CN109672518A - The node data processing of the block chain of anti-quantum attack - Google Patents

The node data processing of the block chain of anti-quantum attack Download PDF

Info

Publication number
CN109672518A
CN109672518A CN201910157712.7A CN201910157712A CN109672518A CN 109672518 A CN109672518 A CN 109672518A CN 201910157712 A CN201910157712 A CN 201910157712A CN 109672518 A CN109672518 A CN 109672518A
Authority
CN
China
Prior art keywords
node
public key
block chain
hash digest
public
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910157712.7A
Other languages
Chinese (zh)
Other versions
CN109672518B (en
Inventor
郑东
高士瑶
郭瑞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Lingyidun Information Technology Co.,Ltd.
Original Assignee
Xian University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian University of Posts and Telecommunications filed Critical Xian University of Posts and Telecommunications
Priority to CN201910157712.7A priority Critical patent/CN109672518B/en
Publication of CN109672518A publication Critical patent/CN109672518A/en
Application granted granted Critical
Publication of CN109672518B publication Critical patent/CN109672518B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/002Countermeasures against attacks on cryptographic mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a kind of node data processing method of block chain, this method comprises: first node according to preset key schedule generate public-private key for signing to Transaction Information to and hash function, wherein, first node is any one node that transaction is initiated in block chain;The Transaction Information of this node is generated into Hash digest using the hash function;It is signed according to the private key of this node to the Hash digest, obtains Hash digest signature;The Transaction Information, Hash digest signature and public key ring are broadcast to the accounting nodes of block chain, so that the public key ring that the accounting nodes are broadcasted according to the first node verifies the Hash digest signature of first node, complete book keeping operation.Method provided by the present application can overcome the shortcomings of that existing block catenary system can not resist quantum attack, improve the ability of anti-quantum attack.

Description

The node data processing of the block chain of anti-quantum attack
Technical field
The present invention relates to block chain fields, more particularly, it is related to a kind of number of nodes of the block chain of anti-quantum attack According to processing method, equipment and storage medium.
Background technique
The conception for formally proposing that middle acute hearing can be traced back to 2008 about bit coin of block chain.It clever is set according to middle Thought is counted, bit coin is a kind of point-to-point digital cash of the building in P2P network.And bottom core of the block chain as bit coin Heart technology is a kind of distributed accounting system of decentralization.Because it can thoroughly change financing, supply chain and other transaction nets Imitation behavior during data circulate in system in network and the hot spot for becoming scholar and business research in recent years.
Block chain is a kind of completely new distributed basis framework and calculation paradigm, is a kind of distributed account book constructing technology, The distributed account book that can not be distorted, can not forge can be constructed in the system of decentralization, according to the maintenance of common recognition mechanism collective One authentic data library, and ensure the dynamic conformance of each possessed account book of node in system.Cryptological technique is as block The underlying security safeguards technique of catenary system, it is mainly real using hash function, Merkle tree, encryption and decryption technology and digital signature technology Now to the function of being linked between data integrity, data encryption, the proof of work of common recognition calculating, block.
Ensure block catenary system safety when, by coded communication technology guarantee data transmission procedure confidentiality and Integrality, while being also required to ensure credible (man-in-the-middle attack) of Correspondent Node, digital signature technology passes through verifying Correspondent Node Identity, and then ensure that the correctness of opposite end public key.Traditional block catenary system such as bit coin generallys use hash function SHA-256 realizes the signature to Transaction Information, although being able to verify that the correctness of communicating pair public key, guarantees the complete of message transmission Whole property, the identity for authenticating sender prevent the denial in transaction from occurring, but there is also can not legitimate user in protection system The problem of privacy information.
Classical public key encryption algorithm, Digital Signature Algorithm and ring signatures algorithm is by based on number theory difficult problem mostly Public key algorithm generate, intractability, DSA signature algorithm such as RSA Algorithm based on factoring problem be based on discrete logarithm problem Intractability etc..Classic computer cannot effectively solve these number theory difficult problems, its safety is made to be guaranteed.But with close Year over the appearance of quantum computer and the appearance of quantum algorithm so that its security facing huge challenge.Currently, available Mainly there are Shor algorithm and Grover algorithm in the quantum algorithm that cryptographic algorithm is decoded.Shor algorithm can be to being currently widely used RSA, ElGamal, ECC public key algorithm effectively attacked;And Grover algorithm can halve the length of key, Attacker's attack cost is greatly improved.Therefore, it is configured to resist the block catenary system of quantum attack not only to block Chain theory and application research is of great immediate significance, while there is also very big research spaces.
Summary of the invention
Implementation method of the present invention provides node data processing method, equipment and the storage of a kind of block chain of anti-quantum attack Medium overcomes the shortcomings of that existing block catenary system can not resist quantum attack.
Embodiment of the present invention in a first aspect, providing a kind of node data processing side of the block chain of anti-quantum attack Method, comprising: first node generates the public-private key pair for signing to Transaction Information according to preset key schedule And hash function, wherein first node is any one node that transaction is initiated in block chain;First node is by the friendship of this node Easy information generates Hash digest using the hash function;First node carries out the Hash digest according to the private key of this node Signature obtains Hash digest signature;The Transaction Information, Hash digest signature and public key ring are broadcast to area by first node The accounting nodes of block chain, so that the public key ring that the accounting nodes are broadcasted according to the first node plucks the Hash of first node It signs and is verified, complete book keeping operation.
The second aspect of embodiment of the present invention provides a kind of computer equipment, including memory and processor, wherein The memory, is stored with computer instruction;The processor is configured to execute the computer instruction so that the computer Equipment executes method described in first aspect.
The third aspect of embodiment of the present invention provides a kind of computer-readable non-volatile memory medium, deposits thereon Computer instruction is contained, method described in first aspect is realized when the computer instruction is executed by processor.
Detailed description of the invention
Fig. 1 shows the flow diagram of the node data processing method of the block chain of embodiment according to the present invention, Node Processing Method relates generally to processing of transferring accounts of trading.
Fig. 2 shows the flow diagram of the node data processing method of the block chain of embodiment according to the present invention, Node Processing Method relates generally to secure communication processing.
Fig. 3 shows the flow diagram of the block chain node data processing of anti-quantum attack.
Fig. 4 shows the flow diagram of the block chain node data processing of anti-quantum attack.
Fig. 5 shows the schematic diagram of public key ring signatures.
Fig. 6 shows the structural schematic diagram of the computer equipment of embodiment according to the present invention.
Specific embodiment
It is described in detail to various aspects of the present invention below in conjunction with the drawings and specific embodiments.Wherein, many institute's weeks Module, unit and its mutual connection, link, communication or the operation known are not shown or do not elaborate.Also, institute Feature, framework or the function of description can combine in any way in one or more embodiments.Those skilled in the art Member is it should be appreciated that following various embodiments are served only for the protection scope for example, and is not intended to limit the present invention.May be used also To be readily appreciated that, module or unit or processing mode in each embodiment described herein and shown in the drawings can by it is various not It is combined and designs with configuration.
The technical problem to be solved in the present invention is that overcoming the shortcomings of that existing block catenary system can not resist quantum attack, mention The block catenary system of quantum attack can be resisted for one kind.In order to solve the above technical problems, major programme of the invention is as follows: In one block catenary system, each node users call specific key schedule, obtain corresponding public-private key pair, lead to Cross the anti-quantum attack for realizing using public key algorithm and ring signatures algorithm based on coding and communicating and trade in block chain Characteristic.
The process that the node data processing method of the block chain of embodiment according to the present invention is shown referring to Fig. 1, Fig. 1 is shown It is intended to.Node Processing Method shown in FIG. 1 relates generally to processing of transferring accounts of trading, this method can include: step S101, step S102, step S103 and step S104, wherein step S101, counterpart keys generate, step S102, and corresponding Hash generates, step S103, corresponding signature step, step S104, corresponding verification processing.Above-mentioned step is carried out below with reference to specific embodiment Explanation.
S101, first node are generated according to preset key schedule for carrying out public signature key-private to Transaction Information Key to and hash function, wherein first node be block chain in initiate transaction any one node.
Include multiple nodes in block catenary system, can be in communication with each other between these nodes, first node can be block Any one in chain node initiates the node of transaction, for example, being properly termed as node of transferring accounts.
In certain embodiments of the present invention, each node calls specific key schedule in block catenary system, Corresponding public-private key pair is obtained, by using public key algorithm and ring signatures algorithm based on coding, is realized in block chain The anti-quantum of middle communication and transaction attacks characteristic.
In embodiments of the present invention, first node is generated according to preset key schedule for Transaction Information The public-private key signed to and hash function include: using probabilistic polynomial time algorithm generate public-private key to and breathe out Uncommon function, public key and private key are to other than it can sign to Transaction Information, can be also used between two nodes Secret communication provides safety assurance.Wherein, probabilistic polynomial time algorithm is a classification of key schedule, and the key is raw It is a kind of probabilistic polynomial time algorithm at algorithm.In some specific embodiments, key schedule may include following 7 Step:
(1) first node determines that the k for correcting t bit-errors ties up binary Goppa code Ci, code length n=2m, wherein t, k, i, n and m For positive integer and n is greater than k, and i is number of the first node in block chain node;
(2) binary Goppa code C is determinediCorresponding check matrixAnd syndrome decoding algorithm
(3) the random invertible matrix V of binary of (n-k) × (n-k) is determinediWith the binary random permutation matrix P of n × ni
(4) one-way Hash function h () is determined;
(5) it calculatesHi is the random invertible matrix V of the binaryi, check matrixIt is set at random with binary Change matrix PiProduct;
(6) public-private key pair is generatedWherein PK is public key, and SK is Private key;
(7) system public parameter (t, C are generatedi, Hi, h ()), wherein t is the digit corrected, CiIt is the first of i for number The binary Goppa code of node, HiFor the public key for the first node that number is i, h is one-way Hash function.
Goppa code in step (1) is a kind of special linear block codes, and some Goppa codes meet following formula: n= 2m;K=n-mt;Goppa code can carry out efficient coding, and Goppa code can be used as secret trap door information, may be implemented unidirectional Trapdoor algorithm, to construct public key encryption and signature algorithm.
One-way Hash function is safe one-way Hash function in above-mentioned steps.Those skilled in the art can choose known Any one one-way Hash function of meet demand, embodiment of the present invention do not limit this.
The system public parameter generated in above-mentioned steps (7), is that first node is disclosed to other nodes of block catenary system Parameter, other nodes in block chain are available to arrive these disclosed parameters.
It in certain embodiments of the present invention, can be it for the public key generated by above-mentioned key schedule Wallet address is generated, and other nodes that the wallet address corresponds to block chain are disclosed.
The Transaction Information of this node is generated Hash digest using the hash function by S102, first node.
In embodiments of the present invention, the Transaction Information of this node can be relevant Transaction Information of transferring accounts.These are handed over Easy information M can generate Hash digest by the one-way Hash function generated in step S101.For example, following public affairs can be used Formula (1) is completed:
T=h (M) (1)
Wherein, T is Hash digest, and M is Transaction Information.
S103, first node sign to the Hash digest according to the private key of this node, obtain Hash digest signature.
Ring signatures technology is as a kind of special group ranking, it does not have trusted party, not the establishment process of group, for testing Signer is full energy matries for card person.Ring signatures provide a kind of ingenious method that anonymity betrays the pot to the roses, and apply in block It can effectively ensure that the privacy information of user in catenary system.The anonymization of transaction is thoroughly realized using ring signatures technology, is protected The privacy information of user in system.
In certain embodiments of the present invention, step S103 may include that first node selects some public key ring sequence Column, which is a subset of all ring members, specifically, may include following step:
(1031) word is randomly choosedCalculate initial ring sequenceSuch as Fig. 4 Shown, wherein q=0,1,2 ..., L are the numbers of word in public key ring, and L is the sum of word in public key ring,Represent two element field On (n-k) dimensional vector, n be Goppa code length, k be Goppa code dimension;
(1032) forwarding ring sequence is generated, to i=r+1 ..., l-1,0,1 ..., r-1, randomly chooses word (Hamming weight t) is calculatedAs shown in Figure 4, whereinIndicate exclusive or Operation;
(1033) it is calculated using trapdoor functionSo thatSearch so thatEnergy The minimum value of the q enough decoded
(1034) it calculates in the space for the word that weight is predetermined valueIndex Wherein i1< i2< ... < iqIt is defined asNonzero digit position;
(1035) it selects preset value (for example, 0) as glue value, enables Then the signature of Hash digest isAs shown in Figure 4.
In the string number (i.e. vector) that Hamming weight is only 0 and 1 in above-mentioned steps, 1 number.
Trapdoor function in step (1033) can be known to the skilled in the art one of a variety of trapdoor functions, Embodiment of the present invention does not limit this.
In step (1034) and (1035), predetermined value can be 9, that is to say, that can choose the sky for the word that weight is 9 Between index.Represent combinatorial formulaFor example: assuming thatIts Hamming weight is 3, non-zero The position of position is first, third position, the 5th (being zero-bit first respectively from left to right ...), i.e. i1=1, i2=3, iq =i3=5, so It isSimplify indicate.
Glue value can refer to known value, because needing to use formula when verifying signature Only known siValue could calculate si+1Value, can choose s0Value be used as known to push away It leads, in some embodiments, it is also possible to select other values.
The Transaction Information, Hash digest signature and the public key ring are broadcast to area by step S104, first node The accounting nodes of block chain, so that the public key ring that the accounting nodes are broadcasted according to the first node plucks the Hash of first node It signs and is verified, complete book keeping operation.
In embodiments of the present invention, first node, i.e. sending node, by what is generated in Transaction Information M, step 1035 The Hash digest of Transaction Information M is signedIt is carried out with the forwarding ring that step 1032 generates After encapsulation is packaged, the accounting nodes of block chain are broadcast to, for example, miner.
Accounting nodes receive the data that Transaction Information M, Hash digest signature sigma and public key ring are packaged, and are verified.Book keeping operation Node can be any one node of block catenary system.In some embodiments, the verification process of accounting nodes can include: From the index of Hash digest signature sigmaMiddle recovery zi;Then it calculatesJudge sl=s0It is whether true;If sl=s0At Vertical, then miner is verified, and beneficiary receives transfer amounts, otherwise authentication failed, transaction failure.
The node security transaction processing method for the block chain that embodiment of the present invention provides, the private key pair of each node users Transaction Information is signed, and public key is used to verify trading signature, and generates wallet address for public key.Transaction initiator, i.e., Node of transferring accounts calculates initial ring sequence s in signatureR+1, qWith forwarding ring sequence sI+1, qWhen using node users oneself randomly choose Public key ring sequence L, by oneself private key and public key ring sequence L complete signature, thus conceal transaction initiator identity Information achievees the purpose that anonymous deal.At the same time, miner receive broadcast come comprising Transaction Information, Hash digest signature and When forwarding the data packet of ring sequence, signature authentication is carried out using public key ring.If being verified, can only illustrate it is certain in public key ring The transaction of owner's signature of one public key, and can not determine that transaction is initiated by which node, to solve transaction section The data-privacy problem of point.Transaction Information is recorded in new block by miner after being verified, and beneficiary receives transfer amounts, Transaction is completed.
In the block catenary system of embodiment of the present invention, Node Processing Method is in addition to may include above-mentioned Transaction Information Except processing, it may also include the secret communication between node two-by-two.At the block chain node data that embodiment of the present invention provides Reason includes two aspect of trading processing and secure communication between node.Communication between two nodes may include initializing The reception and decryption of journey, message sending node to the encryption and transmission, message recipient node of message to message.Specifically, such as Shown in Fig. 2, it may include step S201, corresponding first node encrypting step, step S202, corresponding second node decryption step.Under Face is in conjunction with specific embodiments illustrated above-mentioned steps.
Step S201, first node receive the public key that second node is sent, and are added according to the received public key of institute to message It is close, encryption message is obtained, sends the second node for the encryption message.The second node uses the second node The encryption message is decrypted in private key.Wherein, first node can be message sending node, and second node can be message Receiving node, for example, it may be other any one nodes in block catenary system other than message sending node.
In some embodiments, first node encrypts message according to the received public key of institute, obtains encryption message Can include: first node message m to be sent is divided into the n-dimensional vector that Hamming weight is tIts In, φN, t() shows a kind of transformation,Represent the n-dimensional vector on two element field;Encryption message is determined according to following formula (2) (i.e. ciphertext) s:
S=HBeT (2)
Wherein, HBFor the public key of second node, eTFor the transposition of the n-dimensional vector.
Step S202, the encryption message that second node sends first node using the private key of the node itself, i.e. ciphertext, It is decrypted.Specifically, can include: the private key of message recipient node B (corresponding second node) oneself isIt calculatesIt is translated with decoding algorithm CodeThen clear-text message is Generation Table is to (VB -1S) it is decoded, decoding result is I.e. explanation can be with by this decipherment algorithm It is recovered in plain text by ciphertext.It should be noted that those skilled in the art can choose known any decoding algorithm, this Invention embodiment does not limit this.
The block chain node data processing method that embodiment of the present invention provides can resist quantum attack, each node The private key of user is used to solve confidential information or sign to Transaction Information, and public key is used to encryption information and verifying transaction label Name, and wallet address is generated by public key.Transaction initiator, that is, node of transferring accounts calculate initial ring sequence and forwarding ring in signature Node users oneself randomly selected public key ring L is used when sequence, and signature is completed by the private key and public key ring L of oneself, thus The identity information for concealing transaction initiator, achievees the purpose that anonymous deal.At the same time, miner receives the data packet that broadcast comes When, signature authentication is carried out using public key ring.If being verified, can only illustrate be some public key in public key ring owner's label The transaction of administration, and can not determine that transaction is initiated by which node, to solve the problems, such as the data-privacy of transaction node.Mine Transaction Information is recorded in new block by work after being verified, and beneficiary receives transfer amounts, and transaction is completed.
It should be noted that all node users are in the same ring in the block catenary system of anti-quantum attack, And the characteristics of ring signatures meet spontaneity and anonymity, this is also the block catenary system of anti-quantum attack just.Its spontaneity To say, in the block catenary system of anti-quantum attack, can increase at any time or change system in node users, and each section Point user is the member in ring.The public key of node users discloses in systems, as long as each node is random when initiating transaction One group of public key ring is selected, is signed further according to the private key of oneself, can realize the anonymity of signature, to realize anonymous turn Account.
In the block catenary system of anti-quantum attack, above-mentioned secret communication and transaction transfer procedure are using based on coding Public key algorithm, can guarantee data confidentiality, transaction anonymity while resist quantum attack.
The block chain node communication processing method that embodiment of the present invention provides, has used the public key encryption based on coding to calculate Method resists quantum attack, and the communication information is carried out by message sender using the public key of recipient's node users when inter-node communication The node users of encryption based on coding, message receiver are checked using the private key decryption of oneself, ensure that in rear quantum environment The confidentiality of information in lower block catenary system.
To resist quantum attack, the ring signatures algorithm based on coding is also used in block catenary system, node of transferring accounts exists Using the ring signatures algorithm based on coding when signing to Transaction Information, miner is carried out by the public key ring for node offer of transferring accounts Verifying, ensure that the privacy of the both parties in block catenary system under rear quantum environment.
Fig. 3 and Fig. 4 respectively illustrates the process of block chain node data processing, wherein process shown in Fig. 3 pays close attention to two Message communicating between node, Fig. 4 pay close attention to the trading processing between two nodes.
As shown in figure 3, node A first and node B just calls key raw when the block catenary system of anti-quantum attack is added At algorithm, the public-private key pair of oneself is obtained;Node A is using the public key of node B according to the Encryption Algorithm based on coding to message Encrypting and transmitting gives node B;Node B decrypts cipher-text message according to the decipherment algorithm based on coding using the private key of oneself, reads It wins the confidence breath.Due in communication process use the cryptographic algorithm based on coding so that message under the calculation power of quantum computer according to So there is confidentiality.
Node A initiates the process of transaction, as shown in figure 4, being described in detail below: all anti-first including node A The block chain node of quantum attack calls key schedule, obtains the public-private key pair of oneself, is generated accordingly by public key Location;Node A handles Transaction Information using hash function, generates Hash digest;Node A randomly chooses public key ring to transaction The Hash digest of information carries out anonymity signature;Node A is by Transaction Information, the Hash digest of the Transaction Information and the label of Hash digest Name is packaged, and broadcasts to all miners in block catenary system;Miner in system keeps accounts according to power is calculated, and finally can only There is a miner to obtain book keeping operation power, is tested as miner B signs to it using the public key ring that node A is sent after obtaining book keeping operation power Card;It trades if being verified success, beneficiary receives transfer amounts, completes the process of anonymous deal.Due in process of exchange Ring signatures algorithm of the middle use based on coding, the process of ring signatures is as shown in figure 5, make block catenary system in the ring of quantum calculation Still meet anonymity under border.
In conclusion the node data processing method for the block chain that embodiment of the present invention provides, by leading between node Using the public key algorithm based on coding when letter and transaction, to realize the block chain number of nodes that can resist quantum attack According to processing.The algorithm being related in the present invention can satisfy security requirement, and the system has nodal information full energy matries Feature.
Embodiment of the present invention also provides a kind of computer equipment.As shown in fig. 6, computer equipment 600 includes memory 601 and processor 602, wherein the memory is stored with computer instruction;The processor is configured to execute the calculating Machine instructs so that the computer equipment executes node data processing method recited above.
Embodiment of the present invention also provides a kind of computer-readable non-volatile memory medium, is stored thereon with computer Instruction, the computer instruction realize node data processing method recited above when being executed by processor.Wherein, the machine Readable storage medium may be embodied in the storage medium on first kind node, and may include the storage on the second class node Medium.In block catenary system, these storage mediums are non-volatile storage mediums.
Through the above description of the embodiments, those skilled in the art can be understood that the present invention can be by The mode of software combination hardware platform is realized.Based on this understanding, technical solution of the present invention makes tribute to background technique That offers can be embodied in the form of software products in whole or in part, which can store is situated between in storage In matter, such as ROM/RAM, magnetic disk, CD, including some instructions use is so that a computer equipment (can be individual calculus Machine, server, smart phone or network equipment etc.) it executes described in certain parts of each embodiment of the present invention or embodiment Method.
Term and wording used in description of the invention are just to for example, be not intended to constitute restriction.Ability Field technique personnel should be appreciated that under the premise of not departing from the basic principle of disclosed embodiment, to above embodiment In each details can carry out various change.Therefore, the scope of the present invention is only determined by claim, in the claims, unless It is otherwise noted, all terms should be understood by the broadest reasonable meaning.

Claims (9)

1. a kind of node data processing method of the block chain of anti-quantum attack characterized by comprising
First node according to preset key schedule generate public-private key for signing to Transaction Information to and breathe out Uncommon function, wherein first node is any one node that transaction is initiated in block chain;
The Transaction Information of this node is generated Hash digest using the hash function by first node;
First node signs to the Hash digest according to the private key of this node, obtains Hash digest signature;
The Transaction Information, Hash digest signature and public key ring are broadcast to the accounting nodes of block chain by first node, with Toilet is stated the public key ring that accounting nodes are broadcasted according to the first node and is verified to the Hash digest signature of first node, complete At book keeping operation.
2. the method according to claim 1, wherein the first node is raw according to preset key schedule At the public-private key for signing to Transaction Information to and hash function include:
First node determines that the k for correcting t bit-errors ties up binary Goppa code Ci, code length n=2m, wherein t, k, i, n and m are positive whole Number and n are greater than k, and i is number of the first node in block chain node;
Determine binary Goppa code CiCorresponding check matrixAnd syndrome decoding algorithm
Determine the random invertible matrix V of binary of (n-k) × (n-k)iWith the binary random permutation matrix P of n × ni
Determine one-way Hash function h;
It calculatesHiFor the random invertible matrix V of the binaryi, check matrixWith binary random permutation matrix Pi Product;
Public-private key is generated to PKi=Hi,Wherein PK is public key, and sK is private key;
Generate system public parameter (t, Ci, Hi, h), wherein t is the digit corrected, CiFor the binary for the first node that number is i Goppa code, HiFor the public key for the first node that number is i, h is one-way Hash function.
3. according to the method described in claim 2, it is characterized in that, the Transaction Information of this node is used institute by the first node It states hash function and generates Hash digest, comprising:
The Transaction Information M of this node is generated Hash digest T=h (M) using the one-way Hash function h by first node.
4. according to the method described in claim 3, it is characterized in that, the private key according to this node is to the Hash digest It signs, comprising:
First node randomly chooses wordIt calculatesWherein q=0,1,2 ..., L is the number of word in public key ring, and L is the sum of word in public key ring,(n-k) dimensional vector on two element field is represented, n is The code length of Goppa code, k are the dimension of Goppa code;
First node generates forwarding ring sequence, to i=r+1 ..., l-1,0,1 ..., r-1, randomly chooses wordMeter It calculatesWherein,Indicate XOR operation;
First node is calculated using trapdoor functionSo thatSearch so thatIt can The minimum value of the q of decoding
First node calculates in the space for the word that weight is predetermined valueIndex Wherein i1< i2< ... < iqIt is defined asNonzero digit position;
First node selects preset value as glue value, enables Then the signature of Hash digest is
5. according to the method described in claim 4, it is characterized in that, which comprises
First node receives the public key that second node is sent, and is encrypted according to the received public key of institute to message, obtains encryption and disappear Breath, sends the second node for the encryption message, so that the second node uses the private key of the second node to institute Encryption message is stated to be decrypted.
6. according to the method described in claim 5, it is characterized in that, described encrypt message according to the received public key of institute, Obtaining encryption message includes:
Message m is divided into the n-dimensional vector that Hamming weight is t
Wherein, φN, t() shows a kind of transformation, and F isRepresent the n-dimensional vector on two element field;
Encryption message is determined according to following formula:
S=HBeT
Wherein, HBFor the public key of second node, eTFor the transposition of the n-dimensional vector.
7. according to claim 1 to method described in 6, which is characterized in that the method also includes:
First node is the public key generation wallet address of the first node, and by the wallet address to other nodes of block chain It is open.
8. a kind of computer equipment, including memory and processor, wherein
The memory, is stored with computer instruction;
The processor is configured to execute the computer instruction so that the computer equipment perform claim requires described in 1 to 7 Method.
9. a kind of computer-readable non-volatile memory medium is stored thereon with computer instruction, the computer instruction quilt Method described in claims 1 to 7 is realized when processor executes.
CN201910157712.7A 2019-03-02 2019-03-02 Node data processing of quantum attack resistant blockchains Active CN109672518B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910157712.7A CN109672518B (en) 2019-03-02 2019-03-02 Node data processing of quantum attack resistant blockchains

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910157712.7A CN109672518B (en) 2019-03-02 2019-03-02 Node data processing of quantum attack resistant blockchains

Publications (2)

Publication Number Publication Date
CN109672518A true CN109672518A (en) 2019-04-23
CN109672518B CN109672518B (en) 2022-04-12

Family

ID=66151908

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910157712.7A Active CN109672518B (en) 2019-03-02 2019-03-02 Node data processing of quantum attack resistant blockchains

Country Status (1)

Country Link
CN (1) CN109672518B (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110222537A (en) * 2019-06-17 2019-09-10 北京艾摩瑞策科技有限公司 Verification method and device applied to block chain link
CN110490610A (en) * 2019-07-25 2019-11-22 西安邮电大学 A kind of community management system based on block chain
CN110602077A (en) * 2019-09-03 2019-12-20 成都信息工程大学 Quantum block chain network anonymous election method and system based on trust evaluation
CN111242418A (en) * 2019-12-30 2020-06-05 航天信息股份有限公司 Electronic currency accounting method and system for grain circulation process
CN111414428A (en) * 2020-04-24 2020-07-14 远光软件股份有限公司 Data merging and offsetting method based on block chain
CN111478907A (en) * 2020-04-08 2020-07-31 杭州复杂美科技有限公司 Anti-attack method, equipment and storage medium for parallel chain private transaction
CN111737367A (en) * 2020-07-24 2020-10-02 国网区块链科技(北京)有限公司 Chain network fused distributed energy station information processing method and device
CN111885512A (en) * 2020-07-10 2020-11-03 全链通有限公司 Method for acquiring block chain reward by micro base station, accounting node, micro base station and medium
CN112532656A (en) * 2021-02-07 2021-03-19 腾讯科技(深圳)有限公司 Block chain-based data encryption and decryption method and device and related equipment
CN112560091A (en) * 2020-12-17 2021-03-26 北京百度网讯科技有限公司 Digital signature method, signature information verification method, related device and electronic equipment
CN112600803A (en) * 2020-12-02 2021-04-02 上海哔哩哔哩科技有限公司 Web end data signature method and device and computer equipment
CN112651837A (en) * 2021-01-07 2021-04-13 上海能链众合科技有限公司 Block chain information interaction method based on cross-chain
CN112651835A (en) * 2020-12-30 2021-04-13 成都佳华物链云科技有限公司 Alliance chain transaction method and device, electronic equipment and storage medium
CN113098691A (en) * 2021-03-25 2021-07-09 北京百度网讯科技有限公司 Digital signature method, signature information verification method, related device and electronic equipment
CN113240418A (en) * 2021-04-23 2021-08-10 上海和数软件有限公司 Intelligent private data access control method and equipment based on block chain
CN113378187A (en) * 2021-05-11 2021-09-10 广西电网有限责任公司电力科学研究院 Intelligent power grid data query method and system based on Internet of things
CN113407975A (en) * 2021-07-20 2021-09-17 北京百度网讯科技有限公司 Digital signature method, signature information verification method, related device and electronic equipment
CN113489743A (en) * 2021-07-26 2021-10-08 广东辰宜信息科技有限公司 Consensus realization method and device applied to block chain system
CN114157431A (en) * 2021-10-27 2022-03-08 上海朝夕网络技术有限公司 Block chain transaction processing method based on multivariate signature method and computer equipment
CN114629663A (en) * 2022-05-12 2022-06-14 武汉和悦数字科技有限公司 Block chain-based digital commodity transaction method and device
CN115297118A (en) * 2022-10-09 2022-11-04 北京航空航天大学杭州创新研究院 Data sharing method and data sharing system based on block chain
CN115348114A (en) * 2022-10-19 2022-11-15 浙江浩普智能科技有限公司 Intelligent power plant data safety transmission method and system, electronic equipment and medium
CN115567929A (en) * 2022-09-22 2023-01-03 景德镇陶瓷大学 Key management method and device, electronic equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411503A (en) * 2016-11-28 2017-02-15 中国银行股份有限公司 Accounting method, accounting system, voting node and accounting node under block chain voting and accounting mode
CN106559211A (en) * 2016-11-22 2017-04-05 中国电子科技集团公司第三十研究所 Secret protection intelligence contract method in a kind of block chain
CN106779704A (en) * 2016-12-06 2017-05-31 杭州趣链科技有限公司 A kind of block chain anonymous deal method based on ring signatures
CN107453870A (en) * 2017-09-12 2017-12-08 京信通信系统(中国)有限公司 Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain
CN108768652A (en) * 2018-06-06 2018-11-06 杭州趣链科技有限公司 It is a kind of can the attack of anti-quantum alliance's block chain bottom encryption method
CN108900298A (en) * 2018-07-11 2018-11-27 长春大学 Privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark
CN109086626A (en) * 2018-08-09 2018-12-25 全链通有限公司 The bookkeeping methods and system of block chain network
CN109274502A (en) * 2018-11-02 2019-01-25 克洛斯比尔有限公司 The creation method of public key encryption and key signature, equipment and readable storage medium storing program for executing
WO2019033088A1 (en) * 2017-08-11 2019-02-14 ALTR Solutions, Inc. Immutable datastore for low-latency reading and writing of large data sets

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106559211A (en) * 2016-11-22 2017-04-05 中国电子科技集团公司第三十研究所 Secret protection intelligence contract method in a kind of block chain
CN106411503A (en) * 2016-11-28 2017-02-15 中国银行股份有限公司 Accounting method, accounting system, voting node and accounting node under block chain voting and accounting mode
CN106779704A (en) * 2016-12-06 2017-05-31 杭州趣链科技有限公司 A kind of block chain anonymous deal method based on ring signatures
WO2019033088A1 (en) * 2017-08-11 2019-02-14 ALTR Solutions, Inc. Immutable datastore for low-latency reading and writing of large data sets
CN107453870A (en) * 2017-09-12 2017-12-08 京信通信系统(中国)有限公司 Mobile terminal authentication management method, device and corresponding mobile terminal based on block chain
CN108768652A (en) * 2018-06-06 2018-11-06 杭州趣链科技有限公司 It is a kind of can the attack of anti-quantum alliance's block chain bottom encryption method
CN108900298A (en) * 2018-07-11 2018-11-27 长春大学 Privately owned block chain honesty entity authentication cut-in method based on quantum cryptography watermark
CN109086626A (en) * 2018-08-09 2018-12-25 全链通有限公司 The bookkeeping methods and system of block chain network
CN109274502A (en) * 2018-11-02 2019-01-25 克洛斯比尔有限公司 The creation method of public key encryption and key signature, equipment and readable storage medium storing program for executing

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
WEI YIN ECT.: "An Anti-Quantum Transaction Authentication Approach in Blockchain", 《DIGITAL OBJECT IDENTIFIER 10.1109》 *
王倩,任方,郑东: "基于Goldwasser-Micali加密算法的安全子集计算", 《计算机应用研究》 *
王子钰,刘建伟,张宗洋,喻辉: "基于聚合签名与加密交易的全匿名区块链", 《计算机研究与发展》 *
王玉珏等: "云存储完整性验证密码学技术研究进展", 《信息安全学报》 *

Cited By (34)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110222537A (en) * 2019-06-17 2019-09-10 北京艾摩瑞策科技有限公司 Verification method and device applied to block chain link
CN110490610A (en) * 2019-07-25 2019-11-22 西安邮电大学 A kind of community management system based on block chain
CN110602077A (en) * 2019-09-03 2019-12-20 成都信息工程大学 Quantum block chain network anonymous election method and system based on trust evaluation
CN111242418A (en) * 2019-12-30 2020-06-05 航天信息股份有限公司 Electronic currency accounting method and system for grain circulation process
CN111242418B (en) * 2019-12-30 2024-06-07 航天信息股份有限公司 Electronic money accounting method and system in grain circulation process
CN111478907A (en) * 2020-04-08 2020-07-31 杭州复杂美科技有限公司 Anti-attack method, equipment and storage medium for parallel chain private transaction
CN111478907B (en) * 2020-04-08 2022-03-04 杭州复杂美科技有限公司 Anti-attack method, equipment and storage medium for parallel chain private transaction
CN111414428A (en) * 2020-04-24 2020-07-14 远光软件股份有限公司 Data merging and offsetting method based on block chain
CN111885512A (en) * 2020-07-10 2020-11-03 全链通有限公司 Method for acquiring block chain reward by micro base station, accounting node, micro base station and medium
CN111737367A (en) * 2020-07-24 2020-10-02 国网区块链科技(北京)有限公司 Chain network fused distributed energy station information processing method and device
CN112600803A (en) * 2020-12-02 2021-04-02 上海哔哩哔哩科技有限公司 Web end data signature method and device and computer equipment
CN112600803B (en) * 2020-12-02 2022-07-19 上海哔哩哔哩科技有限公司 Web end data signature method and device and computer equipment
CN112560091B (en) * 2020-12-17 2021-07-13 北京百度网讯科技有限公司 Digital signature method, signature information verification method, related device and electronic equipment
CN112560091A (en) * 2020-12-17 2021-03-26 北京百度网讯科技有限公司 Digital signature method, signature information verification method, related device and electronic equipment
CN112651835A (en) * 2020-12-30 2021-04-13 成都佳华物链云科技有限公司 Alliance chain transaction method and device, electronic equipment and storage medium
CN112651835B (en) * 2020-12-30 2023-05-23 成都佳华物链云科技有限公司 Alliance chain transaction method, device, electronic equipment and storage medium
CN112651837A (en) * 2021-01-07 2021-04-13 上海能链众合科技有限公司 Block chain information interaction method based on cross-chain
CN112532656A (en) * 2021-02-07 2021-03-19 腾讯科技(深圳)有限公司 Block chain-based data encryption and decryption method and device and related equipment
CN113098691A (en) * 2021-03-25 2021-07-09 北京百度网讯科技有限公司 Digital signature method, signature information verification method, related device and electronic equipment
CN113098691B (en) * 2021-03-25 2021-11-23 北京百度网讯科技有限公司 Digital signature method, signature information verification method, related device and electronic equipment
CN113240418A (en) * 2021-04-23 2021-08-10 上海和数软件有限公司 Intelligent private data access control method and equipment based on block chain
CN113240418B (en) * 2021-04-23 2024-01-12 上海和数软件有限公司 Block chain-based intelligent access control method and equipment for private data
CN113378187A (en) * 2021-05-11 2021-09-10 广西电网有限责任公司电力科学研究院 Intelligent power grid data query method and system based on Internet of things
CN113407975A (en) * 2021-07-20 2021-09-17 北京百度网讯科技有限公司 Digital signature method, signature information verification method, related device and electronic equipment
CN113489743B (en) * 2021-07-26 2022-12-23 广东辰宜信息科技有限公司 Consensus realization method and device applied to block chain system
CN113489743A (en) * 2021-07-26 2021-10-08 广东辰宜信息科技有限公司 Consensus realization method and device applied to block chain system
CN114157431A (en) * 2021-10-27 2022-03-08 上海朝夕网络技术有限公司 Block chain transaction processing method based on multivariate signature method and computer equipment
CN114629663A (en) * 2022-05-12 2022-06-14 武汉和悦数字科技有限公司 Block chain-based digital commodity transaction method and device
CN114629663B (en) * 2022-05-12 2022-08-05 武汉和悦数字科技有限公司 Block chain-based digital commodity transaction method and device
CN115567929A (en) * 2022-09-22 2023-01-03 景德镇陶瓷大学 Key management method and device, electronic equipment and storage medium
CN115297118A (en) * 2022-10-09 2022-11-04 北京航空航天大学杭州创新研究院 Data sharing method and data sharing system based on block chain
CN115297118B (en) * 2022-10-09 2023-01-31 北京航空航天大学杭州创新研究院 Data sharing method and data sharing system based on block chain
CN115348114A (en) * 2022-10-19 2022-11-15 浙江浩普智能科技有限公司 Intelligent power plant data safety transmission method and system, electronic equipment and medium
CN115348114B (en) * 2022-10-19 2023-02-28 浙江浩普智能科技有限公司 Intelligent power plant data safety transmission method and system, electronic equipment and medium

Also Published As

Publication number Publication date
CN109672518B (en) 2022-04-12

Similar Documents

Publication Publication Date Title
CN109672518A (en) The node data processing of the block chain of anti-quantum attack
Barsoum et al. On verifying dynamic multiple data copies over cloud servers
TWI233739B (en) Systems, methods and computer readable recording medium for remote password authentication using multiple servers
CN102263638B (en) Authenticating device, authentication method and signature generation device
CN103595525A (en) Desynchronization resistant lightweight RFID bidirectional authentication protocol
CN109728896A (en) A kind of incoming call certification and source tracing method and process based on block chain
CN113556237A (en) Threshold signature method, system, device and storage medium based on aggregation of multiple signatures
CN113297633B (en) Quantum digital signature method
CN110505067A (en) Processing method, device, equipment and the readable storage medium storing program for executing of block chain
CN106100831A (en) A kind of method and system transmitted and process data
Alghamdi et al. Routing-aware and malicious node detection in a concealed data aggregation for WSNs
CN106789087A (en) Determine the data summarization of message, the method and system based on multi-party digital signature
CN102404329A (en) Method for validating and encrypting interaction between user terminal and virtual community platform
CN110557247B (en) Identity-based blockchain method and system
Yin et al. Two‐Round Password‐Based Authenticated Key Exchange from Lattices
Akinyede et al. Development of a secure mobile e-banking system
CN102857487A (en) Method and system for remote tender invitation
CN108809996B (en) Integrity auditing method for duplicate deletion stored data with different popularity
CN115865313A (en) Lightweight privacy protection longitudinal federal learning model parameter aggregation method
Kartalopoulos Security of information and communication networks
Kobeissi An analysis of the protonmail cryptographic architecture
Hwang et al. IAR‐CTR and IAR‐CFB: integrity aware real‐time based counter and cipher feedback modes
Lu et al. Preventing delegation-based mobile authentications from man-in-the-middle attacks
KR102304831B1 (en) Encryption systems and method using permutaion group based cryptographic techniques
Du et al. The applications of blockchain in the covert communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20200717

Address after: Room 1704, block B, Moore center, No.34 Fenghui South Road, Zhangba Street office, hi tech Zone, Xi'an City, Shaanxi Province

Applicant after: Xi'an Anmeng Intelligent Technology Co.,Ltd.

Address before: 618 Weiguo Road, Chang'an District, Xi'an City, Xi'an City, Shaanxi Province

Applicant before: XI'AN University OF POSTS & TELECOMMUNICATIONS

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20221019

Address after: 710061 Room 1413, Floor 14, Building 3, West Yungu Phase II, Fengxi New Town, Xixian New District, Xi'an, Shaanxi

Patentee after: Shaanxi Lingyidun Information Technology Co.,Ltd.

Address before: 710000 room 1704, block B, Moore center, No. 34, Fenghui South Road, Zhangba street, high tech Zone, Xi'an, Shaanxi Province

Patentee before: Xi'an Anmeng Intelligent Technology Co.,Ltd.

TR01 Transfer of patent right