CN110457389B - Bottom layer method for synchronizing information of block chain multi-chain data - Google Patents

Bottom layer method for synchronizing information of block chain multi-chain data Download PDF

Info

Publication number
CN110457389B
CN110457389B CN201910628987.4A CN201910628987A CN110457389B CN 110457389 B CN110457389 B CN 110457389B CN 201910628987 A CN201910628987 A CN 201910628987A CN 110457389 B CN110457389 B CN 110457389B
Authority
CN
China
Prior art keywords
block
chain
touch
blockchain
data information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910628987.4A
Other languages
Chinese (zh)
Other versions
CN110457389A (en
Inventor
王纪涛
孙国梓
谷宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing University of Posts and Telecommunications filed Critical Nanjing University of Posts and Telecommunications
Priority to CN201910628987.4A priority Critical patent/CN110457389B/en
Publication of CN110457389A publication Critical patent/CN110457389A/en
Application granted granted Critical
Publication of CN110457389B publication Critical patent/CN110457389B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Measurement Of The Respiration, Hearing Ability, Form, And Blood Characteristics Of Living Organisms (AREA)
  • Storage Device Security (AREA)

Abstract

A bottom layer method for synchronizing block chain multi-chain data information comprises the following steps: step S1, a multi-chain data information synchronous processing module acquires data information to be synchronized, and then the data information is packaged in a new block by utilizing a consensus mechanism of a block chain system, and the new block is marked as a candidate block of a touch block by the block chain system; step S2, after candidate blocks of the 'touch block' are generated, continuously detecting signals sent by a multi-chain verification module outside the block chain system, and acquiring the nearest block in the current main chain when the prepared signals are detected; step S3, pointing the nearest block in the acquired current main chain to a candidate block of the 'touch block', and rising the candidate block of the 'touch block' to be the 'touch block'; and S4, inquiring synchronous information in the touch block. According to the method, the information synchronization processing module of the multi-chain data of the block chain is combined with the verification module outside the block chain, so that the information synchronization of the multi-chain data can be effectively realized; and in the information synchronization process, the security of interaction is ensured by adopting a cryptography technology, and the method is applicable to a multi-chain network system formed by different block chain systems.

Description

Bottom layer method for synchronizing information of block chain multi-chain data
Technical Field
The invention belongs to the technical field of block chain information, and particularly relates to a bottom layer method for synchronizing block chain multi-chain data information.
Background
At present, the research process of the block chain bottom technology goes to a bottleneck period, and most of block chain industries hold great expectations for popularization of block chains. Because of the great variety of blockchain platforms today, the underlying design of each blockchain platform is unique. However, the blockchain bottom layer uses a consensus mechanism to generate blocks for recording data, and if a multi-chain system wants to record several pieces of related information on different chains at the same time, the time of recording information on the chains is not synchronous due to different consensus mechanisms and different block generation manners, which causes a plurality of unavoidable problems in the multi-chain system. Therefore, it is a serious problem to keep the related data between different block chains synchronized.
Disclosure of Invention
The invention aims to solve the technical problem of overcoming the defects of the prior art and providing a bottom layer method for synchronizing the information of the multi-chain data of the block chain, wherein the information synchronization processing module of the multi-chain data of the block chain is combined with a verification module outside the block chain, so that the information synchronization of the multi-chain data can be effectively realized; and in the information synchronization process, the security of interaction is ensured by adopting a cryptography technology, and the method is applicable to a multi-chain network system formed by different block chain systems.
The invention provides a bottom layer method for synchronizing information of block chain multi-chain data, which comprises the following steps:
step S1, a multi-chain data information synchronous processing module acquires data information to be synchronized, and then the data information is packaged in a new block by utilizing a consensus mechanism of a block chain system, and the new block is marked as a candidate block of a touch block by the block chain system;
step S2, after candidate blocks of the 'touch block' are generated, continuously detecting signals sent by a multi-chain verification module outside the block chain system, and acquiring the nearest block in the current main chain when the prepared signals are detected;
step S3, pointing the nearest block in the acquired current main chain to a candidate block of the 'touch block', and rising the candidate block of the 'touch block' to be the 'touch block';
and S4, inquiring synchronous information in the touch block.
As a further technical solution of the present invention, a "touch pad" is a block used for specially recording multi-chain synchronization data information among all blocks of a regional chain.
Further, the nearest block in the current backbone is the block that was most recently generated and present on the backbone from all blocks of the blockchain.
Further, in step S3, the nearest block in the current main chain points to the Hash value of the candidate block of the "touch block".
Further, the verification module sends a final signal to each blockchain system, the final signal being an integrated signal of whether the blockchain system is ready.
Further, the signal sent by the multi-chain verification module is encrypted and digitally signed by adopting a cryptography algorithm, wherein the cryptography algorithm is an elliptic linear algorithm, and the specific encryption process is as follows:
before the regional chain system sends the signal content, the multi-chain verification module presets an elliptic curve Ep (a, b), and selects one point above the elliptic curve Ep as a base point G; the local chain system generates a public key, i.e.,
publicKey=privateKey G;
the multi-chain verification module sends the elliptic curve Ep (a, b), the public key public Key and the base point G to the blockchain system, after the blockchain system receives the information, the content of the signal to be sent is encoded to a point M on the curve Ep (a, b) and a random integer r is generated, the blockchain system calculates C1 and C2 according to M and r, and the C1 and C2 are points on two rectangular coordinate systems calculated according to M and r, namely,
C1=M+r×publicKey
C2=r×G
and sends C1 and C2 to the multiplex authentication module.
Further, the elliptic curve signing process is as follows:
the regional chain system generates a group of public and private key pairs, the real point G=G (x, y), a random number r is selected, and S= (H+Kx/r) is calculated through the information M, the hash value H and the private key K; and finally, the message M and the signature { rG, S } are sent to a multi-chain verification module, and the signature is verified by a public key after the multi-chain verification module receives the message.
Further, after the digital signature verification is performed on the ciphertext, the ciphertext is decrypted, the AND operation is performed on the signal content of each blockchain system, the operation result is encrypted through an elliptic curve and is subjected to digital signature, and then the digital signature is sent to each blockchain system.
The beneficial effects of the invention are as follows:
1) And realizing the synchronization of the multi-chain information in the network delay.
2) The privacy of the block chain verification information in the multi-chain verification process is effectively guaranteed.
3) The method has strong expandability.
Drawings
FIG. 1 is a diagram of a multi-chain data information synchronization processing module architecture of the present invention;
fig. 2 is a diagram of a multi-chain authentication module architecture according to the present invention.
Detailed Description
Referring to fig. 1, in the architecture of the multi-link data information synchronization processing module,
the earliest block: the earliest generated block among all blocks in the blockchain and present on the backbone (the earliest generated block does not necessarily have access to the backbone).
The nearest block: the most recently generated block of the blockchain is the block that is present on the backbone (the most recently generated block is not necessarily accessible to the backbone).
The block to be generated: all blocks in the blockchain will point to the block that is the nearest block.
A touch block: a block of all blocks of a blockchain that is used to specifically record the information of the multi-chain synchronization data is typically pointed to by a block in the main chain.
The specific operation flow of this embodiment is as follows:
the operation of the module needs to interact with an external multi-chain verification module, and when the whole blockchain system receives a request signal for multi-chain data information synchronization, the system triggers the synchronization of the multi-chain data information, namely the multi-chain data information synchronization processing module starts working.
1) When the multi-chain data information synchronous processing module is triggered, the module can obtain the data information to be synchronized, and then the obtained data information is packed into a new block through the consensus mechanism of the block chain system, and the process is consistent with the mode of generating the block by the main chain. The block generated by the module is not generated and is accessed to the main chain, at the moment, the block is used as a 'solitary block' to exist in the blockchain system, and the 'solitary block' is specially marked to identify the candidate block which is a 'touch block'. The generation of this block, like the main chain block, has miners and mining rewards, which are not disclosed in the blockchain system at this time, but rather the information is stored temporarily. Referred to herein as a "delay prize". The whole process of generating the candidate blocks of the 'touch block' does not influence the generation of blocks on the main chain, and the main chain is always in the mining generation block in the process. The generation blocks of the main chain and the generation blocks of the process are isolated and do not affect each other.
2) After the candidate block of the touch block is generated, the signal sent by the multi-chain verification module outside the blockchain system starts to be continuously detected, and once the prepared signal is detected, the nearest block in the current main chain is acquired.
3) After the module obtains the current nearest block, the module finds the previous generated 'touch block' candidate block, and leads the obtained current nearest block to point to the Hash value of the 'touch block' candidate block. At this time, the "touch block" candidate block rises to "touch block".
4) After the 'touch block' is born, the miner and the mining rewards of the block are inquired from the 'touch block', and the miner rewards which are delayed to be issued are immediately sent to the miner, and at the moment, the whole information synchronization process is finished.
The touch block is connected to the main chain as a small branch, so that the whole blockchain system is ensured to be safer, and the information synchronization of the multi-chain system in network delay is realized.
The reason for ensuring that the entire blockchain system is safer is that the traditional blockchain system has only one backbone that is smooth, and the criteria that determines which is the backbone is which branch is longer. By adding the 'touch blocks', the whole blockchain system is more complex, and the number of the touch blocks is also used as a standard for determining the main chain, so that more factors are required to be considered for an attacker, the attack difficulty is greatly increased, and the whole blockchain system is safer.
For information synchronization within network delays, the consensus mechanism of the original multiple blockchain systems may be different, even though the same consensus mechanism is employed, the mining speed of each blockchain system is different. By mining ready blocks in advance, the maximum time difference is not greater than the network delay, by having the current nearest block point to a "touch" candidate block, after each blockchain system is ready for such blocks, almost synchronous at the user level.
From the user's perspective, the user will not feel the processing change of the blockchain bottom layer, and simultaneously, the synchronous uplink of the multi-chain data information is ensured.
Referring to fig. 2, the multi-chain verification module is located outside the blockchain system and is dedicated to assist the multi-chain data information synchronization processing module in the blockchain system.
The specific operation flow of the module is as follows:
after the data information synchronization uplink process begins, each blockchain system will continue to signal whether they are ready. Because each blockchain system only needs to care about the final signal if all are ready, it does not need to know the signals sent by other blockchain systems in the process. In order to achieve the effect, the invention adopts a safe multiparty calculation mode to process signals. Secure multiparty computing is a group of participants that are not trusted with each other, but they wish to compute a contract function with the correct results, while the output data of each participant is kept secret. Secure multiparty computing is thus suitable for use in the authentication module.
Each blockchain system needs to encrypt and digitally sign the signal content using cryptographic algorithms before sending a signal that is ready or not. The aim is to ensure the privacy of each blockchain system signal, and the verification module can verify whether the received signal is sent by the corresponding blockchain system through a digital signature mode.
The cryptographic algorithm employed is an elliptic curve algorithm (ECC). Elliptic curve cryptography is an algorithm for establishing public key encryption and is based on elliptic curve math. In the present invention, the signal encryption process is as follows:
before the block chain system A sends the signal content, the verification module selects an elliptic curve Ep (a, b) in advance, and selects a point on the elliptic curve as a base point G; the system then selects a private key, referred to herein as the privateKey, by which the public key is generated, i.e.,
publicKey=privateKey_G
the verification module sends the elliptic curve Ep (a, b), the public key publicKey and the base point G to the blockchain system A; after receiving the information, the blockchain system A encodes the signal content to be transmitted to a point M on Ep (a, b) and generates a random integer r; the blockchain system A then calculates C1 and C2 through M and r, wherein C1 and C2 are points on two rectangular coordinate systems calculated according to M and r, namely,
C1=M+r×publicKey
C2=r×G
and the block chain system A sends C1 and C2 to a verification module, and the verification module decrypts the received C1 and C2 and the private key to obtain the signal content sent by the block chain system A through decryption of the point M (the point can be obtained through C1 and C2).
Elliptic curve signing (ECDSA) procedure is as follows:
the block chain system A generates a group of public and private key pairs, the real point G=G (x, y) and selects a random number r, and S= (H+Kx/r) is calculated through the message M, the hash H and the private key K; finally, the message M and the signature { rG, S } are sent to a verification module; and after the verification module receives the information, the public key is used for verifying the signature, and if the verification is successful, the sender is indeed the block chain system A.
The module is continuous in signaling of each blockchain system, so that the cryptographically signed signal content ciphertext sent by each blockchain system is processed by multiple threads in the verification module. And after the verification module performs digital signature verification on the ciphertext, decrypting the ciphertext. The signal content of each blockchain system is subjected to an and operation, i.e.,
signal 1 &signal2 & … & signal N
The result is encrypted by elliptic curve and digitally signed and then sent to each blockchain system. The purpose of encryption and digital signature is to prevent an attacker from tampering with the information such that the final signal experienced by each blockchain system is different, resulting in an anomaly in the synchronous transmission of data information.
The verification module ensures the privacy of each blockchain system signal under the multi-chain system by adopting a safe multiparty calculation mode, encrypts and signs the signal content by adopting an elliptic curve cryptography algorithm, and ensures the safety of the signal content in the transmission process.
The blockchain multi-chain data information synchronous processing module is combined with the verification module outside the blockchain, so that the effect of multi-chain data information synchronization can be well achieved, and the blockchain multi-chain data information synchronous processing module can safely interact under the guarantee of the cryptography technology and can be suitable for multi-chain network systems formed by different blockchain systems.
The foregoing has shown and described the basic principles, principal features and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the specific embodiments described above, and that the above specific embodiments and descriptions are provided for further illustration of the principles of the present invention, and that various changes and modifications may be made therein without departing from the spirit and scope of the invention as defined in the appended claims. The scope of the invention is defined by the claims and their equivalents.

Claims (8)

1. The bottom layer method for synchronizing the information of the block chain multi-chain data is characterized by comprising the following steps:
step S1, a multi-chain data information synchronous processing module acquires data information to be synchronized, and then the data information is packaged in a new block by utilizing a consensus mechanism of a block chain system, and the new block is marked as a candidate block of a touch block by the block chain system;
step S2, after candidate blocks of the 'touch block' are generated, continuously detecting signals sent by a multi-chain verification module outside the block chain system, and acquiring the nearest block in the current main chain when the prepared signals are detected;
step S3, pointing the nearest block in the acquired current main chain to a candidate block of the 'touch block', and rising the candidate block of the 'touch block' to be the 'touch block';
and S4, inquiring synchronous information in the touch block.
2. The method according to claim 1, wherein the "touch block" is a block of all blocks of the local chain that is dedicated to recording the multi-chain synchronization data information.
3. The underlying method of blockchain multi-chain data information synchronization of claim 1, wherein the nearest chunk in the current backbone is the most recently generated chunk of all chunks of the blockchain that exist on the backbone.
4. The method according to claim 1, wherein in the step S3, the nearest block in the current main chain points to the Hash value of the candidate block of the "touch block".
5. The underlying method of claim 1, wherein the verification module sends a final signal for each blockchain system, the final signal being an integrated signal of whether the blockchain system is ready.
6. The method for synchronizing bottom layer of blockchain multi-chain data information according to claim 1, wherein the signals sent by the multi-chain verification module are encrypted and digitally signed by a cryptographic algorithm, the cryptographic algorithm is an elliptic linear algorithm, and the specific encryption process is as follows:
before the regional chain system sends the signal content, the multi-chain verification module presets an elliptic curve Ep (a, b), and selects one point above the elliptic curve Ep as a base point G; the local chain system generates a public key through a private key privateKey, namely publickey=privatekey_g;
the multi-chain verification module sends the elliptic curve Ep (a, b), the public key public Key and the base point G to the blockchain system, after the blockchain system receives the information, the content of the signal to be sent is encoded to a point M on the curve Ep (a, b) and a random integer r is generated, the blockchain system calculates C1 and C2 according to M and r, and the C1 and C2 are points on two rectangular coordinate systems calculated according to M and r, namely,
C1=M+r×publicKey
C2=r×G
and sends C1 and C2 to the multiplex authentication module.
7. The underlying method of blockchain multi-chain data information synchronization of claim 6, wherein the elliptic curve signing process is:
the regional chain system generates a group of public and private key pairs, the real point G=G (x, y), a random number r is selected, and S= (H+Kx/r) is calculated through the information M, the hash value H and the private key K; and finally, the message M and the signature { rG, S } are sent to a multi-chain verification module, and the signature is verified by a public key after the multi-chain verification module receives the message.
8. The method according to claim 1, wherein the multi-chain verification module performs digital signature verification on the ciphertext, then decrypts the ciphertext, performs an and operation on the signal content of each blockchain system, encrypts the operation result through an elliptic curve, performs digital signature, and then sends the operation result to each blockchain system.
CN201910628987.4A 2019-07-12 2019-07-12 Bottom layer method for synchronizing information of block chain multi-chain data Active CN110457389B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910628987.4A CN110457389B (en) 2019-07-12 2019-07-12 Bottom layer method for synchronizing information of block chain multi-chain data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910628987.4A CN110457389B (en) 2019-07-12 2019-07-12 Bottom layer method for synchronizing information of block chain multi-chain data

Publications (2)

Publication Number Publication Date
CN110457389A CN110457389A (en) 2019-11-15
CN110457389B true CN110457389B (en) 2023-06-02

Family

ID=68482734

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910628987.4A Active CN110457389B (en) 2019-07-12 2019-07-12 Bottom layer method for synchronizing information of block chain multi-chain data

Country Status (1)

Country Link
CN (1) CN110457389B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111652613A (en) * 2020-04-15 2020-09-11 珠海小礼鱼科技有限公司 Intelligent block chain account distribution system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109189853A (en) * 2018-08-08 2019-01-11 众安信息技术服务有限公司 Method of data synchronization and device between a kind of block chain
CN109493222A (en) * 2018-10-18 2019-03-19 尚维斯 A kind of method of any number of block chain account book real-time synchronizations
CN109522363A (en) * 2018-10-18 2019-03-26 上海达家迎信息科技有限公司 Cloud platform synchronous method, system, equipment and storage medium based on block chain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107579817A (en) * 2017-09-12 2018-01-12 广州广电运通金融电子股份有限公司 User ID authentication method, apparatus and system based on block chain
CN109379429A (en) * 2018-10-25 2019-02-22 龚玉环 A kind of multichain management method and system based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109189853A (en) * 2018-08-08 2019-01-11 众安信息技术服务有限公司 Method of data synchronization and device between a kind of block chain
CN109493222A (en) * 2018-10-18 2019-03-19 尚维斯 A kind of method of any number of block chain account book real-time synchronizations
CN109522363A (en) * 2018-10-18 2019-03-26 上海达家迎信息科技有限公司 Cloud platform synchronous method, system, equipment and storage medium based on block chain

Also Published As

Publication number Publication date
CN110457389A (en) 2019-11-15

Similar Documents

Publication Publication Date Title
EP3642997B1 (en) Secure communications providing forward secrecy
EP0460538B1 (en) Cryptographic communication method and cryptographic communication device
CN109743171B (en) Key series method for solving multi-party digital signature, timestamp and encryption
US6058188A (en) Method and apparatus for interoperable validation of key recovery information in a cryptographic system
US8670563B2 (en) System and method for designing secure client-server communication protocols based on certificateless public key infrastructure
EP3349393A1 (en) Mutual authentication of confidential communication
US7747014B2 (en) Information transmission system, and information sending apparatus and information receiving apparatus used therein
JPH118620A (en) System and method for efficiently executing authentication of communication channel and facilitating detection of illegal forgery
US8233617B2 (en) Resilient cryptographic scheme
CN103986583A (en) Dynamic encryption method and encryption communication system thereof
CN103532713A (en) Sensor authentication and sharing key generating method, sensor authentication and sharing key generating system and sensor
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN104052606A (en) Digital signature, signature authentication device and digital signature method
US11888832B2 (en) System and method to improve user authentication for enhanced security of cryptographically protected communication sessions
JP4193380B2 (en) Electronic signature system for stream transfer
JP2015226132A (en) Signature verification system, communication device, verification device, signature generation method and signature verification method
CN112532648A (en) Security access method and system based on hybrid cryptosystem
CN110457389B (en) Bottom layer method for synchronizing information of block chain multi-chain data
CN109495257B (en) Data acquisition unit encryption method based on improved SM2 cryptographic algorithm
CN104735094A (en) Information separation based data security transmission system and method
CN102271043A (en) data transmission protection method
KR20060078768A (en) System and method for key recovery using distributed registration of private key
CN108242997B (en) Method and apparatus for secure communication
CN111526131B (en) Anti-quantum-computation electronic official document transmission method and system based on secret sharing and quantum communication service station
CN102487321B (en) Signcryption method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant