CN110289962A - A kind of IBE key updating method and device based on UTXO model - Google Patents

A kind of IBE key updating method and device based on UTXO model Download PDF

Info

Publication number
CN110289962A
CN110289962A CN201910661438.7A CN201910661438A CN110289962A CN 110289962 A CN110289962 A CN 110289962A CN 201910661438 A CN201910661438 A CN 201910661438A CN 110289962 A CN110289962 A CN 110289962A
Authority
CN
China
Prior art keywords
information
key
target user
target
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910661438.7A
Other languages
Chinese (zh)
Other versions
CN110289962B (en
Inventor
孙涛
王栋
甄平
玄佳兴
廖会敏
赵丽花
王俊生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guowang Xiongan Finance Technology Group Co ltd
State Grid Digital Technology Holdings Co ltd
State Grid Corp of China SGCC
Original Assignee
Guowang Xiongan Finance Technology Group Co Ltd
State Grid Agel Ecommerce Ltd
State Grid Corp of China SGCC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guowang Xiongan Finance Technology Group Co Ltd, State Grid Agel Ecommerce Ltd, State Grid Corp of China SGCC filed Critical Guowang Xiongan Finance Technology Group Co Ltd
Priority to CN201910661438.7A priority Critical patent/CN110289962B/en
Publication of CN110289962A publication Critical patent/CN110289962A/en
Application granted granted Critical
Publication of CN110289962B publication Critical patent/CN110289962B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3006Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Storage Device Security (AREA)

Abstract

This application provides a kind of IBE key updating methods and device based on UTXO model, comprising: in the case where the key of target user needs to update, obtains from block chain and is directed to the last updated UTXO Transaction Information of target user;The identification information of target user is obtained from the output information in UTXO Transaction Information;If target user changes the main private key and Your Majesty's key of target user by supervision user to be non-, and using the identification information of target user and Your Majesty's key after change, updates the private key of target user;Or, if target user be it is non-by supervision user, the identification information of target user is changed, and using target user Your Majesty's key and change after identification information, update the private key of target user.In this application, in the above manner, the update to the key of target user may be implemented.

Description

A kind of IBE key updating method and device based on UTXO model
Technical field
This application involves field of computer technology, in particular to a kind of IBE key updating method based on UTXO model and Device.
Background technique
Currently, by KGC (Key in Identity based encryption (Identity Based Encryption, IBE) scheme Generation Center) Your Majesty's key and main private key are generated, KGC recycles Your Majesty's key, main private key and the identity information of user Private key is generated for user in (e.g., title, e-mail, identification card number etc.), and the identity information of user is public key, is not necessarily to digital certificate Binding, can be to avoid the problem of digital certificate management complexity in PKI scheme.
How but user key is carried out in the IBE scheme and be modernized into problem.
Summary of the invention
In order to solve the above technical problems, the embodiment of the present application provides a kind of IBE key updating method based on UTXO model And device, to achieve the purpose that realize the key updating to target user, technical solution is as follows:
A kind of IBE key updating method based on UTXO model, comprising:
In the case where the key of target user needs to update, obtained from block chain newest more for the target user New UTXO Transaction Information;
The identification information of the target user is obtained from the output information in the UTXO Transaction Information;
If the target user is non-by supervision user, the main private key and Your Majesty's key of the target user are become More, and using the identification information of the target user and main private key and Your Majesty's key after change, the target user is updated Private key;
Or, if the target user changes the identification information of the target user by supervision user to be non-, And using the identification information after Your Majesty's key of the target user and change, the private key of the target user is updated.
Preferably, the method also includes:
If the target user be by supervision user, the identification information of the target user is changed, and Using the identification information after the main private key and Your Majesty's key of regulatory agency and change, the private key of the target user is updated.
Preferably, the method also includes:
The index of position of the output information in the UTXO Transaction Information in the block chain and described will be directed toward The cryptographic Hash of UTXO Transaction Information inputs information as target;
By the open parameter comprising Your Majesty's key after the change and the identification information of the target user, as mesh Mark output information;Or, by the identification information after the open parameter and the change of Your Majesty's key comprising the target user, As target output information;
Target UTXO Transaction Information comprising target input information and the target output information is published to described In block chain.
Preferably, in the target output information further include: the updated key of target user uses validity period;
In the target UTXO Transaction Information further include: the identity information for the publisher that trades and/or the institute before use update The private key for stating target user inputs the information that information and the target output information are signed to the target.
Preferably, the method also includes:
In the case where the key of the target user needs to nullify, the last updated UTXO of the target user will be directed to Output information in Transaction Information is set as empty, and sets empty UTXO Transaction Information for output information and be published to the block In chain.
A kind of IBE key update device based on UTXO model, comprising:
First obtains module, for obtaining and being directed to from block chain in the case where the key of target user needs to update The last updated UTXO Transaction Information of target user;
Second obtains module, for obtaining the body of the target user from the output information in the UTXO Transaction Information Part identification information;
First update module, if being the non-main private by supervision user, to the target user for the target user Key and Your Majesty's key change, and the identification information for utilizing the target user and main private key and Your Majesty's key after change, Update the private key of the target user;
Or, the second update module, if being non-by supervision user for the target user, to the body of the target user Part identification information changes, and the identification information using the main private key of the target user and Your Majesty's key and after changing, Update the private key of the target user.
Preferably, described device further include:
Third update module, if being by supervision user, to the identity mark of the target user for the target user Know information to change, and the identification information using the main private key of regulatory agency and Your Majesty's key and after changing, described in update The private key of target user.
Preferably, described device further include:
First determining module, position of the output information in the block chain for that will be directed toward in the UTXO Transaction Information The cryptographic Hash of the index and the UTXO Transaction Information set inputs information as target;
Second determining module, for that will include the open parameter of Your Majesty's key after the change and the body of the target user Part identification information, as target output information;Or, by the open parameter and the change of Your Majesty's key comprising the target user Identification information afterwards, as target output information;
First release module, the target UTXO for that will include the target input information and the target output information are handed over Easy information is published in the block chain.
Preferably, in the target output information further include: the updated key of target user uses validity period;
In the target UTXO Transaction Information further include: the identity information for the publisher that trades and/or the institute before use update The private key for stating target user inputs the information that information and the target output information are signed to the target.
Preferably, described device further include:
Second release module, for the target will to be directed in the case where the key of the target user needs to nullify Output information in the last updated UTXO Transaction Information of user is set as empty, and sets empty UTXO for output information and trade Information is published in the block chain.
Compared with prior art, the application has the beneficial effect that
In this application, target user key need update in the case where, if target user be it is non-by supervision user, The identification information of target user, the main private to the target user are then obtained from the output information in UTXO Transaction Information Key and Your Majesty's key change, and the identification information for utilizing the target user and main private key and Your Majesty's key after change, The private key of the target user is updated, or, changing to the identification information of the target user, and utilizes the target The main private key and Your Majesty's key and the identity information after change of user, updates the private key of the target user, realizes to target user Key update.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for For those of ordinary skill in the art, without any creative labor, it can also be obtained according to these attached drawings His attached drawing.
Fig. 1 is a kind of flow chart of IBE key updating method embodiment 1 based on UTXO model provided by the present application;
Fig. 2 is a kind of configuration diagram of block chain provided by the present application;
Fig. 3 is a kind of flow chart of IBE key updating method embodiment 2 based on UTXO model provided by the present application;
Fig. 4 is a kind of flow chart of IBE key updating method embodiment 3 based on UTXO model provided by the present application;
Fig. 5 is a kind of flow chart of IBE key updating method embodiment 4 based on UTXO model provided by the present application;
Fig. 6 is a kind of flow chart of IBE key updating method embodiment 5 based on UTXO model provided by the present application;
Fig. 7 is a kind of flow chart of IBE key updating method embodiment 6 based on UTXO model provided by the present application;
Fig. 8 is a kind of flow chart of IBE key updating method embodiment 7 based on UTXO model provided by the present application;
Fig. 9 is a kind of logical construction schematic diagram of IBE key update device based on UTXO model provided by the present application;
Figure 10 is the logical construction signal of another IBE key update device based on UTXO model provided by the present application Figure.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.It is based on Embodiment in the application, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall in the protection scope of this application.
The embodiment of the present application discloses a kind of IBE key updating method based on UTXO model, comprising: target user's In the case that key needs to update, is obtained from block chain and be directed to the last updated UTXO Transaction Information of the target user;If The target user is non-by supervision user, then obtains the target user from the output information in the UTXO Transaction Information Identification information;The main private key and Your Majesty's key of the target user are changed, and utilize the body of the target user Main private key and Your Majesty's key after part identification information and change, update the private key of the target user;Or, to the target user's Identification information changes, and using the identity information after the main private key of the target user and Your Majesty's key and change, more The private key of the new target user.In this application, the update to the key of target user may be implemented.
As shown in Figure 1, it is a kind of IBE key updating method embodiment 1 based on UTXO model provided by the present application Flow chart, method includes the following steps:
Step S11, it in the case where the key of target user needs to update, obtains from block chain and is used for the target The last updated UTXO Transaction Information in family.
In the present embodiment, the structure of block chain may refer to Fig. 2, as shown in Fig. 2, block chain is by multiple full nodes and one Supervisory node is constituted, and each full node and supervisory node are stored with identical data, such as public key (the i.e. identity of user of user Information) and the information such as Your Majesty's key that generate of KGC.Supervisory node has higher permission relative to full node, is responsible for the initial body of user The registration of part information, and the key of user is updated under regulatory format.(in generation, refers to that people or various internet-of-things terminals set to user It is standby) by full node connection block chain network, realize mutual identity authentication and network information interaction.
Block chain is it is to be understood that public chain or alliance's chain.
It should be noted that the main private key that the private key and KGC of user generate is taken care of by user, it is not stored in block chain, Private key and main private key is avoided to reveal.
The identity information of user is registered, and the identity information of registration is stored into block chain.
It is understood that the identity information to user is registered, the initial authentication to user identity is realized.
In the present embodiment, close more new capital of key each time of user is stored in block chain as a transaction record On.Referring to the UTXO transaction form of bit coin, the structure of the UTXO Transaction Information redefined is as shown in table 1.Each UTXO is handed over Easy information only has one respectively and outputs and inputs, and input information can be understood as the relevant information of the user key before updating, defeated It is out the relevant information of updated user key.
Table 1
As shown in table 1, trade publisher identity information it is to be understood that can show that transaction publisher's identity letter Breath.
Index in input is used to indicate it as the position where output in last UTXO Transaction Information, i.e. instruction user Identification information before key updating and open parameter (e.g., Your Majesty's key and based on information such as IBE cryptographic parameters);In input Hash value is after carrying out Hash operation to last UTXO Transaction Information as a result, to verify to its integrality.
Output includes: corresponding identification information after user key updates, open parameter and validity period.Identity letter Breath is made of fixed identification information and variable identification information, and fixed identification information is the body of user's initial authentication Part mark, remains constant in renewal process thereafter, and the card property certainly of identity can be improved.Open parameter is mainly Your Majesty Key and based on the information such as IBE cryptographic parameter;Validity period indicates the updated effective life of user key, can be one Week, one month or 1 year etc..
Signing messages indicates to carry out entire UTXO Transaction Information (outputting and inputting) using the user key before updating Signature, to guarantee the validity of entire UTXO Transaction Information.
It should be noted that identification information, that is, user public key of user.
It is understood that the structure for the last updated UTXO Transaction Information of the target user may refer to table 1 The structure of the Transaction Information shown, details are not described herein.
For the last updated UTXO Transaction Information of the target user it is to be understood that being directed to target user, newest hair Cloth is to the UTXO Transaction Information in block chain.
Certainly, the validity period in table 1 and signing messages it is not necessary to, can according to need selection UTXO Transaction Information In whether include validity period or signing messages.
Step S12, the identity letter of the target user is obtained from the output information in the UTXO Transaction Information Breath.
In the present embodiment, the identity letter of target user is directly acquired from the output information in UTXO Transaction Information It ceases, and obtains Your Majesty's key of target user from the open parameter in output information.
The identification information of target user includes: fixed identification information and variable identification information.
In the present embodiment, user key renewal model is divided into two kinds: regulatory format and non-administrated mode.Regulatory format refers to Regulatory agency generates Your Majesty's key and main private key as KGC, and utilizes Your Majesty's key and main private key, generates the private key of user, and monitor The relevant information of user encryption, and by regulatory agency as UTXO Transaction Information publisher.
Non-administrated mode then indicates that regulatory agency can not obtain private key and associated encryption information of user etc., by user's conduct KGC generates Your Majesty's key and main private key, and utilizes Your Majesty's key and main private key, generates the private key of user.
If step S13, the described target user is non-by supervision user, to the main private key and Your Majesty's key of the target user It changes, and using the identification information of the target user and main private key and Your Majesty's key after change, updates the mesh Mark the private key of user.
Target user is non-by supervision user, it is possible to understand that are as follows: current key updating mode is non-administrated mode.
In the present embodiment, the main private key and Your Majesty's key of target user are changed, not to the identity of target user Information changes, and is changed by main private key to target user and Your Majesty's key, the private key of Lai Gengxin target user.Right When the private key of target user updates, the identity of target user can be improved from the property demonstrate,proved,
In this application, target user key need update in the case where, if target user be it is non-by supervision user, Then from the output information in UTXO Transaction Information obtain target user identification information and target user main private key and Your Majesty's key changes the main private key and Your Majesty's key of the target user, and is believed using the identity of the target user Main private key and Your Majesty's key after breath and change, update the private key of the target user, realize the update to the key of target user.
Also, it realizes that key updating process can be inquired, can be traced and can not be distorted using block chain, there is stronger reality With value.
As shown in Figure 3, it is a kind of IBE key updating method embodiment 2 based on UTXO model provided by the present application Flow chart, method includes the following steps:
Step S21, it in the case where the key of target user needs to update, obtains from block chain and is used for the target The last updated UTXO Transaction Information in family.
Step S22, the identity letter of the target user is obtained from the output information in the UTXO Transaction Information Breath.
The detailed process of step S21-S22 may refer to the related introduction of the step S11-S12 in embodiment 1, herein not It repeats again.
If step S23, the described target user is non-by supervision user, to the identification information of the target user into Row change, and using the identity information after the main private key of the target user and Your Majesty's key and change, update the target user Private key.
In the present embodiment, the identification information of target user is changed, keeps main private key and the master of target user Public key is constant, using the identification information after the main private key and Your Majesty's key of target user and change, updates the private of target user Key.
Certainly, when target user is the non-leakage by the private key of supervision user and target user, illustrate the body of target user Part identification information may be revealed, it is therefore desirable to change the identification information of target user.Therefore same using to the target The identification information of user changes, and is believed using the identity after the main private key of the target user and Your Majesty's key and change The mode of breath updates the private key of target user.
In this application, target user key need update in the case where, if target user be it is non-by supervision user, Then from the output information in UTXO Transaction Information obtain target user identification information and target user main private key and Your Majesty's key changes the identification information of the target user, and utilizes the main private key of the target user and Your Majesty Identification information after key and change, updates the private key of the target user, realizes the update to the key of target user.
As shown in Figure 4, it is a kind of IBE key updating method embodiment 3 based on UTXO model provided by the present application Flow chart, method includes the following steps:
Step S31, it in the case where the key of target user needs to update, obtains from block chain and is used for the target The last updated UTXO Transaction Information in family.
Step S32, the identity letter of the target user is obtained from the output information in the UTXO Transaction Information Breath.
The detailed process of step S31-S32 may refer to the related introduction of the step S11-S12 in embodiment 1, herein not It repeats again.
If step S33, the described target user is to be carried out by supervision user to the identification information of the target user Change, and using the identification information after the main private key of regulatory agency and Your Majesty's key and change, update the target user's Private key.
If target user is by supervision user, it is to be understood that current key updating mode is regulatory format.It is supervising Under pipe die formula, main private key and Your Majesty's key are generated by regulatory agency's management.
If target user be by supervision user, due under regulatory format, if change Your Majesty's key, what supervisory node was supervised The private key of all users is intended to change, and in order to simplify workload, then selects the identification information of change target user, keeps prison The main private key and Your Majesty's key of pipe mechanism are constant.
As another alternative embodiment of the application, referring to Fig. 5, for a kind of IBE based on UTXO model provided by the present application The flow diagram of key updating method embodiment 4, the present embodiment be mainly to above-described embodiment 1 describe based on UTXO model IBE key updating method expansion scheme, as shown in figure 5, this method may include but be not limited to following steps:
Step S41, it in the case where the key of target user needs to update, obtains from block chain and is used for the target The last updated UTXO Transaction Information in family.
Step S42, the identity letter of the target user is obtained from the output information in the UTXO Transaction Information Breath.
If step S43, the described target user is non-by supervision user, to the main private key and Your Majesty's key of the target user It changes, and using the identification information of the target user and main private key and Your Majesty's key after change, updates the mesh Mark the private key of user.
The detailed process of step S41-S43 may refer to the related introduction of the step S11-S13 in embodiment 1, herein not It repeats again.
Step S44, it will be directed toward the index of position of the output information in the UTXO Transaction Information in the block chain, And the cryptographic Hash of the UTXO Transaction Information inputs information as target.
Step S45, the identity of the open parameter comprising Your Majesty's key after the change and the target user are believed Breath, as target output information.
Step S46, the target UTXO Transaction Information for inputting information and the target output information comprising the target is sent out Cloth is into the block chain.
Target UTXO Transaction Information comprising target input information and the target output information is published to described In block chain, so that the relevant information of updated user key can inquire in block chain.
It certainly, can also include: that the updated key of the target user uses validity period in target output information.
Before can also including: the identity information of transaction publisher in the target UTXO Transaction Information and/or using update The private key of the target user information that information and the target output information are signed is inputted to the target.
As another alternative embodiment of the application, referring to Fig. 6, for a kind of IBE based on UTXO model provided by the present application The flow diagram of key updating method embodiment 5, the present embodiment be mainly to above-described embodiment 2 describe based on UTXO model IBE key updating method expansion scheme, as shown in fig. 6, this method may include but be not limited to following steps:
Step S51, it in the case where the key of target user needs to update, obtains from block chain and is used for the target The last updated UTXO Transaction Information in family.
Step S52, the identity letter of the target user is obtained from the output information in the UTXO Transaction Information Breath.
If step S53, the described target user is non-by supervision user, to the identification information of the target user into Row change, and using the identification information after the main private key of the target user and Your Majesty's key and change, update the target The private key of user.
The detailed process of step S51-S53 may refer to the related introduction of the step S21-S23 in embodiment 2, herein not It repeats again.
Step S54, it will be directed toward the index of position of the output information in the UTXO Transaction Information in the block chain, And the cryptographic Hash of the UTXO Transaction Information inputs information as target.
Step S55, the identity after the open parameter and the change of Your Majesty's key comprising the target user is believed Breath, as target output information.
Step S56, the target UTXO Transaction Information for inputting information and the target output information comprising the target is sent out Cloth is into the block chain.
Target UTXO Transaction Information comprising target input information and the target output information is published to described In block chain, so that the relevant information of updated user key can inquire in block chain.
It certainly, can also include: that the updated key of the target user uses validity period in target output information.
Before can also including: the identity information of transaction publisher in the target UTXO Transaction Information and/or using update The private key of the target user information that information and the target output information are signed is inputted to the target.
As another alternative embodiment of the application, referring to Fig. 7, for a kind of IBE based on UTXO model provided by the present application The flow diagram of key updating method embodiment 6, the present embodiment be mainly to above-described embodiment 1 describe based on UTXO model IBE key updating method expansion scheme, as shown in fig. 7, this method may include but be not limited to following steps:
Step S61, it in the case where the key of target user needs to update, obtains from block chain and is used for the target The last updated UTXO Transaction Information in family.
Step S62, the identity letter of the target user is obtained from the output information in the UTXO Transaction Information Breath.
If step S63, the described target user is non-by supervision user, to the main private key and Your Majesty's key of the target user It changes, and using the identification information of the target user and main private key and Your Majesty's key after change, updates the mesh Mark the private key of user.
The detailed process of step S61-S63 may refer to the related introduction of step S11-S13 in embodiment 1, herein no longer It repeats.
It step S64, will be newest more for the target user in the case where the key of the target user needs to nullify Output information in new UTXO Transaction Information is set as empty, and sets empty UTXO Transaction Information for output information and be published to In the block chain.
It will be set as empty for the output information in the last updated UTXO Transaction Information of the target user, and will output The UTXO Transaction Information that information is set as empty is published in the block chain, so as to inquire fall short user's in block chain The relevant information of key, achievees the purpose that cancellation.
As another alternative embodiment of the application, referring to Fig. 8, for a kind of IBE based on UTXO model provided by the present application The flow diagram of key updating method embodiment 7, the present embodiment be mainly to above-described embodiment 2 describe based on UTXO model IBE key updating method expansion scheme, as shown in figure 8, this method may include but be not limited to following steps:
Step S71, it in the case where the key of target user needs to update, obtains from block chain and is used for the target The last updated UTXO Transaction Information in family.
Step S72, the identity letter of the target user is obtained from the output information in the UTXO Transaction Information Breath.
If step S73, the described target user is non-by supervision user, to the identification information of the target user into Row change, and using the identification information after the main private key of the target user and Your Majesty's key and change, update the target The private key of user.
The detailed process of step S71-S73 may refer to the related introduction of step S21-S23 in embodiment 2, herein no longer It repeats.
It step S74, will be newest more for the target user in the case where the key of the target user needs to nullify Output information in new UTXO Transaction Information is set as empty, and sets empty UTXO Transaction Information for output information and be published to In the block chain.
The detailed process of step S74 may refer to the related introduction of step S64 in embodiment 6, and details are not described herein.
Next the IBE key update device provided by the present application based on UTXO model is introduced, is introduced below It can be mutual based on the IBE key update device of UTXO model and the IBE key updating method based on UTXO model described above To should refer to.
Fig. 9 is referred to, the IBE key update device based on UTXO model includes: that the first acquisition module 11, second obtains mould Block 12 and the first update module 13.
First obtains module 11, for obtaining needle from block chain in the case where the key of target user needs to update UTXO Transaction Information last updated to the target user;
Second obtains module 12, for obtaining the target user's from the output information in the UTXO Transaction Information Identification information;
First update module 13, if being non-by supervision user for the target user, to the master of the target user Private key and Your Majesty's key change, and utilize the identification information of the target user and main private key and Your Majesty after change Key updates the private key of the target user.
In the present embodiment, another IBE key update device based on UTXO model is introduced, referring to Figure 10, it is based on The IBE key update device of UTXO model includes: that the first acquisition module 11, second obtains module 12 and the second update module 14.
First obtains module 11, for obtaining needle from block chain in the case where the key of target user needs to update UTXO Transaction Information last updated to the target user;
Second obtains module 12, for obtaining the target user's from the output information in the UTXO Transaction Information Identification information;
Second update module 14, if being non-by supervision user for the target user, to the body of the target user Part identification information changes, and the identification information using the main private key of the target user and Your Majesty's key and after changing, Update the private key of the target user.
In the present embodiment, the above-mentioned IBE key update device based on UTXO model can also include:
Third update module, if being by supervision user, to the identity mark of the target user for the target user Know information to change, and the identification information using the main private key of regulatory agency and Your Majesty's key and after changing, described in update The private key of target user.
In the present embodiment, the above-mentioned IBE key update device based on UTXO model can also include:
First determining module, position of the output information in the block chain for that will be directed toward in the UTXO Transaction Information The cryptographic Hash of the index and the UTXO Transaction Information set inputs information as target;
Second determining module, for that will include the open parameter of Your Majesty's key after the change and the body of the target user Part identification information, as target output information;Or, by the open parameter and the change of Your Majesty's key comprising the target user Identification information afterwards, as target output information;
First release module, the target UTXO for that will include the target input information and the target output information are handed over Easy information is published in the block chain.
It can also include: that the updated key of the target user uses in the present embodiment, in the target output information Validity period;
Before can also including: the identity information of transaction publisher in the target UTXO Transaction Information and/or using update The private key of the target user information that information and the target output information are signed is inputted to the target.
In the present embodiment, the above-mentioned IBE key update device based on UTXO model can also include:
Second release module, for the target will to be directed in the case where the key of the target user needs to nullify Output information in the last updated UTXO Transaction Information of user is set as empty, and sets empty UTXO for output information and trade Information is published in the block chain.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other. For device class embodiment, since it is basically similar to the method embodiment, so being described relatively simple, related place ginseng See the part explanation of embodiment of the method.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in the process, method, article or apparatus that includes the element.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when application.
As seen through the above description of the embodiments, those skilled in the art can be understood that the application can It realizes by means of software and necessary general hardware platform.Based on this understanding, the technical solution essence of the application On in other words the part that contributes to existing technology can be embodied in the form of software products, the computer software product It can store in storage medium, such as ROM/RAM, magnetic disk, CD, including some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes the certain of each embodiment of the application or embodiment Method described in part.
A kind of IBE key updating method and device based on UTXO model provided herein has been carried out in detail above It introduces, specific examples are used herein to illustrate the principle and implementation manner of the present application, the explanation of above embodiments It is merely used to help understand the present processes and its core concept;At the same time, for those skilled in the art, according to this The thought of application, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification is not answered It is interpreted as the limitation to the application.

Claims (10)

1. a kind of IBE key updating method based on UTXO model characterized by comprising
In the case where the key of target user needs to update, obtained from block chain last updated for the target user UTXO Transaction Information;
The identification information of the target user is obtained from the output information in the UTXO Transaction Information;
If the target user changes the main private key and Your Majesty's key of the target user by supervision user to be non-, and Using the main private key and Your Majesty's key after the identification information and change of the target user, the private of the target user is updated Key;
Or, if the target user be it is non-by supervision user, the identification information of the target user is changed, and benefit With the identification information after the main private key and Your Majesty's key of the target user and change, the private key of the target user is updated.
2. the method according to claim 1, wherein the method also includes:
If the target user is to be changed to the identification information of the target user, and utilize by supervision user The main private key and Your Majesty's key of regulatory agency and the identification information after change, update the private key of the target user.
3. the method according to claim 1, wherein the method also includes:
The index for being directed toward position of the output information in the UTXO Transaction Information in the block chain and the UTXO are handed over The cryptographic Hash of easy information inputs information as target;
It is defeated as target by the open parameter comprising Your Majesty's key after the change and the identification information of the target user Information out;Or, by the identification information after the open parameter and the change of Your Majesty's key comprising the target user, as Target output information;
The target UTXO Transaction Information for inputting information and the target output information comprising the target is published to the block In chain.
4. according to the method described in claim 3, it is characterized in that, in the target output information further include: the target is used The updated key in family uses validity period;
In the target UTXO Transaction Information further include: the identity information and/or the mesh before use update for the publisher that trades The private key for marking user inputs the information that information and the target output information are signed to the target.
5. the method according to claim 1, wherein the method also includes:
It, will be for the last updated UTXO transaction of the target user in the case where the key of the target user needs to nullify Output information in information is set as empty, and sets empty UTXO Transaction Information for output information and be published to the block chain In.
6. a kind of IBE key update device based on UTXO model characterized by comprising
First obtains module, for being obtained for described from block chain in the case where the key of target user needs to update The last updated UTXO Transaction Information of target user;
Second obtains module, for obtaining the identity mark of the target user from the output information in the UTXO Transaction Information Know information;
First update module, if being non-by supervision user for the target user, to the main private key of the target user and Your Majesty's key changes, and using the identification information of the target user and main private key and Your Majesty's key after change, updates The private key of the target user;
Or, the second update module, if being non-by supervision user for the target user, to the identity mark of the target user Know information to change, and using the identification information after the main private key of the target user and Your Majesty's key and change, updates The private key of the target user.
7. device according to claim 6, which is characterized in that described device further include:
Third update module, if being to be believed by supervision user the identity of the target user for the target user Breath changes, and using the identification information after the main private key of regulatory agency and Your Majesty's key and change, updates the target The private key of user.
8. device according to claim 6, which is characterized in that described device further include:
First determining module, position of the output information in the block chain for that will be directed toward in the UTXO Transaction Information The cryptographic Hash of index and the UTXO Transaction Information inputs information as target;
Second determining module, for that will include the open parameter of Your Majesty's key after the change and the identity mark of the target user Information is known, as target output information;Or, by after the open parameter and the change of Your Majesty's key comprising the target user Identification information, as target output information;
First release module, for that will include the target UTXO transaction letter of the target input information and the target output information Breath is published in the block chain.
9. device according to claim 8, which is characterized in that in the target output information further include: the target is used The updated key in family uses validity period;
In the target UTXO Transaction Information further include: the identity information and/or the mesh before use update for the publisher that trades The private key for marking user inputs the information that information and the target output information are signed to the target.
10. device according to claim 6, which is characterized in that described device further include:
Second release module, for the target user will to be directed in the case where the key of the target user needs to nullify Output information in last updated UTXO Transaction Information is set as empty, and sets empty UTXO Transaction Information for output information It is published in the block chain.
CN201910661438.7A 2019-07-22 2019-07-22 UTXO model-based IBE key updating method and device Active CN110289962B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910661438.7A CN110289962B (en) 2019-07-22 2019-07-22 UTXO model-based IBE key updating method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910661438.7A CN110289962B (en) 2019-07-22 2019-07-22 UTXO model-based IBE key updating method and device

Publications (2)

Publication Number Publication Date
CN110289962A true CN110289962A (en) 2019-09-27
CN110289962B CN110289962B (en) 2020-06-30

Family

ID=68023727

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910661438.7A Active CN110289962B (en) 2019-07-22 2019-07-22 UTXO model-based IBE key updating method and device

Country Status (1)

Country Link
CN (1) CN110289962B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111586049A (en) * 2020-05-08 2020-08-25 国网电子商务有限公司 Lightweight key authentication method and device for mobile internet
CN112037056A (en) * 2020-08-20 2020-12-04 深圳大学 Transaction processing method, device, equipment and storage medium
CN113570370A (en) * 2021-07-29 2021-10-29 成都质数斯达克科技有限公司 UTXO-based block chain transaction supervision method and device and readable storage medium
CN113592650A (en) * 2021-07-29 2021-11-02 成都质数斯达克科技有限公司 Transaction method, device and equipment based on block chain intelligent contract

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103326853A (en) * 2012-03-22 2013-09-25 中兴通讯股份有限公司 Method and device for upgrading secret key
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN108551392A (en) * 2018-04-13 2018-09-18 武汉大学 A kind of Proxy Signature generation method and system based on SM9 digital signature
CN108564692A (en) * 2018-04-10 2018-09-21 周伟 A kind of unlock verification method and system for unlocking based on block chain
CN109327309A (en) * 2018-11-08 2019-02-12 北京中电华大电子设计有限责任公司 A kind of domain traversal key management method based on IBC Yu PKI mixed system
CN109829720A (en) * 2019-01-31 2019-05-31 中国—东盟信息港股份有限公司 A kind of identity real name authentication method based on block chain transaction data
CN109962777A (en) * 2017-12-26 2019-07-02 航天信息股份有限公司 The key in block catenary system is permitted to generate, obtain the method and apparatus of key

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103326853A (en) * 2012-03-22 2013-09-25 中兴通讯股份有限公司 Method and device for upgrading secret key
CN105701372A (en) * 2015-12-18 2016-06-22 布比(北京)网络技术有限公司 Block chain identity construction and verification method
CN109962777A (en) * 2017-12-26 2019-07-02 航天信息股份有限公司 The key in block catenary system is permitted to generate, obtain the method and apparatus of key
CN108564692A (en) * 2018-04-10 2018-09-21 周伟 A kind of unlock verification method and system for unlocking based on block chain
CN108551392A (en) * 2018-04-13 2018-09-18 武汉大学 A kind of Proxy Signature generation method and system based on SM9 digital signature
CN109327309A (en) * 2018-11-08 2019-02-12 北京中电华大电子设计有限责任公司 A kind of domain traversal key management method based on IBC Yu PKI mixed system
CN109829720A (en) * 2019-01-31 2019-05-31 中国—东盟信息港股份有限公司 A kind of identity real name authentication method based on block chain transaction data

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111586049A (en) * 2020-05-08 2020-08-25 国网电子商务有限公司 Lightweight key authentication method and device for mobile internet
CN112037056A (en) * 2020-08-20 2020-12-04 深圳大学 Transaction processing method, device, equipment and storage medium
CN112037056B (en) * 2020-08-20 2024-04-09 深圳大学 Transaction processing method, device, equipment and storage medium
CN113570370A (en) * 2021-07-29 2021-10-29 成都质数斯达克科技有限公司 UTXO-based block chain transaction supervision method and device and readable storage medium
CN113592650A (en) * 2021-07-29 2021-11-02 成都质数斯达克科技有限公司 Transaction method, device and equipment based on block chain intelligent contract
CN113570370B (en) * 2021-07-29 2023-10-20 成都质数斯达克科技有限公司 UTXO-based blockchain transaction supervision method and device and readable storage medium
CN113592650B (en) * 2021-07-29 2023-10-24 成都质数斯达克科技有限公司 Transaction method, device and equipment based on blockchain intelligent contract

Also Published As

Publication number Publication date
CN110289962B (en) 2020-06-30

Similar Documents

Publication Publication Date Title
CN110289962A (en) A kind of IBE key updating method and device based on UTXO model
JP7292365B2 (en) Cryptographic methods and systems for secure extraction of data from blockchains
CN108681966B (en) Information supervision method and device based on block chain
TWI666902B (en) Robust ATM network system and information processing method based on blockchain technology
CN108600272A (en) A kind of block chain data processing method, device, processing equipment and system
CN108737403A (en) A kind of block chain data processing method, device, processing equipment and system
CN108647968A (en) A kind of block chain data processing method, device, processing equipment and system
CN109547477A (en) A kind of data processing method and its device, medium, terminal
CN106066958A (en) The certification of subscriber computer
CN110166254A (en) The key managing project and device of identity-based are realized using intelligent contract
CN112069550B (en) Electronic contract evidence-storing system based on intelligent contract mode
CN106650495A (en) File verification method and device
CN111586049A (en) Lightweight key authentication method and device for mobile internet
CN114465817B (en) Digital certificate system and method based on TEE predictor clusters and blockchain
CN101252432B (en) Field managing server and system, digital authority managing method based on field
CN104182525B (en) Using the electronic records management device of the close algorithm of multimedia file and state for having copyright protection function
CN112231755A (en) Data authorization method, device and system based on block chain
CN114443754A (en) Block chain-based federated learning processing method, device, system and medium
CN108833133A (en) Network configuration management method, apparatus and storage medium based on system for cloud computing
CN110599384A (en) Organization relation transfer method, device, equipment and storage medium
CN103532709A (en) IBE (Identity Based Encryption) cryptographic equipment and data encryption and decryption method
CN116560863A (en) Task management method and device based on block chain and computer equipment
CN110493011A (en) Certificate authority management method and device based on block chain
CN115953244A (en) Transaction supervision method and device based on block chain, electronic equipment and storage medium
CN109033776A (en) A kind of personnel management methods, system, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 100032 room 8018, 8 / F, building 7, Guangyi street, Xicheng District, Beijing

Patentee after: State Grid Digital Technology Holdings Co.,Ltd.

Patentee after: Guowang Xiongan Finance Technology Group Co.,Ltd.

Patentee after: STATE GRID CORPORATION OF CHINA

Address before: 100053 8th floor, Xianglong business building, 311 guanganmennei street, Xicheng District, Beijing

Patentee before: STATE GRID ELECTRONIC COMMERCE Co.,Ltd.

Patentee before: Guowang Xiongan Finance Technology Group Co.,Ltd.

Patentee before: STATE GRID CORPORATION OF CHINA