CN111478768A - Key generation and acquisition method and device - Google Patents

Key generation and acquisition method and device Download PDF

Info

Publication number
CN111478768A
CN111478768A CN202010163394.8A CN202010163394A CN111478768A CN 111478768 A CN111478768 A CN 111478768A CN 202010163394 A CN202010163394 A CN 202010163394A CN 111478768 A CN111478768 A CN 111478768A
Authority
CN
China
Prior art keywords
key
user terminal
public key
request message
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010163394.8A
Other languages
Chinese (zh)
Inventor
张华�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dalong Shangdong Culture And Art Communication Co ltd
Original Assignee
Beijing Dalong Shangdong Culture And Art Communication Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dalong Shangdong Culture And Art Communication Co ltd filed Critical Beijing Dalong Shangdong Culture And Art Communication Co ltd
Priority to CN202010163394.8A priority Critical patent/CN111478768A/en
Publication of CN111478768A publication Critical patent/CN111478768A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the technical field of block chains, in particular to a method and a device for generating and acquiring a secret key. A secret key generation and acquisition method is applied to a supervision institution server and comprises the following steps: receiving a request message for acquiring a public key and a private key sent by a user terminal; generating a public key and a private key according to the request message; and sending the public key and the private key to the user terminal. In the method, a supervision agency server generates a public key and a private key for a user; the user uses the public key and the private key when in transaction, thereby improving the security.

Description

Key generation and acquisition method and device
Technical Field
The invention relates to the technical field of block chains, in particular to a method and a device for generating and acquiring a secret key.
Background
Blockchains are a term of art in information technology. In essence, the system is a shared database, and the data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'public transparency', 'collective maintenance', and the like. Based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has wide application prospect. The transaction identity privacy refers to protecting the account number information of the sender and the receiver without being exposed; transaction identity supervision refers to the ability of a particular supervising party to ascertain the actual identity information of the sender and recipient of a transaction.
In the current block chain technology, account number information of both transaction parties is disclosed in the whole network, and any network participant can see the account number information of both transaction parties, so that although supervision can be realized, privacy protection cannot be realized.
Disclosure of Invention
Therefore, embodiments of the present invention provide a method and an apparatus for generating and acquiring a key, so as to solve the above problem.
In order to achieve the above object, the embodiments of the present invention provide the following technical solutions:
according to a first aspect of the embodiments of the present invention, a key generation and acquisition method is applied to a regulatory agency server, and the method includes:
receiving a request message for acquiring a public key and a private key sent by a user terminal;
generating a public key and a private key according to the request message;
and sending the public key and the private key to the user terminal.
Further, the request message carries an identifier of the user terminal; the method further comprises the following steps:
authenticating the user terminal according to the user terminal identification;
and if the authentication is passed, encrypting the identification information of the user by using a probability algorithm to generate a public key.
Further, still include: and generating a private key corresponding to the public key according to the public key by using an identity identification cryptography.
According to a second aspect of the embodiments of the present invention, a method for generating and acquiring a key is applied to a user terminal, and the method includes:
the user terminal sends a request message for acquiring a public key and a private key to the monitoring mechanism server; the request message carries the identification of the user terminal;
and receiving the public key and the private key generated and sent by the supervision agency server.
According to a third aspect of the embodiments of the present invention, an apparatus for generating and acquiring a key is applied to a monitoring authority server, and the apparatus includes:
the receiving module is used for receiving a request message for acquiring a public key and a private key, which is sent by a user terminal;
the generating module is used for generating a public key and a private key according to the request message;
and the sending module is used for sending the public key and the private key to the user terminal.
Further, the request message carries an identifier of the user terminal; the generation module is further to:
authenticating the user terminal according to the user terminal identification;
and if the authentication is passed, encrypting the identification information of the user by using a probability algorithm to generate a public key.
Further, the generation module is further configured to: and generating a private key corresponding to the public key according to the public key by using an identity identification cryptography.
According to a fourth aspect of the embodiments of the present invention, an apparatus for generating and acquiring a key is applied to a user terminal, and the apparatus includes:
the sending module is used for sending a request message for acquiring a public key and a private key to the monitoring mechanism server by the user terminal; the request message carries the identification of the user terminal;
and the receiving module is used for receiving the public key and the private key generated and sent by the supervision agency server.
The embodiment of the invention has the following advantages: the method comprises the steps that a supervision agency server receives a request message for obtaining a public key and a private key, wherein the request message is sent by a user terminal; generating a public key and a private key according to the request message; and sending the public key and the private key to the user terminal. The generation of the public key and the private key improves the effect of privacy. For a specific supervisor, the real identity information of the sender and the receiver of both transaction parties, namely the account number information, can be confirmed.
For any other third party, the real identity information of the sender and the receiver of the two transaction parties is hidden, invisible and cannot be cracked.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It should be apparent that the drawings in the following description are merely exemplary, and that other embodiments can be derived from the drawings provided by those of ordinary skill in the art without inventive effort.
The structures, ratios, sizes, and the like shown in the present specification are only used for matching with the contents disclosed in the specification, so as to be understood and read by those skilled in the art, and are not used to limit the conditions that the present invention can be implemented, so that the present invention has no technical significance, and any structural modifications, changes in the ratio relationship, or adjustments of the sizes, without affecting the effects and the achievable by the present invention, should still fall within the range that the technical contents disclosed in the present invention can cover.
Fig. 1 is an application scenario diagram of two transaction parties according to an embodiment of the present invention;
fig. 2 is a flowchart of a key generation and acquisition method according to an embodiment of the present invention.
Detailed Description
The present invention is described in terms of particular embodiments, other advantages and features of the invention will become apparent to those skilled in the art from the following disclosure, and it is to be understood that the described embodiments are merely exemplary of the invention and that it is not intended to limit the invention to the particular embodiments disclosed. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the block chain, both transaction parties need to be supervised by a supervision mechanism; referring to FIG. 1, a schematic diagram of two parties to a transaction is shown; the transaction of the blockchain consists of three elements of a sender, a receiver and a transaction amount. It is generally understood how much digital money of the transaction amount is converted from sender-owned to receiver-owned, thus completing a transaction. For the sake of supervision, the account information of both transaction parties is public, and the third party can see that both transaction parties have no privacy.
Based on this, the present application proposes a key generation and acquisition method, see a flowchart of the key generation and acquisition method shown in fig. 2; the method comprises the following steps:
step S201, receiving a request message for acquiring a public key and a private key sent by a user terminal;
step S202, generating a public key and a private key according to the request message;
step S203, the public key and the private key are sent to the user terminal.
By adopting the method of the invention, a secret key is generated for the user terminal; the user can use the secret key to carry out transaction, so that other users except the supervision institution cannot know account passwords of both transaction parties, and privacy is improved. The public key UPK can effectively hide the user identity ID, the identity information protection of the transaction facilitator is realized, the same ID can generate infinite UPKs by utilizing the advantage of probability encryption, and the UPKs are indistinguishable from each other, so that the privacy protection of the user identity can be efficiently realized. Only the supervision mechanism can recover the ID information through the UPK, namely the real identity information of the user is obtained, and therefore the transaction identity supervision is achieved. And any other third party can not recover the ID information through the UPK, so that only the random UPK without any law can be seen, and the identity of the trader cannot be tracked through the UPK, so that privacy protection is realized.
In one embodiment, the request message carries an identifier of the user terminal;
wherein, the identification can be the identity card number of the user;
the method further comprises the following steps:
authenticating the user terminal according to the user terminal identification;
and if the authentication is passed, encrypting the identification information of the user by using a probability algorithm to generate a public key. If the authentication is not passed, no response is made.
The server compares the received identification with a pre-stored identification, and if the received identification is the same as the pre-stored identification, the authentication is different; if not, authentication does not pass.
Wherein the probability algorithm is
In one embodiment, the method further comprises: and generating a private key corresponding to the public key according to the public key by using an identity identification cryptography.
The Identity-Based cryptosystem (IBC) is an asymmetric public key cryptosystem. The system can be used for producing a private key corresponding to the public key.
The application also provides a secret key generation and acquisition method, which is applied to the user terminal and comprises the following steps:
the user terminal sends a request message for acquiring a public key and a private key to the monitoring mechanism server; the request message carries the identification of the user terminal;
and receiving the public key and the private key generated and sent by the supervision agency server.
By the invention, the user terminal has the public key and the private key generated by the supervision server; the public key and the private key can be used for carrying out transaction with other user terminals, so that the safety is improved, and the privacy is improved.
The application also provides a secret key generation and acquisition device, which is applied to a monitoring authority server, and the device comprises:
the receiving module is used for receiving a request message for acquiring a public key and a private key, which is sent by a user terminal;
the generating module is used for generating a public key and a private key according to the request message;
and the sending module is used for sending the public key and the private key to the user terminal.
In one embodiment, the request message carries an identifier of the user terminal; the generation module is further to:
authenticating the user terminal according to the user terminal identification;
and if the authentication is passed, encrypting the identification information of the user by using a probability algorithm to generate a public key.
In one embodiment, the generation module is further configured to: and generating a private key corresponding to the public key according to the public key by using an identity identification cryptography.
The application further provides a device for generating and acquiring the secret key, which is applied to the user terminal, and the device comprises:
the sending module is used for sending a request message for acquiring a public key and a private key to the monitoring mechanism server by the user terminal; the request message carries the identification of the user terminal;
and the receiving module is used for receiving the public key and the private key generated and sent by the supervision agency server.
The technical scheme of the invention can be considered to be adopted when bitcoin, EtherFang or other public chains are iterated in version so as to allow supervision and protect privacy.
Although the invention has been described in detail above with reference to a general description and specific examples, it will be apparent to one skilled in the art that modifications or improvements may be made thereto based on the invention. Accordingly, such modifications and improvements are intended to be within the scope of the invention as claimed.

Claims (8)

1. A secret key generation and acquisition method is applied to a supervision agency server, and comprises the following steps:
receiving a request message for acquiring a public key and a private key sent by a user terminal;
generating a public key and a private key according to the request message;
and sending the public key and the private key to the user terminal.
2. The key generation and acquisition method according to claim 1, wherein the request message carries a user terminal identifier; the method further comprises the following steps:
authenticating the user terminal according to the user terminal identification;
and if the authentication is passed, encrypting the identification information of the user by using a probability algorithm to generate a public key.
3. The key generation acquisition method according to claim 2, further comprising: and generating a private key corresponding to the public key according to the public key by using an identity identification cryptography.
4. A secret key generation and acquisition method is applied to a user terminal, and comprises the following steps:
the user terminal sends a request message for acquiring a public key and a private key to the monitoring mechanism server; the request message carries the identification of the user terminal;
and receiving the public key and the private key generated and sent by the supervision agency server.
5. An apparatus for generating and acquiring a key, applied to a monitoring authority server, includes:
the receiving module is used for receiving a request message for acquiring a public key and a private key, which is sent by a user terminal;
the generating module is used for generating a public key and a private key according to the request message;
and the sending module is used for sending the public key and the private key to the user terminal.
6. The apparatus for generating and acquiring a secret key according to claim 5, wherein the request message carries an identifier of a user terminal; the generation module is further to:
authenticating the user terminal according to the user terminal identification;
and if the authentication is passed, encrypting the identification information of the user by using a probability algorithm to generate a public key.
7. The key generation obtaining apparatus according to claim 6, wherein the generation module is further configured to: and generating a private key corresponding to the public key according to the public key by using an identity identification cryptography.
8. An apparatus for generating and acquiring a key, applied to a user terminal, the apparatus comprising:
the sending module is used for sending a request message for acquiring a public key and a private key to the monitoring mechanism server by the user terminal; the request message carries the identification of the user terminal;
and the receiving module is used for receiving the public key and the private key generated and sent by the supervision agency server.
CN202010163394.8A 2020-03-10 2020-03-10 Key generation and acquisition method and device Pending CN111478768A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010163394.8A CN111478768A (en) 2020-03-10 2020-03-10 Key generation and acquisition method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010163394.8A CN111478768A (en) 2020-03-10 2020-03-10 Key generation and acquisition method and device

Publications (1)

Publication Number Publication Date
CN111478768A true CN111478768A (en) 2020-07-31

Family

ID=71747688

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010163394.8A Pending CN111478768A (en) 2020-03-10 2020-03-10 Key generation and acquisition method and device

Country Status (1)

Country Link
CN (1) CN111478768A (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101640590A (en) * 2009-05-26 2010-02-03 深圳市安捷信联科技有限公司 Method for obtaining a secret key for identifying cryptographic algorithm and cryptographic center thereof

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101640590A (en) * 2009-05-26 2010-02-03 深圳市安捷信联科技有限公司 Method for obtaining a secret key for identifying cryptographic algorithm and cryptographic center thereof

Similar Documents

Publication Publication Date Title
CN101674304B (en) Network identity authentication system and method
CN103440444B (en) The signing method of electronic contract
US10742426B2 (en) Public key infrastructure and method of distribution
EP0661845B1 (en) System and method for message authentication in a non-malleable public-key cryptosystem
GB2490407A (en) Joint encryption using base groups, bilinear maps and consistency components
Bai et al. Elliptic curve cryptography based security framework for Internet of Things (IoT) enabled smart card
CN109272314B (en) Secure communication method and system based on two-party collaborative signature calculation
CN109728896A (en) A kind of incoming call certification and source tracing method and process based on block chain
CN103493428B (en) Data encryption
Yin et al. Protecting private data by honey encryption
CN109492359B (en) Secure network middleware for identity authentication and implementation method and device thereof
CN108632295B (en) Method for preventing terminal from repeatedly attacking server
CN103986724A (en) Real-name authentication method and system for e-mail
CN111478768A (en) Key generation and acquisition method and device
Aravind et al. Anti-phishing framework for banking based on visual cryptography
Liu et al. EQRC: an enhanced QR code-based secure E-coupon transaction framework
CN113300841B (en) Identity-based collaborative signature method and system
Singh et al. Electronic Transactions Mechanism for Messaging Privacy
Lax et al. A new approach for electronic signature
Bhanji et al. Secure Server Verification By Using RSA Algorithm And Visual Cryptography
Tanwar et al. Applications of Digital Signatures in Cryptography
Li et al. Digital Signature Technology of Mobile Phone Verification Code based on Biometrics
Novaković et al. PKI systems, directives, standards and national legislation
Fashoto et al. Application of Digital Signature for Securing Communication Using RSA Scheme Based on MDS
Yousuf et al. Secure Emails: An Integrity Assured Email Systems Using PKI

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200731

RJ01 Rejection of invention patent application after publication