CN110457389A - A kind of underlay approach that block chain multichain data information is synchronous - Google Patents

A kind of underlay approach that block chain multichain data information is synchronous Download PDF

Info

Publication number
CN110457389A
CN110457389A CN201910628987.4A CN201910628987A CN110457389A CN 110457389 A CN110457389 A CN 110457389A CN 201910628987 A CN201910628987 A CN 201910628987A CN 110457389 A CN110457389 A CN 110457389A
Authority
CN
China
Prior art keywords
block
multichain
catenary system
data information
synchronous
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910628987.4A
Other languages
Chinese (zh)
Other versions
CN110457389B (en
Inventor
王纪涛
孙国梓
谷宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201910628987.4A priority Critical patent/CN110457389B/en
Publication of CN110457389A publication Critical patent/CN110457389A/en
Application granted granted Critical
Publication of CN110457389B publication Critical patent/CN110457389B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Storage Device Security (AREA)

Abstract

A kind of underlay approach that block chain multichain data information is synchronous, include the following steps: step S1, multichain data information synchronous processing module data information synchronous needed for obtaining, recycle the common recognition mechanism of block catenary system that data information is packaged in a new block, the block that block catenary system marks this new is the candidate blocks of " contact block ";Step S2, it after the candidate blocks of " contact block " generate, persistently detects the signal that the multichain authentication module outside block catenary system is sent and then obtains block nearest in current main chain when detecting the signal for being ready for finishing;Step S3, nearest block is directed toward the candidate blocks of " contact block " in the current main chain that will acquire, and the candidate blocks of " contact block " rise to " contact block " at this time;Step S4, the synchronous information of inquiry in " contact block ".This method combines the authentication module outside block chain multichain data information synchronous processing module and block chain, can effectively realize the synchronizing information of multichain data;And guarantee the safety of interaction, the multichain network system suitable for different blocks catenary system composition using cryptological technique during synchronizing information.

Description

A kind of underlay approach that block chain multichain data information is synchronous
Technical field
The invention belongs to block chain information technical fields, and in particular to a kind of bottom that block chain multichain data information is synchronous Method.
Background technique
Currently, the research progress of block chain Floor layer Technology has gone to a bottleneck period, most of block chain row dealers are Very big expectation is had in arms to the universal of block chain.Various due to present block platform chain, the bottom of each block platform chain is set Meter has the unique distinction of oneself again.However, block chain bottom generates the block of record data with common recognition mechanism, if having one A multichain system wants that several relevant informations are recorded on different chains simultaneously, and the difference for mechanism of knowing together at this time, block generate Mode difference can all cause information that the time irreversibility of chain is recorded, this can be generated in multichain system much inevitably asks Topic.Therefore, it is desirable to which it is the severe problem of a comparison that the related data holding allowed between different blocks chain, which synchronizes,.
Summary of the invention
The technical problem to be solved by the present invention is to overcome the deficiencies of the prior art and provide a kind of block chain multichain data letter Synchronous underlay approach is ceased, block chain multichain data information synchronous processing module is mutually tied with the authentication module outside block chain It closes, can effectively realize the synchronizing information of multichain data;And interaction is guaranteed using cryptological technique during synchronizing information Safety, the multichain network system suitable for different blocks catenary system composition.
The present invention provides a kind of underlay approach that block chain multichain data information is synchronous, includes the following steps:
Step S1, multichain data information synchronous processing module data information synchronous needed for obtaining, recycles block linkwork Data information is packaged in a new block by the common recognition mechanism of system, and the block that block catenary system marks this new is " contact block " Candidate blocks;
Step S2, it after the candidate blocks of " contact block " generate, persistently detects the multichain authentication module outside block catenary system and sends Signal then obtain block nearest in current main chain when detecting the signal for being ready for finishing;
Step S3, nearest block is directed toward the candidate blocks of " contact block " in the current main chain that will acquire, at this time the time of " contact block " Block is selected to rise to " contact block ";
Step S4, the synchronous information of inquiry in " contact block ".
As further technical solution of the present invention, " contact block " is same for specially recording multichain in all blocks of region chain The block of step data information.
Further, block nearest in current main chain be block chain all blocks in be newly generated and be present in main chain On block.
Further, in step S3, nearest block is directed toward the hash value of the candidate blocks of " contact block " in current main chain.
Further, authentication module is that each block catenary system sends final signal, and final signal is that block catenary system is The no integrated signal for having been prepared for finishing.
Further, the signal that multichain authentication module is sent carries out encrypted and digitally signed, password using cryptographic algorithm Algorithm is elliptical arch algorithm, and specific ciphering process is as follows:
Before region catenary system sends signal content, multichain authentication module presets an elliptic curve Ep (a, b), and chooses it Go up some G as basic point;Region catenary system generates public key by private key privateKey, that is,
PublicKey=privateKey G;
Elliptic curve Ep (a, b), public key publicKey and basic point G are sent to block catenary system by multichain authentication module, After block catenary system receives information, signal content to be sent is encoded to the point M on curve Ep (a, b), and generate with Machine integer r, it is exactly two rectangular co-ordinates calculated according to M and r that block catenary system, which calculates C1 and C2, C1 and C2 according to M and r, The point fastened, that is,
C1=M+r × publicKey
C2=r × G
And C1 and C2 are sent to multichain authentication module.
Further, ellipse curve signature process are as follows:
Region catenary system generates one group of public private key pair, in fact basic point G=G (x, y), and selects a random number r, passes through letter Breath M, cryptographic Hash H and private key K calculate S=(H+Kx/r);Message M and signature { rG, S } are finally sent to multichain verifying mould Block after multichain authentication module receives information, is verified signature with public key.
Further, after multichain authentication module is digitally signed verifying to ciphertext, ciphertext is decrypted again, it will be each The signal content of block catenary system carries out an AND operation, and operation result is passed through elliptic curve cryptography and carries out digital label Name, is subsequently sent to each block catenary system.
The invention has the benefit that
1) the multichain synchronizing information in network delay is realized.
2) privacy of block chain verification information in multichain verification process is effectively ensured.
3) scalability of this method is strong.
Detailed description of the invention
Fig. 1 is multichain data information synchronous processing module architecture diagram of the invention;
Fig. 2 is multichain authentication module architecture diagram of the invention.
Specific embodiment
Referring to Fig. 1, in the framework of multichain data information synchronous processing module,
Block (the area generated earliest that earliest block: generating earliest in all blocks of block chain and is present on main chain Block may not necessarily access main chain).
Block (the area being newly generated that nearest block: being newly generated in all blocks of block chain and is present on main chain Block may not necessarily access main chain).
The block that will be generated: the block of nearest block will be directed toward in all blocks of block chain.
Contact block: for specially recording the block of multichain synchrodata information, the usual block quilt in all blocks of block chain Certain block is directed toward in main chain.
The present embodiment specific operating process is as follows:
The running of the module needs to interact with outside multichain authentication module, when entire block catenary system receives need to be into When the request signal that row multichain data information synchronizes, system will trigger the synchronization of multichain data information, that is, multichain data Synchronizing information processing module is started to work.
1) after triggering multichain data information synchronous processing module, module will obtain needing synchronous data information, Then the data information of acquisition is packaged in a new block by the common recognition mechanism of the block catenary system, the process and master The mode that chain generates block is consistent.But by the block that the module generates be not generate just it is linked on main chain, at this time it It is present in block catenary system as " lonely block ", and special marking is carried out to " the lonely block ", identifies the candidate that it is " contact block " Block.The generation of the block has miner as main chain block and digs mine reward, these contents at this time and are not disclosed in block chain In system, but these information temporarily are stored.Referred to herein as " delay reward ".The entire candidate blocks mistake for generating " contact block " Journey does not influence the generation of block on main chain, and main chain, which is constantly in, during being somebody's turn to do digs in mine generation block.The generation block of main chain and It is isolation that the process, which generates block, is independent of each other.
2) after the candidate blocks of " contact block " generate, the multichain authentication module for starting to continue outside detection block catenary system is transmitted across The signal come just obtains block nearest in current main chain once detecting the signal for being ready for finishing immediately.
3) after the module obtains current block recently, then " contact block " candidate blocks generated before finding, the working as of acquisition is allowed Preceding nearest block is directed toward " contact block " candidate blocks hash value.At this point, " contact block " candidate blocks rise to " contact block ".
4) after " contact block " is born, from the miner for inquiring the block in " contact block " and mine reward is dug, at once provides delay Miner's reward is sent to miner, and entire synchronizing information process terminates at this time.
" contact block " is connected on main chain as a subbranch, this mode both ensure that entire block catenary system more pacify Entirely, synchronizing information of the multichain system in network delay is also achieved.
Guaranteeing that the safer reason of entire block catenary system is, traditional block catenary system only has a smooth main chain, And determine which item be the standard of main chain is which branch is longer.Make entire block catenary system more multiple by increasing " contact block " It is miscellaneous, by the quantity of contact block also as the standard for determining main chain, then for attacker, it is necessary to consider more factors, Attack difficulty is caused to greatly increase, so that entire block catenary system is safer.
For the synchronizing information in network delay, perhaps the common recognition mechanism of multiple block catenary systems be different originally, just At last using the same common recognition mechanism, the digging mine speed of each block catenary system is also discrepant.By digging mine in advance Block is got out, after each block catenary system is ready to such block, by allowing current block to be recently directed toward " contact block " The mode of candidate blocks is almost synchronization in user level, and maximum time difference will not be greater than network delay.
From the angle of user, user will not experience the processing variation of block chain bottom, while also assure multichain data The synchronization cochain of information.
Referring to Fig. 2, it is outside block catenary system, dedicated for more in auxiliary block catenary system that multichain authentication module, which is in, Chain data information synchronous processing module.
The module specific operating process is as follows:
Data information synchronizes after chain process starts, and each block catenary system can continue to send whether they have been prepared for Signal.Since each block catenary system need to only be concerned about whether owner is ready for the final signal finished, without knowing The signal that other block catenary systems are sent in the process.In order to reach such effect, present invention employs multi-party computations Mode carries out signal processing.Multi-party computations are exactly one group of participant, are mutually mistrustful between them, but they Wish to obtain when calculating an agreement function correctly as a result, the output data of each participant is secrecy simultaneously.Therefore pacify Complete multi-party calculating is suitable for the authentication module.
Each block catenary system needs to calculate signal content using cryptography before sending the signal whether having had been prepared for Method carries out encrypted and digitally signed.Such purpose is to ensure that the privacy of each block catenary system signal, verify simultaneously Module can be verified the whether corresponding block catenary system of the signal received by way of digital signature and be sended over.
The cryptographic algorithm used is elliptic curve (ECC).Elliptic Curve Cryptography is a kind of to establish public-key cryptography The algorithm of encryption is based on elliptic curve mathematics.In the present invention, signal encryption process is as follows:
Before block catenary system A sends signal content, authentication module selectes an elliptic curve Ep (a, b) in advance, and It chooses on elliptic curve a bit, as basic point G;Subsequent system passes through in one private key of selection taken as privateKey PrivateKey generates public key, that is,
PublicKey=privateKey_G
Elliptic curve Ep (a, b), public key publicKey and basic point G are sent to block catenary system A by authentication module;Area After block catenary system A receives the information, signal content to be sent is encoded to the point M on Ep (a, b), and generate one with Machine integer r;Block catenary system A passes through M and r calculating again and acquires C1 and C2, and C1 and C2 are exactly two calculated according to M and r The point that rectangular co-ordinate is fastened, that is,
C1=M+r × publicKey
C2=r × G
C1 and C2 are sent to authentication module again by block catenary system A, and authentication module passes through C1, the C2 and private key received PrivateKey is decrypted point M (point can be acquired by C1 and C2) in the signal that can be obtained block catenary system A transmission Hold.
Ellipse curve signature (ECDSA) process is as follows:
Block catenary system A generates one group of public private key pair, in fact one random number r of basic point G=G (x, y) and selection, by disappearing M, Hash H, private key K are ceased, S=(H+Kx/r) is calculated;Message M and signature { rG, S } are finally sent to authentication module;Verifying After module receives information, signature is verified with public key, sender is strictly block catenary system A if being proved to be successful.
The each block catenary system of the module signal transmission be lasting, therefore in authentication module by multiple threads to each Signal content ciphertext after the ciphering signature that block catenary system is sent is handled.Authentication module is digitally signed ciphertext and tests After card, ciphertext is decrypted again.The signal content of each block catenary system is subjected to an AND operation, that is,
Signal 1&& signal 2&& ... && signal N
The result is passed through into elliptic curve cryptography and is digitally signed, each block catenary system is subsequently sent to.At this In carry out encrypted and digitally signed purpose be, prevent attacker from distorting information so that each block catenary system was subject to Final signal is variant, sends exception so as to cause data information is synchronous.
The mode that the authentication module application safety calculates in many ways ensures each block catenary system signal under multichain system Privacy, and signal content is encrypted and signed using Elliptic Curve Cryptography algorithm, it ensure that signal content in transmission process In safety.
Authentication module outside block chain multichain data information synchronous processing module and block chain combines, and can reach well The effect synchronous to multichain data information, and under the guarantee of cryptological technique, it is safely interacted, can be adapted for difference The multichain network system of block catenary system composition.
The basic principles, main features and advantages of the invention have been shown and described above.Those skilled in the art should Understand, the present invention do not limited by above-mentioned specific embodiment, the description in above-mentioned specific embodiment and specification be intended merely into One step illustrates the principle of the present invention, and under the premise of not departing from spirit of that invention range, the present invention also has various change and changes Into these changes and improvements all fall within the protetion scope of the claimed invention.The scope of protection of present invention is by claim Book and its equivalent thereof.

Claims (8)

1. a kind of synchronous underlay approach of block chain multichain data information, which comprises the steps of:
Step S1, multichain data information synchronous processing module data information synchronous needed for obtaining, recycles block catenary system Data information is packaged in a new block by common recognition mechanism, and the block that block catenary system marks this new is the candidate of " contact block " Block;
Step S2, after the candidate blocks of " contact block " generate, the letter that the multichain authentication module outside block catenary system is sent persistently is detected Number, when detecting the signal for being ready for finishing, then obtain block nearest in current main chain;
Step S3, nearest block is directed toward the candidate blocks of " contact block " in the current main chain that will acquire, at this time the candidate blocks of " contact block " Rise to " contact block ";
Step S4, the synchronous information of inquiry in " contact block ".
2. a kind of synchronous underlay approach of block chain multichain data information according to claim 1, which is characterized in that described " contact block " is in all blocks of region chain for specially recording the block of multichain synchrodata information.
3. a kind of synchronous underlay approach of block chain multichain data information according to claim 1, which is characterized in that described In current main chain nearest block be block chain all blocks in be newly generated and be present in the block on main chain.
4. a kind of synchronous underlay approach of block chain multichain data information according to claim 1, which is characterized in that described In step S3, nearest block is directed toward the hash value of the candidate blocks of " contact block " in current main chain.
5. a kind of synchronous underlay approach of block chain multichain data information according to claim 1, which is characterized in that described Authentication module is that each block catenary system sends final signal, and it is comprehensive whether final signal has been prepared for finishing for block catenary system Close signal.
6. a kind of synchronous underlay approach of block chain multichain data information according to claim 1, which is characterized in that described The signal that multichain authentication module is sent carries out encrypted and digitally signed using cryptographic algorithm, and the cryptographic algorithm is ellipse Type algorithm, specific ciphering process are as follows:
Before region catenary system sends signal content, multichain authentication module preset an elliptic curve Ep (a, b), and selection thereon one Put G as basic point;Region catenary system generates public key by private key privateKey, that is, publicKey=privateKey_G;
Elliptic curve Ep (a, b), public key publicKey and basic point G are sent to block catenary system, block by multichain authentication module After catenary system receives information, signal content to be sent is encoded to the point M on curve Ep (a, b), and generates random whole Number r, it is exactly that two rectangular co-ordinates calculated according to M and r are fastened that block catenary system, which calculates C1 and C2, C1 and C2 according to M and r, Point, that is,
C1=M+r × publicKey
C2=r × G
And C1 and C2 are sent to multichain authentication module.
7. a kind of synchronous underlay approach of block chain multichain data information according to claim 6, which is characterized in that described Ellipse curve signature process are as follows:
Region catenary system generates one group of public private key pair, in fact basic point G=G (x, y), and selects a random number r, by information M, Cryptographic Hash H and private key K calculates S=(H+Kx/r);Message M and signature { rG, S } are finally sent to multichain authentication module, it is more After chain authentication module receives information, signature is verified with public key.
8. a kind of synchronous underlay approach of block chain multichain data information according to claim 1, which is characterized in that described After multichain authentication module is digitally signed verifying to ciphertext, ciphertext is decrypted again, by the signal of each block catenary system Content carries out an AND operation, and operation result is passed through elliptic curve cryptography and is digitally signed, is subsequently sent to each Block catenary system.
CN201910628987.4A 2019-07-12 2019-07-12 Bottom layer method for synchronizing information of block chain multi-chain data Active CN110457389B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910628987.4A CN110457389B (en) 2019-07-12 2019-07-12 Bottom layer method for synchronizing information of block chain multi-chain data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910628987.4A CN110457389B (en) 2019-07-12 2019-07-12 Bottom layer method for synchronizing information of block chain multi-chain data

Publications (2)

Publication Number Publication Date
CN110457389A true CN110457389A (en) 2019-11-15
CN110457389B CN110457389B (en) 2023-06-02

Family

ID=68482734

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910628987.4A Active CN110457389B (en) 2019-07-12 2019-07-12 Bottom layer method for synchronizing information of block chain multi-chain data

Country Status (1)

Country Link
CN (1) CN110457389B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111652613A (en) * 2020-04-15 2020-09-11 珠海小礼鱼科技有限公司 Intelligent block chain account distribution system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109189853A (en) * 2018-08-08 2019-01-11 众安信息技术服务有限公司 Method of data synchronization and device between a kind of block chain
CN109379429A (en) * 2018-10-25 2019-02-22 龚玉环 A kind of multichain management method and system based on block chain
CN109493222A (en) * 2018-10-18 2019-03-19 尚维斯 A kind of method of any number of block chain account book real-time synchronizations
WO2019052286A1 (en) * 2017-09-12 2019-03-21 广州广电运通金融电子股份有限公司 User identity verification method, apparatus and system based on blockchain
CN109522363A (en) * 2018-10-18 2019-03-26 上海达家迎信息科技有限公司 Cloud platform synchronous method, system, equipment and storage medium based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019052286A1 (en) * 2017-09-12 2019-03-21 广州广电运通金融电子股份有限公司 User identity verification method, apparatus and system based on blockchain
CN109189853A (en) * 2018-08-08 2019-01-11 众安信息技术服务有限公司 Method of data synchronization and device between a kind of block chain
CN109493222A (en) * 2018-10-18 2019-03-19 尚维斯 A kind of method of any number of block chain account book real-time synchronizations
CN109522363A (en) * 2018-10-18 2019-03-26 上海达家迎信息科技有限公司 Cloud platform synchronous method, system, equipment and storage medium based on block chain
CN109379429A (en) * 2018-10-25 2019-02-22 龚玉环 A kind of multichain management method and system based on block chain

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ANKUSH SINGLA 等: "Blockchain-based PKI solutions for IoT", 《2018 IEEE 4TH INTERNATIONAL CONFERENCE ON COLLABORATION AND INTERNET COMPUTING》 *
中国再保险(集团)股份有限公司 等: "一区、双块、多链、全程区块链技术助力创新再保险交易流程", 《上海保险》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111652613A (en) * 2020-04-15 2020-09-11 珠海小礼鱼科技有限公司 Intelligent block chain account distribution system

Also Published As

Publication number Publication date
CN110457389B (en) 2023-06-02

Similar Documents

Publication Publication Date Title
CN106411521B (en) Identity authentication method, device and system for quantum key distribution process
CN109067524B (en) Public and private key pair generation method and system
CN107094077B (en) License chain account system without limiting signature algorithm
KR100823738B1 (en) Method for integrity attestation of a computing platform hiding its configuration information
US20070033141A1 (en) Information transmission system, and information sending apparatus and information receiving apparatus used therein
CN109150897B (en) End-to-end communication encryption method and device
KR20140122188A (en) Method for detecting a manipulation of a sensor and/or sensor data of the sensor
CN103414690A (en) Publicly-verifiable cloud data possession checking method
US20190097805A1 (en) Security device for providing security function for image, camera device including the same, and system on chip for controlling the camera device
US20150043735A1 (en) Re-encrypted data verification program, re-encryption apparatus and re-encryption system
CN111010265B (en) Block chain organization key management method based on hierarchical key and BLS digital signature
CN109034796A (en) Transaction monitoring and managing method, electronic device and readable storage medium storing program for executing based on alliance's chain
CN109905384B (en) Data migration method and system
CN113609213B (en) Method, system, device and storage medium for synchronizing device keys
CN104836784A (en) Information processing method, client, and server
CN110941857A (en) Privacy management system and method of block chain intelligent contract platform
CN114598533B (en) Block chain side chain cross-chain identity trusted authentication and data encryption transmission method
CN105471657B (en) inter-domain communication log management method, device and system for virtual machine
CN103532709B (en) A kind of IBE encryption apparatus and data encryption/decryption method
CN110457389A (en) A kind of underlay approach that block chain multichain data information is synchronous
DE60202149D1 (en) PROCESS FOR CRYPTOGRAPHIC AUTHENTICATION
CN111737766B (en) Method for judging validity of digital certificate signature data in block chain
CN109495257B (en) Data acquisition unit encryption method based on improved SM2 cryptographic algorithm
CN109102294B (en) Information transmission method and device
JP2005012466A (en) Message authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant