CN110852745B - Block chain distributed dynamic network key automatic updating method - Google Patents

Block chain distributed dynamic network key automatic updating method Download PDF

Info

Publication number
CN110852745B
CN110852745B CN201910967191.1A CN201910967191A CN110852745B CN 110852745 B CN110852745 B CN 110852745B CN 201910967191 A CN201910967191 A CN 201910967191A CN 110852745 B CN110852745 B CN 110852745B
Authority
CN
China
Prior art keywords
key
updating
data
node
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910967191.1A
Other languages
Chinese (zh)
Other versions
CN110852745A (en
Inventor
黄步添
罗春凤
周伟华
刘振广
陈建海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yunxiang Network Technology Co Ltd
Original Assignee
Hangzhou Yunxiang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Yunxiang Network Technology Co Ltd filed Critical Hangzhou Yunxiang Network Technology Co Ltd
Priority to CN201910967191.1A priority Critical patent/CN110852745B/en
Publication of CN110852745A publication Critical patent/CN110852745A/en
Application granted granted Critical
Publication of CN110852745B publication Critical patent/CN110852745B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying

Abstract

The invention discloses a block chain distributed dynamic network key automatic updating method, which comprises the following steps: (1) initializing a network, and starting a key management protocol of the distributed dynamic self-organizing network; (2) after the key management protocol is started, updating the key within a specified time T1; (3) updating the key, broadcasting the message of updating the key to the whole network for verification; (4) in the process of updating the key, the key and the carried data are copied, restored or modified. The key updating method has the function of adapting to the block chain distributed dynamic network, and designs an intelligent contract to ensure that the key updating can be automatically executed. Aiming at the situation that potential safety hazards exist due to dynamic changes of a block chain distributed network, a key management protocol and an updating method are designed, and the key management protocol and the updating method comprise interactive processing of key management among a node P, a verification node VP, a safety management node SMN and a consensus node BP, so that key loss is reduced, and transaction data transmission safety is ensured.

Description

Block chain distributed dynamic network key automatic updating method
Technical Field
The invention belongs to the technical field of block chain encryption, and particularly relates to a block chain distributed dynamic network key automatic updating method.
Background
With the popularization and development of internet technology, guaranteeing the security and credibility of information becomes a key problem in the internet field. In order to achieve communication security, various security algorithms have been proposed, such as establishing an efficient secure channel by a symmetric encryption algorithm, and performing key agreement and message verification by public key encryption and public key signature algorithms. In order to obtain public key information in the process of encrypting or verifying a signature conveniently, an encryption system of an identity-based encryption algorithm is widely used, namely, the identity is used as a public key for encryption, a private key corresponding to the public key is generated through a private key generation center, and the public key query efficiency and credibility are greatly improved by using the identity as the public key in the encryption algorithm. However, the private key generation center often has a centralized nature, all private key information is stored in the private key generation center, which is a great safety hazard problem, and in order to resist brute force of an attacker to crack the keys for counterfeiting or launch replay attack, key updating is often required, which puts high requirements on the private key generation center, calculates the latest keys for each user, and establishes a channel with each user for key distribution, for which many self-organized public key protocol management systems have been proposed, and nodes can distribute and revoke their public keys without the help of any fixed server. However, these systems require that the nodes should always be online when other nodes issue their session keys or update keys, and furthermore, in a multi-hop communication process, a third party with trusted keys can monitor the behavior of all nodes and arbitrate disputes in the presence of malicious nodes. The block chain technology is a technology emerging from the time and having the decentralized characteristic, and the problem of participation of a trusted third party can be solved.
The blockchain technology integrates P2P network technology, cryptography technology, data storage technology, consensus algorithms, and intelligent contract technology. The method is essentially a decentralized database, and adopts a cryptography method to form a block chain type data structure by data blocks which are mutually related by each block, wherein each data block contains information of a batch of bitcoin network transactions, and the information is used for verifying the validity of the information and generating the next block. The block chain realizes a distributed architecture by using an encryption technology, a time stamp and a consensus mechanism, does not depend on any trusted third party organization, has decentralization and traceability, ensures the non-tamper property and the public transparency of the block chain data by the carried time stamp and the digital signature, and can be regarded as a traceable bulletin board maintained by nodes in a distributed mode in a central network.
For the blockchain, the value of the blockchain is to perform the transaction task safely and efficiently, so that the potential safety hazard problem existing on the blockchain is the most noticeable critical problem and is the basis for ensuring the normal operation of the blockchain. At present, the most important security risks include replay attack, i.e., a replay attack in which an attacker obtains a packet received by a destination host by eavesdropping or other methods and retransmits the packet to an opposite party to achieve the purpose of deceiving the opposite party, and the replay attack is mainly used for an identity authentication process. This attack may bypass the complex encryption and decryption process and is therefore difficult to protect against. In the existing CPK encryption system, a method for generating a private key by adding and modulo addition of seed matrix elements through a mapping algorithm enables linear relations to exist among secret keys, and sufficient numbers of equations can be listed by utilizing the linear relations to solve the private key seed matrix, so that the whole CPK system is broken down. Based on the existing problems, a method for updating a secret key is often needed for resisting an attacker from violently cracking the secret key to forge or launch a replay attack, but the existing secret key updating method is regularly updated, so that the risk of cracking exists, and the encryption and decryption efficiency is influenced by the complexity of the existing secret key updating method. The key updating method with safety and high efficiency is provided, which is the key point for improving the safety of the block chain.
Disclosure of Invention
Based on the background and the problems existing in the prior art, the invention proposes to design a block chain distributed dynamic network key automatic updating method, which can realize the key automatic updating in a distributed network. The invention aims to improve the key distribution and the whole key encryption efficiency by introducing a key management protocol so as to improve the efficiency of a blockchain system in transaction and information transmission.
To achieve these objects and other advantages and in accordance with the purpose of the invention, a block chain distributed dynamic network key automatic update method is provided. The whole realization steps comprise:
(1) initializing a network, starting a key management protocol of the distributed dynamic self-organizing network, namely starting functions of a block chain network autonomous domain, a security management node and a network access point and a key data/information interaction process between the key management protocol and a corresponding verification node, a consensus node and a user node;
(2) after the key management protocol is started, at a specified time T1The internal secret key is updated, and automatic updating can be realized through an intelligent contract of the block chain;
(3) updating a key, broadcasting a key updating message and data information carried by the updated key to the whole network, verifying and confirming the key updating condition through a consensus mechanism of a block chain, and preventing a malicious node from generating a pseudo key to mislead a system so as to reduce the system efficiency;
(4) in the process of updating the key, the key and the carried data are copied, restored or modified. The copying of the key comprises the acceptance of the new key to the old key information; the recovery of the key comprises the steps that the loss and damage of data in the transmission process are recovered by calling the previous key data and the synchronous block information; the modification of the key information refers to the modification of the updated key information, so that data redundancy and data repetition are avoided.
Further, after each transaction is completed, a key update is performed, the updated key is verified, a key management protocol is started to adjust key information, and the specified time T is initialized1Timing of (3).
Preferably, the step of the key management protocol of step (1) comprises:
1.1, a key information format and a block format which are suitable for a block chain distributed dynamic network key automatic updating method are formulated, and component key data are transmitted in a secret state in a transmission and updating process of standardized key information;
1.2 in the block chain network, the key information generated by the user node P in the network is checked by the verification node VP to prove the integrity and reliability of the data information of the key;
1.3 Key management by the Security management node, SMN, managing a dynamic Key List until time T of Key update1When the key is updated, SMN starts the intelligent contract to carry the key updating message and the new keyThe information is transmitted to the BP, namely the switching of the content version of the key information is not carried out, the SMN public key encryption key is directly used for sending to the consensus node BP, the BP decrypts the key data to obtain the transaction information transmitted by the key, the steps of key transmission are reduced by the method, and the security of the transaction is ensured;
1.4 nodes participating in the transaction sign transaction data in the blocks using their own private keys, BP writes these transaction data into the ledger and composes a complete block to be published to the blockchain network, verified by the totality of VPs. Because the data cipher text to be transmitted in the block is encrypted by using the public key, the key is also encrypted, and the data cipher text and the key data of the block in which the key component is packaged can not be intercepted in the transmission process;
1.5 informing the P of the transaction completion result, updating the key after the transaction is completed, and forwarding the new key to the VP for verification information, the VP sending the verified message and the verified key data to the SMN, the SMN updating the corresponding data in the list, ensuring the stability of the encryption and decryption transaction data of the key during the transaction, and the BP packaging the message and the key data information into a block.
Further, the key information format comprises the key component and the related information of the legal member, the encrypted transaction ciphertext is obtained by using the public key encryption of the security management node, and the condition that the signature cannot be forged without the private key of the security management node and the cross-domain key transmission cannot be stolen and tampered by the legal security management node member is guaranteed.
Preferably, the step (2) is implemented by the following steps:
2.1 after receiving the key updating message each time, the SMN accumulates the key updating times in the updating times list;
2.2 at the specified time T1When the key is updated, and the data information carried by the key is correspondingly updated to become a new key;
2.3 updating the key after each transaction, updating the list and updating the corresponding key information by SMN after passing verification, and initializing time T1Then SMN requests BP to write account bookPacking the block by the BP to ensure that the key can not be tampered;
and 2.4, after the specified updating times are reached, carrying out a new round of key updating and encryption operation.
Further, the operation method of updating the key includes shifting the key, bitwise and, bitwise xor, etc., or changing parameters in the same encryption algorithm for the key to update the key. The updating of the secret key ensures the safety of the secret key, and the secret key updating method has the characteristic of being matched with the secret key to encrypt transaction data, so that the encryption efficiency cannot be influenced. Wherein the time T is initialized1This is to facilitate SMN retiming, i.e. SMN retimes for the next time the key is updated, and this is designed to prevent the key from being attacked if the transaction interval is too long, and the SMN does not need to update the key timing if the transaction is continued.
Preferably, the specific implementation steps of step (3) are as follows:
3.1P broadcasts the message of updating the key and the digital signature to VP, waits for the VP to verify the key and the transaction data, or SMN sends the message of updating the key to BP, BP informs the VP to verify the key and the transaction data;
3.2, the verification node verifies the key and the transaction data;
3.3, the authenticity of the identity and the integrity of the data information are confirmed through the verified key and the transaction;
and 3.4, packaging the voting result and the encrypted key information into blocks by the BP, and writing the blocks into an account book.
Further, when the non-key owner verifies the key data information, the non-key owner views limited data information content, and cannot acquire key information related to privacy and capable of decoding a ciphertext, for example, the identity of the key can be verified by adopting a zero-knowledge proof method, wherein the information after the key ciphertext is masked, the key generation or update time, and the key owner is the content which can be viewed by all network nodes when the key owner verifies. The data information carried by the key tag comprises: cipher text for encrypting the key (which indicates that the key has been encrypted), time for generating or updating the key, owner of the key, encryption algorithm used for encrypting the key, updating times, content of the key, address of the private key corresponding to the key, and private key information.
Preferably, the step (4) is implemented by the following steps:
4.1 the new key is updated on the basis of the old key, and copies partial data information of the old key, including a key owner, an encrypted object and a previous old key ID, wherein the previous old key ID is copied, so that the key traceability is realized, the security of the key is further ensured, and even if the key is stolen or forged, the authenticity of the key can still be verified through block chain traceability;
4.2 recovering the key and the data carried by the key information means that in the process of checking the key information in step 3.2, the result is judged and the operation of storing or discarding the data is executed, if the result is true, the data is temporarily stored in the pre-consistency verification block of the block chain, and if the result is false, the information of the damaged key is discarded and recorded. The operation steps for recovering the damaged data are as follows: a data copy is stored on the block chain, and the data copy is synchronized to the damaged VP;
4.3 modifying the key and the data carried by the key means that part of the data of the old key is modified in the process of copying the old key in the step 4.1, and the modified content comprises key content, updating times, key ciphertext and an updated encryption algorithm.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. The invention at least comprises the following beneficial effects:
1. the key management protocol of the invention can ensure that each node can well adapt to a block chain distributed dynamic network in the process of using the key, reduce the loss of the key and ensure the security of the network;
2. the key updating method comprises the steps of updating the key and updating the key encryption algorithm, thereby enhancing the confidentiality of the key and reducing the possibility of key information leakage and cracking;
3. in the process of updating the key, the key is properly copied, restored and modified in consideration of the conditions of key transmission, damage and update, so that the integrity and reliability of the key and the encrypted file are ensured.
Drawings
FIG. 1 is a block chain distributed dynamic network architecture;
FIG. 2 is a diagram of an implementation of the key management protocol of the present invention;
fig. 3 is a flow chart of the copying, recovery or modification of the key and the data carried thereby.
Detailed Description
In order to clearly illustrate the present invention and make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention are clearly and completely described below in conjunction with the drawings in the embodiments of the present invention, so that those skilled in the art can implement the technical solutions by referring to the description text. The technology of the present invention will be described in detail with reference to the accompanying drawings.
1. Fig. 1 shows a block chain distributed dynamic network structure diagram according to an implementation form of the present invention, where fig. 1 shows a situation where a common identification node BP and a verification node VP dynamically change in a block chain network, and the situation where such block chain distributed network dynamically changes is accommodated by a key management protocol, where the key management protocol includes:
1.1, a key information format and a block format which are suitable for a block chain distributed dynamic network key automatic updating method are formulated, and component key data are transmitted in a secret state in a transmission and updating process of standardized key information;
1.2 in the block chain network, the key information generated by the user node P in the network is checked by the verification node VP to prove the integrity and reliability of the key information;
1.3 key management is performed by a security management node, SMN, which SMN manages a dynamic key list, the management of the SMN being performed automatically according to a smart contract, wherein the design of the contract comprises a timed design of key updates. When the appointed key is updated, the intelligent contract is started, the SMN forwards the information of updating the key and the information carried by the new key to the BP, namely, the switching of the content version of the key information is not carried out, the SMN directly uses the SMN public key encryption key to send the information to the BP node of the consensus node, the BP decrypts the key data, and the transaction information transmitted by the key is obtained, so that the steps of key transmission are reduced, and the security of the transaction data is ensured;
1.4 nodes participating in the transaction sign transaction data in the blocks using their own private keys, BP writes these transaction data into the ledger and composes a complete block to be published to the blockchain network, verified by the totality of VPs. Because the data ciphertext to be transmitted in the block is encrypted by using the public key, the key is also encrypted, and the data ciphertext and the key data of the block which encapsulates the key component can not be intercepted in the transmission process;
1.5 informing the P of the transaction completion result, updating the key after the transaction is completed, and forwarding the new key to the VP for verification information, the VP sending the verified message and the verified key data to the SMN, the SMN updating the corresponding data in the list, ensuring the stability of the encryption and decryption transaction data of the key during the transaction, and the BP packaging the message and the key data information into a block.
Specific example 1:
2. fig. 2 shows an implementation mechanism diagram of the key management protocol of the present invention, where the implementation of the key management protocol implementation mechanism is embodied in the block chain distributed dynamic network shown in fig. 1, and management, coordination, and protection of a key update process of the whole network in the block chain distributed dynamic network are implemented together by the security management node SMN, the user node P, the verification node BP, and the consensus node VP. The scheme has the advantages of keeping the stability of the block chain distributed dynamic network, realizing the ordered updating of the key and reducing the potential safety hazard problem caused by invalid management. The operation is shown in fig. 2, for example in a blockchain network 1:
2.1 after receiving the message of updating the key each time, SMN updates the number of times of updating the key in the number list;
2.2 at the specified time T1When the key is updated, the key is updated and the data information carried by the key is sentUpdating correspondingly to become a new key;
2.3 updating the key after each transaction, updating the list and updating the corresponding key data information by SMN after passing verification, and initializing time T1Then, the SMN requests the BP to write in an account book, and the BP finishes packaging to obtain blocks, so that the secret key cannot be tampered;
and 2.4, after the specified updating times are reached, carrying out a new round of key updating and encryption operation.
The operation method of the key updating comprises the steps of shifting, bitwise AND, bitwise XOR and the like or changing parameters in the same encryption algorithm to update the key. The key updating strengthens the security of the key, and the key updating method of the invention does not influence the encryption efficiency because the design of the key management protocol has the characteristic of encrypting transaction data by matching with the key.
Specific example 2:
3. fig. 3 shows a flow chart of the copying, recovery or modification of the key and the data carried thereby, comprising:
step 1: the new key is updated on the basis of the old key, and partial information of the old key is copied, wherein the partial information comprises a key owner, an encrypted object, a previous old key ID (so as to facilitate key tracing and ensure the continuity of key information) and an encryption algorithm, the previous old key ID is copied, so that key tracing is realized, the security of the key is further ensured, and the authenticity of the key can still be verified through block chain tracing even if the key is stolen or forged;
step 2: the recovery of the key and the data carried thereby means that, in the process of checking the key information in step 3.2 of the inventive content, if the result is true, the data is temporarily stored in the pre-consistency verification block of the block chain, and if the result is false, the information of the damaged key is discarded and recorded. The operation steps for recovering the damaged data are as follows: synchronizing the data copy stored on the block chain to the damaged verification node;
and step 3: the modification of the key and the carried data means that part of data of the old key is modified in the process of copying the old key in the step 1, and the modified content comprises key content, updating times, key ciphertext and an updated encryption algorithm.
As described above, according to the present invention, since the key management protocol and the key generation and encryption method are matched with each other, the steps of key encryption can be efficiently implemented and the effect of adapting to the blockchain distributed dynamic network can be obtained. The number of modules and the processing scale described herein are intended to simplify the description of the invention. Applications, modifications and variations of the security management protocol, key update and encryption methods of the present invention will be apparent to those skilled in the art.
The embodiments described above are presented to facilitate one of ordinary skill in the art to understand and practice the present invention. It will be readily apparent to those skilled in the art that various modifications to the above-described embodiments may be made, and the generic principles defined herein may be applied to other embodiments without the use of inventive faculty. Therefore, the present invention is not limited to the above embodiments, and those skilled in the art should make improvements and modifications to the present invention based on the disclosure of the present invention within the protection scope of the present invention.

Claims (7)

1. A method for automatically updating a block chain distributed dynamic network key, comprising:
(1) initializing a network, and starting a key management protocol of the distributed dynamic self-organizing network;
(2) after the key management protocol is started, updating the key within a specified time T1;
(3) updating the key, broadcasting the message of updating the key to the whole network for verification;
(4) in the process of updating the key, copying, recovering or modifying the key and the carried data;
after each transaction is completed, updating the key, starting the key management protocol to adjust the key data information after the updated key passes the verification, and initializing the timing of the specified time T1;
the key management protocol in step (1) includes:
1.1, establishing a key data information format and a block format which are suitable for a block chain distributed dynamic network key updating method, so as to standardize the transmission and updating processes of key data information and keep component key data transmitted in a secret state;
1.2 in the block chain network, the key data information generated by the user node in the network is checked by the verification node to prove the integrity and reliability of the key data information;
1.3 managing the dynamic key list by the security management node, managing the key, starting the intelligent contract when the appointed time T1, and forwarding the key updating message and the data information carried by the new key to the consensus node by the security management node, so that the steps of key transmission are reduced and the security of the transaction is ensured;
1.4 the nodes participating in the transaction use the private keys of the nodes to sign transaction data, the consensus nodes write the transaction data into an account book and form a complete block to be issued to a block chain network, and the block encapsulated with key components is verified by all verification nodes, so that a data ciphertext and key data cannot be intercepted during transmission;
1.5, notifying the user node of the transaction completion result, updating the key after the transaction is completed, forwarding the new key to the verification node for verification information, sending the verified message and the verified key data to the safety management node by the verification node, updating corresponding data of a list by the safety management node, ensuring the stability of encrypting and decrypting the transaction data of the key during the transaction, and packaging the message and the key data information into a block by the consensus node.
2. The method for automatically updating the blockchain distributed dynamic network key according to claim 1, wherein the key data information format includes a key component and related information of a legal member, and a ciphertext of the encrypted transaction is obtained by using a public key of the security management node for encryption, so that a signature cannot be forged without a private key of the security management node, and the cross-domain key transmission and key generation cannot be faked as a legal member of the security management node for stealing and tampering.
3. The method for automatically updating a blockchain distributed dynamic network key according to claim 1, wherein the step (2) is specifically implemented as follows:
2.1 after receiving the key encryption information each time, the security management node updates the key in the update times list;
2.2 when the appointed time T1 is reached, updating the key, and correspondingly updating the data information carried by the key to become a new key;
2.3 updating the key after each transaction is completed, updating the list and updating the corresponding key information by the security management node after verification, initializing time T1, requesting the consensus node to write an account book by the security management node, and completing block packaging by the consensus node to ensure that the key cannot be tampered;
2.4 when the appointed updating times are reached, a new round of key updating and encryption operation is carried out.
4. The blockchain distributed dynamic network key automatic updating method according to claim 3, wherein the key updating operation method further comprises: and shifting, bitwise AND, bitwise XOR and the like are carried out or parameters are changed in the same encryption algorithm to update the key.
5. The method for automatically updating a blockchain distributed dynamic network key according to claim 1, wherein the step (3) is specifically implemented as follows:
3.1 the user node broadcasts the message of updating the key and the digital signature to the verification node, waits for the verification node to verify the key and the transaction data, or the safety management node sends the message of updating the key to the consensus node, and the consensus node informs the verification node to verify the key and the transaction data;
3.2, the verification node verifies the key and the transaction data;
3.3, the authenticity of the identity and the integrity of the data information are confirmed through the verified key and the transaction;
and 3.4, packaging the voting result and the encrypted key information into a block by the consensus node, and writing the block into an account book.
6. The blockchain distributed dynamic network key automatic updating method according to claim 5, wherein when a non-key owner verifies the key, limited data information content is checked; the information carried by the key tag includes: cipher text encrypted by the key, time for updating the key, the key owner, an encryption algorithm used by encryption of the key, updating times, key content, and a private key address and private key information corresponding to the key.
7. The method for updating a blockchain distributed dynamic network key according to claim 6, wherein the step (4) is implemented by:
4.1 the new key is updated on the basis of the old key, and part of information of the old key is copied;
4.2 the recovery of the key and the carried data means that in the process of checking the key information in the step 3.2, the result is judged to be true or false and the operation of storing or discarding is executed; the operation steps for recovering the damaged data are as follows: synchronizing the data copy stored on the block chain to the damaged verification node;
4.3 modifying the key and the data carried means that part of the data of the old key is modified during the copying of the old key in step 4.1.
CN201910967191.1A 2019-10-12 2019-10-12 Block chain distributed dynamic network key automatic updating method Active CN110852745B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910967191.1A CN110852745B (en) 2019-10-12 2019-10-12 Block chain distributed dynamic network key automatic updating method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910967191.1A CN110852745B (en) 2019-10-12 2019-10-12 Block chain distributed dynamic network key automatic updating method

Publications (2)

Publication Number Publication Date
CN110852745A CN110852745A (en) 2020-02-28
CN110852745B true CN110852745B (en) 2022-07-19

Family

ID=69597465

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910967191.1A Active CN110852745B (en) 2019-10-12 2019-10-12 Block chain distributed dynamic network key automatic updating method

Country Status (1)

Country Link
CN (1) CN110852745B (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111047324B (en) * 2020-03-16 2020-08-04 支付宝(杭州)信息技术有限公司 Method and apparatus for updating a set of public keys at a blockchain node
CN112437089A (en) * 2020-11-26 2021-03-02 交控科技股份有限公司 Train control system key management method and device based on block chain
CN112399416B (en) * 2020-12-02 2023-01-10 中国联合网络通信集团有限公司 Access method and device
CN112884485B (en) * 2021-02-01 2024-01-26 合肥壹物易证科技有限公司 Symmetrical encryption traceability transaction method, system and storage medium based on blockchain network
CN113329400A (en) * 2021-04-20 2021-08-31 重庆九格慧科技有限公司 Key management system based on random key distribution in mobile Ad Hoc network
CN114780568B (en) * 2022-06-22 2022-09-20 军事科学院系统工程研究院网络信息研究所 Distributed multi-party data consistency updating method and system
CN116155491B (en) * 2023-02-02 2024-03-08 广州万协通信息技术有限公司 Symmetric key synchronization method of security chip and security chip device
CN115941182B (en) * 2023-02-21 2024-01-30 浙江国利信安科技有限公司 Method, computing device, and storage medium for network key update

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102123392A (en) * 2011-03-08 2011-07-13 东南大学 Secret key management method for distributed wireless sensor network
CN105959269A (en) * 2016-04-25 2016-09-21 北京理工大学 ID-based authenticated dynamic group key agreement method
CN109146524A (en) * 2018-08-22 2019-01-04 周口师范学院 A kind of agricultural product using block chain technology are traced to the source information security solution
WO2019163040A1 (en) * 2018-02-22 2019-08-29 株式会社ゼタント Access management system and program thereof
CN110300112A (en) * 2019-07-02 2019-10-01 石家庄铁道大学 Block chain key tiered management approach

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102123392A (en) * 2011-03-08 2011-07-13 东南大学 Secret key management method for distributed wireless sensor network
CN105959269A (en) * 2016-04-25 2016-09-21 北京理工大学 ID-based authenticated dynamic group key agreement method
WO2019163040A1 (en) * 2018-02-22 2019-08-29 株式会社ゼタント Access management system and program thereof
CN109146524A (en) * 2018-08-22 2019-01-04 周口师范学院 A kind of agricultural product using block chain technology are traced to the source information security solution
CN110300112A (en) * 2019-07-02 2019-10-01 石家庄铁道大学 Block chain key tiered management approach

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
分布式网络环境下基于区块链的密钥管理方案;戴千一等;《网络与信息安全学报》;20180915(第09期);第23-35页 *

Also Published As

Publication number Publication date
CN110852745A (en) 2020-02-28

Similar Documents

Publication Publication Date Title
CN110852745B (en) Block chain distributed dynamic network key automatic updating method
CN111066046B (en) Replay attack resistant authentication protocol
CN110719165B (en) Block chain distributed dynamic network key generation and encryption method
JP4689815B2 (en) Data authentication method, message transmission method, and distributed system
CN108768652B (en) Coalition block chain bottom layer encryption method capable of resisting quantum attack
US7457411B2 (en) Information security via dynamic encryption with hash function
CN108683501B (en) Multiple identity authentication system and method with timestamp as random number based on quantum communication network
US20040179682A1 (en) Computer system security via dynamic encryption
CN111080299B (en) Anti-repudiation method for transaction information, client and server
CN113630248B (en) Session key negotiation method
JP2014197885A (en) Efficient technique for achieving secure transactions by using tamper-resistance token
CN113612610A (en) Session key negotiation method
CN110737915A (en) Anti-quantum-computation anonymous identity recognition method and system based on alliance chain and implicit certificate
CN116506854A (en) Encryption communication system and method for Beidou short message
CN113347143A (en) Identity authentication method, device, equipment and storage medium
CN104468074A (en) Method and equipment for authentication between applications
CN115865320A (en) Block chain-based security service management method and system
CN114142995B (en) Key security distribution method and device for block chain relay communication network
CN115174277B (en) Data communication and file exchange method based on block chain
CN109120621B (en) Data processor
CN116797227A (en) Method and system for secure exchange protection of client privacy information based on homomorphic encryption
JPH0969831A (en) Cipher communication system
CN113676330B (en) Digital certificate application system and method based on secondary secret key
WO2023010688A1 (en) Key management method and apparatus
US8699710B2 (en) Controlled security domains

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant