and method based on Secret splitting
CN107360002B (en) Application method of digital certificate
CN111342955B (en) Communication method and device and computer storage medium
CN109919611A (en) Anti- quantum calculation block chain method of commerce and system based on symmetric key pool server
CN109961276A (en) Digital cash wallet, method of commerce, transaction system and computer storage medium
CN109660345A (en) Anti- quantum calculation block chain method of commerce and system based on unsymmetrical key pool server
CN109978515A (en) A kind of Third Party Payment System method based on quantum multiple delegate Proxy Signature
CN109547461A (en) Anti- quantum calculation block chain secure transactions system and method based on P2P pool of symmetric keys
CN109495244A (en) Anti- quantum calculation cryptographic key negotiation method based on pool of symmetric keys
US20210158444A1 (en) Method and Apparatus for a Blockchain-Agnostic Safe Multi-Signature Digital Asset Management
CN109670827A (en) Anti- quantum calculation block chain method of commerce based on pool of symmetric keys
CN116232578A (en) Multi-party collaborative signature system, method and equipment integrating quantum key distribution
CN109861822A (en) A kind of method of controllable message transaction encryption in block catenary system
CN109784917A (en) Anti- quantum calculation block chain secure transactions system and method based on pool of symmetric keys
EP4231583A1 (en) Methods and arrangements for establishing digital identity
CN111429119B (en) Blockchain technology for encryption, payment, inquiry and submission of digital currency

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant