CN109905247A - Digital signature method, device, equipment and storage medium based on block chain - Google Patents

Digital signature method, device, equipment and storage medium based on block chain Download PDF

Info

Publication number
CN109905247A
CN109905247A CN201910243976.4A CN201910243976A CN109905247A CN 109905247 A CN109905247 A CN 109905247A CN 201910243976 A CN201910243976 A CN 201910243976A CN 109905247 A CN109905247 A CN 109905247A
Authority
CN
China
Prior art keywords
node
private key
block chain
factor
new
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910243976.4A
Other languages
Chinese (zh)
Other versions
CN109905247B (en
Inventor
程亚歌
胡明生
贾志娟
王利朋
崔文军
雷艳芳
张家蕾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Normal University
Original Assignee
Zhengzhou Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Normal University filed Critical Zhengzhou Normal University
Priority to CN201910243976.4A priority Critical patent/CN109905247B/en
Publication of CN109905247A publication Critical patent/CN109905247A/en
Application granted granted Critical
Publication of CN109905247B publication Critical patent/CN109905247B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

Digital signature method provided by the present invention based on block chain, it is related to electronic voting system technical field, this method is mainly by when node private key reaches the default update cycle using the time, determine new node private key, and present node private key is replaced with new node private key, data signature processing is carried out according to new node private key, each node regularly updates private key information, and delete present node private key, even if attacker obtains node current secret key information, also information before this can not be obtained, effectively prevent mobile attack, the safety of signing messages early period is ensured.The invention also discloses a kind of digital signature device based on block chain, equipment and a kind of readable storage medium storing program for executing, have above-mentioned beneficial effect.

Description

Digital signature method, device, equipment and storage medium based on block chain
Technical field
The present invention relates to electronic voting system technical field, in particular to a kind of digital signature method based on block chain, Device, equipment and a kind of readable storage medium storing program for executing.
Background technique
Block chain ballot system does not have trusted party, participates in safeguarding jointly by the whole network ballot node, can guarantee chain upslide Ticket result can not the property usurped;The electronic voting system of application block chain, which has used, simultaneously can provide the timestamp of time-proven, Time and the data for distorting or cheating ballot paper can be inquired in block chained record, trace back to interfering nodes;And it is each Node can verify ballot history authenticity and integrity, it is ensured that voting records be it is genuine and believable, be not tampered with, drop The low risk of ballot system;In addition, the open and clear and anonymous characteristic of block chain makes each ballot node it can be seen that throwing Ticket is as a result, ensure that the privacy of voter, while have the result of ballot and disclosing just superperformance.Block chain electricity Sub- ballot system is widely used in electronic voting scene as a kind of safe and efficient processing mode.
And during block chain electronic voting, block chain node automatically saves historical content, when have node by When attack, then attacker can obtain the historical record of the node, and target of attack can be transferred to the nearly node of neck, until obtaining door Limit value nodal information, attacker can distort or forge a signature information, influence system safety.
Therefore, the mobile attack in block chain ballot signature how is avoided, guarantees system security, is those skilled in the art Member's technical issues that need to address.
Summary of the invention
The object of the present invention is to provide a kind of digital signature method based on block chain, this method can throw to avoid block chain Mobile attack in ticket signature, guarantees system security;It is a further object of the present invention to provide a kind of numbers based on block chain Signature apparatus, equipment and a kind of readable storage medium storing program for executing have above-mentioned beneficial effect.
In order to solve the above technical problems, the present invention provides a kind of digital signature method based on block chain, comprising:
It determines block chain node present node private key, and data signature processing is carried out according to the present node private key;
When the time using the present node private key reaches the default update cycle, new node private key is determined;
The new node private key is replaced into the present node private key, and deletes the present node private key;
Data signature processing is carried out according to the new node private key.
Optionally, the determining new node private key, comprising:
Determine random number as updating factor;
The updating factor and the present node private key are subjected to statistical calculation, using obtained result as described new Node private key.
Optionally, the selection random number is as updating factor, comprising:
It is secret to be input to Asmuth-Bloom by each node for the first random number chosen respectively in block chain electronic voting system In close shared secret shadow calculation formula, and using obtained calculated result as the node updates factor;
Each node broadcasts the node updates factor of generation respectively;
Correspondingly, the updating factor and the present node private key are subjected to statistical calculation, obtained result is made For the new node private key, specifically: after the node to be updated receives the node updates factor of each node, by each section The node updates factor of point and the statistical result of the present node private key are as the new node private key.
Optionally, using the node updates factor of each node and the statistical result of the present node private key as institute State new node private key, comprising:
Read group total is carried out to each node updates factor, obtains updating factor statistical result;
Linear read group total carried out to the updating factor statistical result and the present node private key, and will be obtained Summed result is as the new node private key.
Optionally, the digital signature method based on block chain further include:
Each node generates the verification information of the node updates factor respectively, and broadcasts the verification information;Wherein, described Verification information is generated according to the node updates factor;
Correspondingly, using the node updates factor of each node and the statistical result of the present node private key as institute Before stating new node private key, further includes: the node to be updated receives the verification information and node updates of each node After the factor, the correctness of the verification information is verified according to the node updates factor;
When the authentication succeeds, by the node updates factor of each node and the statistical result of the present node private key As the new node private key.
Optionally, each node generates the verification information of the node updates factor, comprising:
Each node generates the node updates according to the secret shadow calculation formula of the Asmuth-Bloom privacy sharing The verification information of the factor.
Optionally, data signature processing is carried out according to the present node private key, comprising:
Data threshold signature is carried out according to the present node private key based on Chinese remainder theorem;
Correspondingly, data signature processing is carried out according to the new node private key, specifically:
Data threshold signature is carried out according to the new node private key based on Chinese remainder theorem.
The present invention discloses a kind of digital signature device based on block chain, comprising:
First private key processing unit, for determining block chain node present node private key, and it is private according to the present node Key carries out data signature processing;
New private key determination unit, for when the time using the present node private key reaches the default update cycle, really Determine new node private key;
New private key replacement unit for the new node private key to be replaced the present node private key, and is worked as described in deletion Front nodal point private key;
Second private key processing unit, for carrying out data signature processing according to the new node private key.
The present invention discloses a kind of digital signature device based on block chain, comprising:
Memory, for storing computer program;
Processor realizes the step of the digital signature method based on block chain when for executing the computer program Suddenly.
The present invention discloses a kind of readable storage medium storing program for executing, and program is stored on the readable storage medium storing program for executing, and described program is located Manage the step of realizing the digital signature method based on block chain when device executes.
Digital signature method provided by the present invention based on block chain, by reaching default using the time in node private key When the update cycle, determines and new node private key replaces present node private key, data signature processing is carried out according to new node private key, often A node regularly updates private key information, and deletes present node private key, even if attacker obtains node current secret key information, Information before this can not be obtained, mobile attack is effectively prevented, has ensured the safety of signing messages early period.
The secret shadow using Asmuth-Bloom privacy sharing is disclosed in an embodiment of the present invention and works as prosthomere Point private key carries out the mode of the statistical calculation of new node private key, can be by being higher than thresholding in the case where certain node private key is lost The node private key information of value lose the reduction of private key, has ensured the reusability of private key, has improved the stability of system.
The invention also discloses a kind of digital signature device based on block chain, equipment and a kind of readable storage medium storing program for executing, tools There is above-mentioned beneficial effect, details are not described herein.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of flow chart of the digital signature method based on block chain provided in an embodiment of the present invention;
Fig. 2 is a kind of block chain electronic voting system thresholding label based on Chinese remainder theorem provided in an embodiment of the present invention Name flow diagram;
Fig. 3 is a kind of structural block diagram of the digital signature device based on block chain provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of the digital signature device based on block chain provided in an embodiment of the present invention.
Specific embodiment
Core of the invention is to provide a kind of digital signature method based on block chain, and this method can be to avoid block chain electricity Mobile attack in sub- ballot system signature, guarantees system security;Another core of the invention is to provide a kind of based on block Digital signature device, equipment and a kind of readable storage medium storing program for executing of chain have above-mentioned beneficial effect.
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
When certain attacker successfully invades and control a node or server, then target of attack can be transferred to by attacker On another node or server in system, this attack is known as mobile attack.Block chain node automatically saves historical record, false If certain node is attacked by attacker, then attacker can obtain the historical record of the node, and it is close that target of attack can be transferred to neck Node, until obtaining threshold value nodal information, attacker can be distorted or forge a signature information.Mobile attack is to being chronically at System brings security threat very serious in operation.
The present invention provides a kind of digital signature based on block chain, needs to regularly update private key information for each node, support Anti- mobile attack can not also obtain information before this even if attacker obtains node present node private key information, it is ensured that Early period signing messages safety, it is ensured that the safety of system.
Embodiment one:
Referring to FIG. 1, Fig. 1 is a kind of process of the digital signature method based on block chain provided in an embodiment of the present invention Figure, this method mainly comprise the steps that
Step s110, it determines block chain node present node private key, and is carried out at data signature according to present node private key Reason.
Step s120, when the time using present node private key reaches the default update cycle, new node private key is determined.
The setting of specific time of default update cycle T without limitation, can according to the period that practical private key is attacked come Determine etc..
The generation method of new node private key is referred to the generation method of present node private key, it can referring to the relevant technologies In the generation method of node private key redefine node private key;Parameter tune can also be carried out on the basis of present node private key It is whole to generate new private key, in the present embodiment without limitation to the generation method of new private key.
Step s130, new node private key is replaced into present node private key, and deletes present node private key.
The relative recording information for deleting current secret key immediately after replacing current secret key with new private key, accordingly even when attacker New private key is illegally obtained, the private key information before the period can not be also obtained, historical data can not be cracked, ensure that system Safety.
Step s140, data signature processing is carried out according to new node private key.
Electronic voting endorsement method provided in this embodiment is any suitable for the electronic voting system based on block chain Node, can be with the safety of safeguards system.
It should be noted that being digitally signed the process of processing according to node private key without limitation in the present embodiment, Specifically it is referred to introduction in the related technology.Wherein it is preferred to can be carried out based on Chinese remainder theorem according to node private key Data threshold signature.It is illustrated in figure 2 a kind of block chain electronic voting system Threshold Signature process based on Chinese remainder theorem Schematic diagram, block chain Threshold Signature pass through the correctness for cooperating between node and generating secret shadow and calculating verification information, When verification result is correct, generation group public key and group private key, each block chain node calculate personal private key.Block chain node utilizes Personal private key generates the part signature of oneself, closes winner by signature and synthesizes signature, verifier verifies.It is fixed based on Chinese Remainder The signature scheme calculation amount of reason is smaller, applied to improving the efficiency of system in block chain ballot system.Other digital signature sides Details are not described herein for case, can refer to above-mentioned introduction.
In addition, the present embodiment is mainly used in electronic voting background system, other digital signature scenes based on block chain Also applicable digital signature method provided by the invention, details are not described herein.
Based on the above-mentioned technical proposal, the digital signature method provided by the invention based on block chain, by node private key When reaching the default update cycle using the time, determine and new node private key replace present node private key, according to new node private key into The processing of row data signature, each node regularly updates private key information, and deletes present node private key, even if attacker obtains section Point current secret key information, can not also obtain information before this, effectively prevent mobile attack, ensure signing messages early period Safety.
Embodiment two:
In above-described embodiment without limitation for the mode of determining new node private key, it is private that the present embodiment introduces a kind of new node The generating mode of key can simplify while new private key generates calculation amount and guarantee safety.Specifically, it is determined that new node private key Process mainly includes following two step:
Step 1: determine random number as updating factor;
Step 2: updating factor and present node private key are subjected to statistical calculation, using obtained result as new node Private key.
Updating factor refers to the part updated on the basis of original private keys, and random number here includes the number randomly selected, And the obtained numerical value of operations are carried out to the number randomly selected, particularly for random number method of determination without limitation.
The randomness of new node private key can be increased as updating factor by choosing random number, increased and cracked difficulty.Meanwhile Original private keys and updating factor are subjected to statistical calculation while guaranteeing the randomness of new private key, it is multiple to also ensure that private key is lost A possibility that former, improves the stability of system, here statistics calculate specific calculation can choose summation, ask it is poor, A variety of operation modes such as ratio are sought, it is not limited here.
In above-mentioned introduction without limitation for the method for determination of random number, wherein preferably, Asmuth- can be based on Bloom privacy sharing carries out the determination of random number, and Asmuth-Bloom secret sharing scheme has calculation amount small, high-efficient excellent Point can realize that the reduction to node private key is lost specifically is chosen random under the situation known to the private key for being higher than threshold value Number mainly includes following two step as updating factor:
Step 1: the first random number chosen respectively is input to Asmuth- by each node in block chain electronic voting system In the secret shadow calculation formula of Bloom privacy sharing, and using obtained calculated result as the node updates factor;
Step 2: each node broadcasts the node updates factor of generation respectively.
Wherein, the secret shadow calculation formula of Asmuth-Bloom privacy sharing refers to: assuming that DC is secret distributor, P= {P1, P2,…,PnIt is the set that n node forms, threshold value t, secret is s.DC selects Big prime q (q > s), integer A, And strictly increasing positive integer sequence d={ d1,d2,…,dn, and d meets the following conditions:
(1)0≤A≤M/q-1;
(2)d1< d2< ... < dn
(3)gcd(di,dj)=1, i ≠ j;
(4)gcd(di, q)=1, (i=1,2 ..., n);
(5)
Enable z=s+Aq, zi=zmoddi, (i=1,2 ..., n).Secret distributor DC is by (zi, di) it is sent to Pi(i=1, 2 ..., n), as PiSecret shadow.
Determine the secret shadow for determining each node as updating factor according to the above rule.
Arbitrary node restores updating factor by being exchanged with each other secret shadow.Specifically, the answering method of updating factor can Referring to introduced below.
Optional t node P1, P2,…,PtA group node as Restore Secret.By being exchanged with each other secret between node Afterwards, arbitrary node PiFollowing congruence equations can all be established:
z≡z1(modd1)
z≡z2(modd2)
z≡zt(moddt)
By Chinese remainder theorem, which has unique solution:
Therefore, shared secret s=z-Aq namely s=zmodq can be found out.
Correspondingly, updating factor and present node private key are subjected to statistical calculation, using obtained result as new node Private key, specifically: after node to be updated receives the node updates factor of each node, by the node updates factor of each node and The statistical result of present node private key is as new node private key.Wherein, the statistical of each node updates factor can be selected directly Connect summation, the modes such as ratio sums, averages, the statistics calculation of updating factor and present node private key can also be according to reality Border calculates demand and is set, it is preferable that mode to simplify the calculation, while guaranteeing the diversity of data, by the node of each node Updating factor and the statistical result of present node private key may include following two step as new node private key:
Step 1: read group total is carried out to each node updates factor, obtains updating factor statistical result;
Step 2: carrying out linear read group total to updating factor statistical result and present node private key, and will obtain Summed result is as new node private key.
Wherein, updating factor statistical result is such as directly added by linear read group total with node private key, or will be updated The factor is added with the node private key of integral multiple, it is not limited here.Linear summation can guarantee the randomness of updating factor, protect Demonstrate,prove the safety of private key.
In addition, each node is directly broadcasted after generating the node updates factor in above-mentioned introduction, to avoid node updates The factor is illegally distorted before broadcast to be caused to divulge a secret, and guarantees the safety of private key, it is preferable that each node can further generate section The verification information of point updating factor, and verifying broadcasts information;Correspondingly, by the node updates factor and present node of each node Before the statistical result of private key is as new node private key, further includes: node to be updated receive each node verification information and After the node updates factor, according to the correctness of node updates factor authentication information;When the authentication succeeds, by the section of each node Point updating factor and the statistical result of present node private key are as new node private key.
Wherein, verification information according to the node updates factor generate, node to be updated receive each node updates factor and After corresponding verification information, the safety of updating factor is verified according to verification information first, if be proved to be successful, instruction The node updates factor is not tampered with, if authentication failed, indicates that the node updates factor may be tampered, to ensure private key Safety avoids the node updates factor using authentication failed as far as possible.
The process that each node generates the verification information of the node updates factor is referred to the life of verification information in the prior art At method, wherein to realize the reduction after verification information loss, it is preferable that each node can be according to Asmuth-Bloom secret Shared secret shadow calculation formula generates the verification information of the node updates factor.Asmuth-Bloom secret sharing scheme please join According to introduction in the related technology, details are not described herein, it is of course also possible to select other verification information generation methods, herein not It limits.
Embodiment three:
Electronic voting system to deepen understanding to overall plan in embodiment, in the present embodiment to entirety based on block chain System signature process is introduced, and mainly includes key generation, generation signature, verifying signature, private key update, node addition and section Point exits six parts, wherein the signature process in the present embodiment uses block chain Threshold Signature, and private key, which updates, uses Asmuth- Bloom privacy sharing principle, other way can refer to the introduction of the present embodiment.
Block chain Threshold Signature passes through the correctness for cooperating between node and generating secret shadow and calculating verification information, When verification result is correct, generation group public key and group private key, each block chain node calculate personal private key.Block chain node utilizes Personal private key generates the part signature of oneself, closes winner by signature and synthesizes signature, verifier verifies.
One, key generates
1. block chain electronic voting system initializes
Choose common parameter P, n, t, g, p, q, d, S, M.Wherein P={ P1,P2,…,PnIt is n participation block chain ballot The node set of system signature, t are threshold value, and g is the generation member on finite field gf (p), and p, q are two Big primes and meet q/ (p-1), d={ d1,d2,…,dnBe one group of strictly monotone increasing positive integer sequence, q and d meet Asmuth-Bloom scheme, Message to be signed is S,Open n, t, g, p, q, d and M.
2. cooperating generation secret shadow between block chain node:
Each block chain node PiRandomly select sub-secret λiWith integer Zi, for generating node private key and group key, and it is full The following condition of foot:
PiCalculate secret shadow Xij:
Xij=(λi+Ziq)moddj (3)
Node PiRetain Xii, broadcastAnd by Xij(i ≠ j) sending node is to Pj
Here, sub-secret λiWith integer ZiIt is chosen by block chain node secret, and is sent not over communication channel, other People can not obtain.
3. block chain node PiCalculate verification information δi, μij, and the correctness of verification information:
θij=(λi+Ziq-Xij)/dj (5)
And δ is broadcasted in block chain networki, μij
Node PjReceive the verification information δ that remaining n-1 node sends overiAnd XijAfterwards;It is verified and is believed by following equation The correctness of breath:
4. generating block chain node private key:
According to the verifying of third step, if information is correct, node PjCalculate the private key of oneself:
5. generating group key:
According to the secret number λ of each block chain node selectioni, generation group public key and group private key, wherein group public key are as follows:
Group private key are as follows:
Two, signature is generated
Any t block chain node utilizes the private key of oneself, is signed according to the part that Chinese remainder theorem generates oneself, t The signature of a part signature synthesis message S.
1. generating portion is signed
(1) node PiChoose random number hi∈ZP, it calculates and broadcasts:
PjReceive li, it calculates:
(2) node PiIt calculatesIt signs for generating portion, wherein
eiMeet:
(3) node PiCalculating section signature Wi:
Wi=lhi·S+HimodD (14)
And by part sign (S, l, Wi) it is sent to signature conjunction winner.
2. synthesis signature
Signature closes winner and receives the part signature W that t block chain node is sentiAfterwards, synthesis signature W:
Then the signature of message S is (S, l, W)
Three, verifying signature
After verifier receives signing messages (S, l, W), according to following equation, a group validity for public key ψ verifying signature is used:
gW≡lS·l·Ψmodp (16)
If above-mentioned equation is set up, illustrates group signature (S, l, W) effectively, receive signature.
Four, private key updates
If the update cycle is T, then detailed update algorithm steps are as follows:
1. block chain node PiRandomly select integerMeet primary condition;
2. node PiCalculate updating factor:
Wherein, h refers to hash function, has positive quick, reverse difficulty using the calculating that hash function is updated the factor, Input is sensitive, the feature of conflict avoidance.
And by updating factorIt is sent to node Pj, broadcast
3. node PiCalculate verification information
Broadcast
Above-mentioned verification mode has the function of to be mutually authenticated, and the supervision, it can be achieved that node is mutually authenticated between node, prevention The insincere behavior of node, at the same verify data in transmission process with the presence or absence of being tampered or forge.Guarantee that node is credible, number According to credible.
4. node PjReceive node PiThe information of transmissionAndAccording to broadcast messageBy following two A equation verifyingCorrectness:
5. node PjIt is in the private key of T-1 periodThe then private key of T period are as follows:
When node calculates current secret keyAfterwards, it deletes immediatelyAccordingly even when attacker obtainsAlso without Method obtains the private key information before the period.
Five, node is added
Assuming that there is new node Pi+1Block chain network is added, adition process is as follows:
1. newly added node Pi+1Select modulus dn+1, and make dn+1Meet Asmuth-Bloom secret sharing scheme.
2. by t block chain node Pi(i=1,2 ..., t) assist newly added node Pi+1Calculate pseudo- private key.
Node PiRandomly select t random number εij∈Zp(j=1,2 ..., t) is calculatedAnd by εijHair Give Pj, PjCalculate ε 'j:
PiCalculate pseudo- private key:
And by K 'iIt is sent to node Pn+1
3.Pn+1Receive t parts of pseudo- private key K 'iAfterwards, the private key of oneself is calculated:
When there is new node that block chain network is added, it is assisted to generate pseudo- private key by block chain node, newly added node exists Receive the private key that oneself is calculated after the pseudo- private key of other t node.Public key, group private key and other nodes are organized in the whole process Private key does not change, therefore does not influence on entire signature process.
Six, node exits
Assuming that block chain node PkBlock chain network, P are left in decisionkIts message left is broadcasted, other n-1 node is kicked Except dk, no longer receive PkThe message of transmission.Node PkAfter leaving, other nodes timely update key, organize public key after update are as follows:
Group private key:
Node private key:
It should be noted that when the node number left simultaneously in block chain network is more than or equal to t, due to t node Cooperation is restructural reconstruct secret shadow, causes signature algorithm dangerous, it is therefore desirable to which system re-initialization repeats (1)- (11) formula operates, and block chain node recalculates key.
Block chain ballot system signature scheme provided in this embodiment is based on Chinese remainder theorem, and calculation amount is smaller, is promoted The efficiency of system;Ballot technology based on block chain simultaneously, ensure that the reliability of voting records, improves practicability.No It needs special maintenance and management to arrange ballot system and network, avoids the behaviors such as authority's fraud, ensure that the transparency of network, Malice is prevented to vote or distort the cheating of fraud ballot paper;In addition, regularly updating node private key, movement can be effective against Attack, improves the safety of system.
Example IV:
The digital signature device provided by the invention based on block chain is introduced below, referring to FIG. 3, Fig. 3 is this A kind of structural block diagram for digital signature device based on block chain that inventive embodiments provide;The device mainly includes: first is private Key processing unit 110, new private key determination unit 120, new private key replacement unit 130 and the second private key processing unit 140.
Wherein, the first private key processing unit 110 is mainly used for determining block chain node present node private key, and according to current Node private key carries out data signature processing;
New private key determination unit 120 is mainly used for when the time using present node private key reaches the default update cycle, Determine new node private key;
New private key replacement unit 130 is mainly used for new node private key replacing present node private key, and deletes present node Private key;
Second private key processing unit 140 is mainly used for carrying out data signature processing according to new node private key.
Digital signature device provided in this embodiment based on block chain can be to avoid the movement in block chain ballot signature Attack, guarantees system security.
Wherein, new private key determination unit may further include: it is single that updating factor determines that subelement and statistics calculate son Member;
Updating factor determines that subelement is mainly used for determining random number as updating factor;
Statistics computation subunit is mainly used for updating factor and present node private key carrying out statistical calculation, by what is obtained As a result it is used as new node private key.
Wherein, updating factor determines that subelement may further include: privacy sharing share determines subelement and update The factor broadcasts subelement;
Privacy sharing share determines that subelement is mainly used for each node in block chain electronic voting system and will choose respectively First random number is input in the secret shadow calculation formula of Asmuth-Bloom privacy sharing, and obtained calculated result is made For the node updates factor;
Updating factor broadcast subelement broadcasts the node updates factor of generation for each node respectively;
Correspondingly, statistics computation subunit is specially multinode statistics subelement, and multinode counts subelement and is used for more After new node receives the node updates factor of each node, by the node updates factor of each node and the system of present node private key Result is counted as new node private key.
Wherein, multinode statistics subelement may further include: factor summation subelement and subelement of linearly summing;
Factor summation subelement is mainly used for carrying out read group total to each node updates factor, obtains updating factor statistics knot Fruit;
Linear summation subelement is mainly used for linearly summing to updating factor statistical result and present node private key It calculates, and using obtained summed result as new node private key.
Optionally, updating factor determines that subelement may further include: verifying subelement, and verifying subelement mainly includes Information generates subelement and Information Authentication subelement;Information generates subelement and is mainly used for controlling each node generates node respectively The verification information of updating factor, and verifying broadcasts information;Wherein, verification information is generated according to the node updates factor;
Information Authentication subelement is mainly used for controlling the verification information that node to be updated receives each node and node more After the new factor, according to the correctness of node updates factor authentication information;When the authentication succeeds, by the node updates of each node The factor and the statistical result of present node private key are as new node private key.
Optionally, information generates subelement can generate subelement for privacy sharing information, and privacy sharing information generates son Unit generates the node updates factor according to the secret shadow calculation formula of Asmuth-Bloom privacy sharing for controlling each node Verification information.
Optionally, it is surplus based on China specifically to can be used for the digital signature device based on block chain for the first private key processing unit Remaining theorem carries out data threshold signature according to present node private key;
Correspondingly, the second private key processing unit specifically can be used for being carried out based on Chinese remainder theorem according to new node private key Data threshold signature.
Embodiment five:
The digital signature device provided by the invention based on block chain is introduced below, specifically to based on block chain The introduction of digital signature device can refer to above-mentioned digital signature method and device based on block chain;The equipment specifically includes that
Memory, for storing computer program;
Processor, when for executing computer program the step of realization data flow theme feature extracting method.
Digital signature device provided by the invention based on block chain can attack to avoid the movement in block chain ballot signature It hits, guarantees system security.
Referring to FIG. 4, a kind of structural schematic diagram of digital signature device based on block chain provided in an embodiment of the present invention, The electronic voting signature device can generate bigger difference because configuration or performance are different, may include one or more Processor (central processing units, CPU) 322 (for example, one or more processors) and memory 332, one or more storage application programs 342 or data 344 storage medium 330 (such as one or more sea Amount storage equipment).Wherein, memory 332 and storage medium 330 can be of short duration storage or persistent storage.Storage is stored in be situated between The program of matter 330 may include one or more modules (diagram does not mark), and each module may include to data processing Series of instructions operation in equipment.Further, central processing unit 322 can be set to communicate with storage medium 330, The series of instructions operation in storage medium 330 is executed on digital signature device 301 based on block chain.
Digital signature device 301 based on block chain can also include one or more power supplys 326, one or one The above wired or wireless network interface 350, one or more input/output interfaces 358, and/or, one or more Operating system 341, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
Step in digital signature method described above based on block chain can be signed by the number based on block chain The structure of name equipment is realized.
Embodiment six:
Readable storage medium storing program for executing provided in an embodiment of the present invention is introduced below, readable storage medium storing program for executing described below with The above-described digital signature method based on block chain can correspond to each other reference.
A kind of readable storage medium storing program for executing disclosed by the invention, is stored thereon with program, base is realized when program is executed by processor In the digital signature method of block chain the step of.
The readable storage medium storing program for executing be specifically as follows USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), the various program storage generations such as random access memory (Random Access Memory, RAM), magnetic or disk The readable storage medium storing program for executing of code.
Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other realities The difference of example is applied, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment Speech, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part illustration ?.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond scope of the present application.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
Above to the digital signature method based on block chain, device, equipment and readable storage medium storing program for executing provided herein It is described in detail.Specific examples are used herein to illustrate the principle and implementation manner of the present application, the above reality The explanation for applying example is merely used to help understand the present processes and its core concept.It should be pointed out that for the art For those of ordinary skill, under the premise of not departing from the application principle, can also to the application, some improvement and modification can also be carried out, These improvement and modification are also fallen into the protection scope of the claim of this application.

Claims (10)

1. a kind of digital signature method based on block chain characterized by comprising
It determines block chain node present node private key, and data signature processing is carried out according to the present node private key;
When the time using the present node private key reaches the default update cycle, new node private key is determined;
The new node private key is replaced into the present node private key, and deletes the present node private key;
Data signature processing is carried out according to the new node private key.
2. the digital signature method as described in claim 1 based on block chain, which is characterized in that the determining new node is private Key, comprising:
Determine random number as updating factor;
The updating factor and the present node private key are subjected to statistical calculation, using obtained result as the new node Private key.
3. the digital signature method as claimed in claim 2 based on block chain, which is characterized in that the selection random number conduct Updating factor, comprising:
The first random number chosen respectively is input to Asmuth-Bloom secret and is total to by each node in block chain electronic voting system In the secret shadow calculation formula enjoyed, and using obtained calculated result as the node updates factor;
Each node broadcasts the node updates factor of generation respectively;
Correspondingly, the updating factor and the present node private key are subjected to statistical calculation, using obtained result as institute New node private key is stated, specifically: after the node to be updated receives the node updates factor of each node, by each node The node updates factor and the statistical result of the present node private key are as the new node private key.
4. the digital signature method as claimed in claim 3 based on block chain, which is characterized in that by the node of each node Updating factor and the statistical result of the present node private key are as the new node private key, comprising:
Read group total is carried out to each node updates factor, obtains updating factor statistical result;
Linear read group total, and the summation that will be obtained are carried out to the updating factor statistical result and the present node private key As a result it is used as the new node private key.
5. the digital signature method as claimed in claim 3 based on block chain, which is characterized in that further include:
Each node generates the verification information of the node updates factor respectively, and broadcasts the verification information;Wherein, the verifying Information is generated according to the node updates factor;
Correspondingly, using the node updates factor of each node and the statistical result of the present node private key as described new Before node private key, further includes: the node to be updated receives the verification information and the node updates factor of each node Afterwards, the correctness of the verification information is verified according to the node updates factor;
When the authentication succeeds, using the node updates factor of each node and the statistical result of the present node private key as The new node private key.
6. the digital signature method as claimed in claim 5 based on block chain, which is characterized in that each node generates the node The verification information of updating factor, comprising:
Each node generates the node updates factor according to the secret shadow calculation formula of the Asmuth-Bloom privacy sharing Verification information.
7. the digital signature method as described in claim 1 based on block chain, which is characterized in that private according to the present node Key carries out data signature processing, comprising:
Data threshold signature is carried out according to the present node private key based on Chinese remainder theorem;
Correspondingly, data signature processing is carried out according to the new node private key, specifically:
Data threshold signature is carried out according to the new node private key based on Chinese remainder theorem.
8. a kind of digital signature device based on block chain characterized by comprising
First private key processing unit, for determining block chain node present node private key, and according to the present node private key into The processing of row data signature;
New private key determination unit is new for determining when the time using the present node private key reaches the default update cycle Node private key;
New private key replacement unit for the new node private key to be replaced the present node private key, and works as prosthomere described in deletion Point private key;
Second private key processing unit, for carrying out data signature processing according to the new node private key.
9. a kind of digital signature device based on block chain characterized by comprising
Memory, for storing computer program;
Processor realizes the number based on block chain as described in any one of claim 1 to 7 when for executing the computer program The step of word endorsement method.
10. a kind of readable storage medium storing program for executing, which is characterized in that be stored with program on the readable storage medium storing program for executing, described program is located Manage the step of realizing the digital signature method based on block chain as described in any one of claim 1 to 7 when device executes.
CN201910243976.4A 2019-03-28 2019-03-28 Block chain based digital signature method, device, equipment and storage medium Active CN109905247B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910243976.4A CN109905247B (en) 2019-03-28 2019-03-28 Block chain based digital signature method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910243976.4A CN109905247B (en) 2019-03-28 2019-03-28 Block chain based digital signature method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109905247A true CN109905247A (en) 2019-06-18
CN109905247B CN109905247B (en) 2022-03-15

Family

ID=66953991

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910243976.4A Active CN109905247B (en) 2019-03-28 2019-03-28 Block chain based digital signature method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109905247B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110555933A (en) * 2019-07-31 2019-12-10 中钞信用卡产业发展有限公司杭州区块链技术研究院 Electronic voting method, device, equipment and computer storage medium
CN110837659A (en) * 2019-09-26 2020-02-25 中国科学院软件研究所 Renewable digital signature method for private key with label and application of renewable digital signature method in PoS block chain protocol
CN112799636A (en) * 2021-04-14 2021-05-14 北京百度网讯科技有限公司 Random number generation method, device, equipment and storage medium
WO2021103793A1 (en) * 2019-11-27 2021-06-03 支付宝(杭州)信息技术有限公司 Data processing method and system
CN113014382A (en) * 2021-03-01 2021-06-22 西安电子科技大学 Service chain integrity detection method, device and medium based on ordered aggregation digital signature
CN114329635A (en) * 2022-03-04 2022-04-12 杭州字节方舟科技有限公司 Privacy signature method based on multi-party security calculation and computer system
CN114339746A (en) * 2021-12-31 2022-04-12 中国科学技术大学 China remainder theorem-based dynamic group key management method and system for Internet of vehicles
CN115208676A (en) * 2022-07-19 2022-10-18 中软航科数据科技(珠海横琴)有限公司 Data encryption method and system based on block chain technology
CN115378616A (en) * 2022-10-21 2022-11-22 三未信安科技股份有限公司 Threshold signature method based on Ed25519

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411503A (en) * 2016-11-28 2017-02-15 中国银行股份有限公司 Accounting method, accounting system, voting node and accounting node under block chain voting and accounting mode
CN108650085A (en) * 2018-05-10 2018-10-12 杭州智块网络科技有限公司 A kind of group membership's extended method, device, equipment and medium based on block chain
CN108647968A (en) * 2018-05-10 2018-10-12 阿里巴巴集团控股有限公司 A kind of block chain data processing method, device, processing equipment and system
US10162968B1 (en) * 2017-11-30 2018-12-25 Mocana Corporation System and method for securely updating a registered device using a development system and a release management system operated by an update provider and an update publisher
CN109257179A (en) * 2018-10-09 2019-01-22 北京网录科技有限公司 A kind of signature generating method and the block chain account management method using this method
CN109345242A (en) * 2018-09-18 2019-02-15 百度在线网络技术(北京)有限公司 Key storage, update method, device, equipment and medium based on block chain
EP3451579A1 (en) * 2017-09-01 2019-03-06 Accenture Global Solutions Limited Multiple-phase rewritable blockchain
CN109447634A (en) * 2018-10-09 2019-03-08 北京网录科技有限公司 A kind of code key update method and block chain account management method using this method of locking an account

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411503A (en) * 2016-11-28 2017-02-15 中国银行股份有限公司 Accounting method, accounting system, voting node and accounting node under block chain voting and accounting mode
EP3451579A1 (en) * 2017-09-01 2019-03-06 Accenture Global Solutions Limited Multiple-phase rewritable blockchain
US10162968B1 (en) * 2017-11-30 2018-12-25 Mocana Corporation System and method for securely updating a registered device using a development system and a release management system operated by an update provider and an update publisher
CN108650085A (en) * 2018-05-10 2018-10-12 杭州智块网络科技有限公司 A kind of group membership's extended method, device, equipment and medium based on block chain
CN108647968A (en) * 2018-05-10 2018-10-12 阿里巴巴集团控股有限公司 A kind of block chain data processing method, device, processing equipment and system
CN109345242A (en) * 2018-09-18 2019-02-15 百度在线网络技术(北京)有限公司 Key storage, update method, device, equipment and medium based on block chain
CN109257179A (en) * 2018-10-09 2019-01-22 北京网录科技有限公司 A kind of signature generating method and the block chain account management method using this method
CN109447634A (en) * 2018-10-09 2019-03-08 北京网录科技有限公司 A kind of code key update method and block chain account management method using this method of locking an account

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
MASAYUKI FUKUMITSU;SHINGO HASEGAWA: ""A Proposal of a Secure P2P-Type Storage Scheme by Using the Secret Sharing and the Blockchain"", 《2017 IEEE 31ST INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA)》 *
PRATYUSH DIKSHIT;KUNWAR SINGH: ""Efficient weighted threshold ECDSA for securing bitcoin wallet"", 《2017 ISEA ASIA SECURITY AND PRIVACY (ISEASP)》 *
张平; 栗亚敏: ""前向安全的椭圆曲线数字签名方案"", 《计算机工程与应用》 *
李洁平,韦性佳: ""基于中国剩余定理的秘密共享方案"", 《通信技术》 *
王利朋; 胡明生;: ""基于中国剩余定理的区块链投票场景签名方案"", 《计算机应用研究》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110555933B (en) * 2019-07-31 2021-04-30 中钞信用卡产业发展有限公司杭州区块链技术研究院 Electronic voting method, device, equipment and computer storage medium
CN110555933A (en) * 2019-07-31 2019-12-10 中钞信用卡产业发展有限公司杭州区块链技术研究院 Electronic voting method, device, equipment and computer storage medium
CN110837659B (en) * 2019-09-26 2021-10-15 中国科学院软件研究所 Renewable digital signature method for private key with label and application of renewable digital signature method in PoS block chain protocol
CN110837659A (en) * 2019-09-26 2020-02-25 中国科学院软件研究所 Renewable digital signature method for private key with label and application of renewable digital signature method in PoS block chain protocol
WO2021103793A1 (en) * 2019-11-27 2021-06-03 支付宝(杭州)信息技术有限公司 Data processing method and system
CN113014382A (en) * 2021-03-01 2021-06-22 西安电子科技大学 Service chain integrity detection method, device and medium based on ordered aggregation digital signature
CN112799636A (en) * 2021-04-14 2021-05-14 北京百度网讯科技有限公司 Random number generation method, device, equipment and storage medium
CN114339746A (en) * 2021-12-31 2022-04-12 中国科学技术大学 China remainder theorem-based dynamic group key management method and system for Internet of vehicles
CN114339746B (en) * 2021-12-31 2023-11-17 中国科学技术大学 Internet of vehicles dynamic group key management method and system based on China remainder theorem
CN114329635A (en) * 2022-03-04 2022-04-12 杭州字节方舟科技有限公司 Privacy signature method based on multi-party security calculation and computer system
CN115208676A (en) * 2022-07-19 2022-10-18 中软航科数据科技(珠海横琴)有限公司 Data encryption method and system based on block chain technology
CN115208676B (en) * 2022-07-19 2023-09-08 中软航科数据科技(珠海横琴)有限公司 Data encryption method and system based on blockchain technology
CN115378616A (en) * 2022-10-21 2022-11-22 三未信安科技股份有限公司 Threshold signature method based on Ed25519
CN115378616B (en) * 2022-10-21 2023-01-10 三未信安科技股份有限公司 Threshold signature method based on Ed25519

Also Published As

Publication number Publication date
CN109905247B (en) 2022-03-15

Similar Documents

Publication Publication Date Title
CN109905247A (en) Digital signature method, device, equipment and storage medium based on block chain
CN112204920B (en) Computer-implemented method and system for transferring access to digital assets
US11714860B2 (en) Publicly verifiable proofs of space
Boneh et al. Single secret leader election
EP3410633B1 (en) Device and system with global tamper resistance
CN109379343B (en) Heterogeneous consensus method of block chains and terminal
CN109981690B (en) Anti-tamper timing data secret transmission method based on block chain intelligent contract
CN107171796A (en) A kind of many KMC key recovery methods
CN110213038B (en) Method and system for forming consensus of block chain
GB2551954A (en) End-to-end verifiable E-voting system without tallying authorities
CN108494558B (en) Method and system for implementing fair switching
CN110532734A (en) A kind of digital publishing rights method and system of the privacy timestamp based on multi-party computations
CN111865595B (en) Block chain consensus method and device
Aumasson Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer
CN110391912B (en) Distributed evaluation decision method and system based on secret sharing mechanism
CN106533678B (en) A kind of login method and its system based on multi-signature
CN109274674B (en) Block chain heterogeneous consensus method with high security and terminal
CN109687967B (en) Electronic signature method and device
NS et al. Security Attacks and Key Challenges in Blockchain Technology: A survey
CN109617691B (en) Group authentication method and system using modulo operation in multi-user group authentication
CN107172016B (en) Safety trust processing method and device
CN113746623A (en) Threshold key verification method and related equipment
CN113656840B (en) Dynamic integrity verification method with accountability
CN109981293A (en) A kind of Membership Revocation processing method, device, equipment and storage medium
CN111106938A (en) Information processing method, system and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant