CN112163171A - Data chaining method based on terminal signature - Google Patents
Data chaining method based on terminal signature Download PDFInfo
- Publication number
- CN112163171A CN112163171A CN202010994253.0A CN202010994253A CN112163171A CN 112163171 A CN112163171 A CN 112163171A CN 202010994253 A CN202010994253 A CN 202010994253A CN 112163171 A CN112163171 A CN 112163171A
- Authority
- CN
- China
- Prior art keywords
- data
- user
- chain
- signature
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
- G06F16/9554—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL] by using bar codes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Abstract
The invention discloses a data chaining method based on terminal signature. In the whole data chaining process, a user only needs to perform simple clicking or code scanning operation on a web interface and a terminal app, so that the communication overhead is reduced, and the user experience is improved. In the invention, data interacted by three parties is encrypted and the link recording request contains the signature of a user, so that the unforgeability of the link recording request is ensured; authenticating timeliness of the chaining request using the timestamp; data are always stored at a web end, no data leakage risk exists, and a private key is always stored at a terminal, so that the safety of the private key of a user is ensured.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a data chaining method based on terminal signatures.
Background
The user usually stores data in the cloud server due to insufficient storage space and the like, and when the user records the data hash on the block chain, the data hash needs to be signed by using a private key. One approach is to sign on the server side, but this reveals the private key to the server; the other method is to sign at a terminal, but the current terminal signing schemes all need the interaction of the terminal and a server to complete the transmission of data such as hash values, and how to reduce the communication overhead and how to chain the hash values are also problems to be solved.
Disclosure of Invention
Aiming at the defects in the prior art, the data chaining method based on the terminal signature solves the problems of the design of a two-dimensional code at a web end, the design of a terminal signature scheme and the design of a three-party interaction protocol of a block chain, a server and a user terminal.
In order to achieve the purpose of the invention, the invention adopts the technical scheme that: a data chaining method based on terminal signature is characterized by comprising the following steps:
s1, selecting data D on the web interface, and sending a pre-record chain request to the blockchain through the web server;
the pre-record chain request comprises a request identification PREREQUEST and a user identification UID;
s2, generating time stamp T by block chain after receiving the pre-record chain request1And two random numbers r and rkStore (UID, r)k,T1) And random numbers r and r are addedkReturning to the web server;
s3, calculating a symmetric encryption key and a data hash value H through the web server, and encrypting the data H | | | r by using the symmetric encryption keykObtain the ciphertext C1And combines the ciphertext C1Encoding into two-dimensional code, and showing to user in web interfaceTwo-dimensional codes;
s4, scanning the two-dimensional code by using the terminal app, and decoding to obtain a ciphertext C1Calculating a data decryption key1, and decrypting the data H | | | r | | | | r using a decryption key1kUsing the user private key sk through the terminal appuSign H | | r and generate signature sig and timestamp T2Random number rkEncrypting a timestamp T as a symmetric encryption key2Obtaining a ciphertext C by the Hash value H and the random number r2Sending a chain recording request to the block chain;
the chaining REQUEST comprises a REQUEST identifier REQUEST, an application identifier appID, a user identifier UID, a random number r, a signature sig and a ciphertext C2;
S5, after the block chain receives the chain recording request, inquiring (UID, r) to obtain the random number rkAnd a time stamp T1Using a random number rkDecipher ciphertext C2Using the user public key pkuVerifying the signature sig if not queried (UID, r) or the signature sig fails verification or | T1-T2If | ≧ thres, thres is the threshold, then link failure is remembered, if (UID, r) is queried and signature sig verifies and | T1-T2|<When thres, starting to record the chain to obtain a chain recording result res, wherein the chain recording sent to the web server by the block chain comprises an application identifier appID, a user identifier UID and the chain recording result res;
and S6, displaying the corresponding chain recording result res to the user on the web interface according to the chain recording sent to the web server by the block chain.
Further: the calculation formula of the symmetric encryption key in step S3 is:
key=hash(skw·pku)
in the above formula, the hash is a hash algorithm, skwFor web server private key, pkuIs a user public key;
the calculation formula of the data hash value H is as follows:
H=hash(D)。
further: the ciphertext C in the step S31The calculation formula of (2) is as follows:
C1=Enckey(H||r||rk)
in the above equation, Enc is a symmetric encryption algorithm.
Further: the calculation formula of the decryption key1 in step S4 is:
key1=hash(sku·pkw)
in the above formula, the hash is a hash algorithm, skuFor the user's private key, pkwIs a web server public key;
the decryption data H | | r | | | rkThe calculation formula of (2) is as follows:
H||r||rk=Deckey1(C1)
in the above equation, Dec is a symmetric decryption algorithm.
Further: the calculation formula of the signature sig in the step S4 is as follows:
in the above formula, Sign is a Sign function, skuIs the user private key.
Further: the ciphertext C in the step S42The calculation formula of (2) is as follows:
in the above equation, Enc is a symmetric encryption algorithm.
Further: in the step S5, a random number r is usedkDecipher ciphertext C2The calculation formula of (2) is as follows:
in the above equation, Dec is a symmetric decryption algorithm.
The invention has the beneficial effects that:
(1) in the whole data chaining process, a user only needs to perform simple clicking or code scanning operation on a web interface and a terminal app, so that the communication overhead is reduced, and the user experience is improved.
(2) In the invention, data interacted by three parties is encrypted and the link recording request contains the signature of a user, so that the unforgeability of the link recording request is ensured; authenticating timeliness of the chaining request using the timestamp; data are always stored at a web end, no data leakage risk exists, and a private key is always stored at a terminal, so that the safety of the private key of a user is ensured.
Drawings
FIG. 1 is a flow chart of the present invention;
FIG. 2 is a diagram of a three-way interaction protocol according to the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate the understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and it will be apparent to those skilled in the art that various changes may be made without departing from the spirit and scope of the invention as defined and defined in the appended claims, and all matters produced by the invention using the inventive concept are protected.
The invention designs a method for signing data at a terminal and directly initiating a chain-logging request by the terminal aiming at a scene that a user needs to sign a hash value of the data in a user data chain-logging process, the data is stored in a server, and a user private key is kept by the user.
The user and the web server each have a pair of keys, user key: (sk)u,pku) The web server key: (sk)w,pkw)。
As shown in fig. 1, a data chaining method based on terminal signature includes the following steps:
s1, selecting data D on the web interface, and sending a pre-record chain request to the blockchain through the web server;
the pre-record chain request comprises a request identification PREREQUEST and a user identification UID;
s2, generating time stamp T by block chain after receiving the pre-record chain request1And two random numbers r and rkStoring(UID,r,rk,T1) And random numbers r and r are addedkReturning to the web server;
s3, calculating a symmetric encryption key and a data hash value H through the web server, and encrypting the data H | | | r by using the symmetric encryption keykObtain the ciphertext C1And combines the ciphertext C1Coding the two-dimension code into the two-dimension code, and displaying the two-dimension code to a user on a web interface;
the calculation formula of the symmetric encryption key is as follows:
key=hash(skw·pku)
in the above formula, the hash is a hash algorithm, skwFor web server private key, pkuIs a user public key;
the calculation formula of the data hash value H is as follows:
H=hash(D)。
ciphertext C1The calculation formula of (2) is as follows:
C1=Enckey(H||r||rk)
in the above equation, Enc is a symmetric encryption algorithm.
S4, scanning the two-dimensional code by using the terminal app, and decoding to obtain a ciphertext C1Calculating a data decryption key1, and decrypting the data H | | | r | | | | r using a decryption key1kUsing the user private key sk through the terminal appuSign H | | r and generate signature sig and timestamp T2Random number rkEncrypting a timestamp T as a symmetric encryption key2Obtaining a ciphertext C by the Hash value H and the random number r2Sending a chain recording request to the block chain;
the chaining REQUEST comprises a REQUEST identifier REQUEST, an application identifier appID, a user identifier UID, a random number r, a signature sig and a ciphertext C2;
The calculation formula of the decryption key1 is:
key1=hash(sku·pkw)
in the above formula, the hash is a hash algorithm, skuFor the user's private key, pkwIs a web server public key;
the decryption data H | | r | | | rkIs calculated byThe formula is as follows:
H||r||rk=Deckey1(C1)
in the above equation, Dec is a symmetric decryption algorithm.
The calculation formula of the signature sig is as follows:
in the above formula, Sign is a Sign function, skuIs the user private key.
Ciphertext C2The calculation formula of (2) is as follows:
in the above equation, Enc is a symmetric encryption algorithm.
S5, after the block chain receives the chain recording request, inquiring (UID, r) to obtain the random number rkAnd a time stamp T1Using a random number rkDecipher ciphertext C2Using the user public key pkuVerifying the signature sig if not queried (UID, r) or the signature sig fails verification or | T1-T2If | ≧ thres, thres is the threshold, then link failure is remembered, if (UID, r) is queried and signature sig verifies and | T1-T2|<When thres, starting to record the chain to obtain a chain recording result res, wherein the chain recording sent to the web server by the block chain comprises an application identifier appID, a user identifier UID and the chain recording result res;
using a random number rkDecipher ciphertext C2The calculation formula of (2) is as follows:
in the above equation, Dec is a symmetric decryption algorithm.
And S6, displaying the corresponding chain recording result res to the user on the web interface according to the chain recording sent to the web server by the block chain.
The invention comprises three entities: blockchains, web servers, and users. Fig. 2 shows a schematic diagram of a three-party interaction protocol, which specifically includes:
(1) and generating the two-dimensional code. The method comprises the steps that a user selects data on a web interface, a web server sends a pre-chaining request to a blockchain, the blockchain returns a random number to the web server for later verification of the chaining request, the web server generates a two-dimensional code, and the two-dimensional code comprises the data needing the user signature and verification data needed by the chaining;
(2) the user scans the code and notes the chain. And scanning the two-dimensional code by using the terminal app by the user, signing the data, and sending a chain logging request to the block chain.
(3) And displaying the chain recording result. And verifying the legality of the chaining request by the blockchain, returning the chaining result to the web server, and displaying the chaining result to the user by the web server in a web interface.
Claims (7)
1. A data chaining method based on terminal signature is characterized by comprising the following steps:
s1, selecting data D on the web interface, and sending a pre-record chain request to the blockchain through the web server;
the pre-record chain request comprises a request identification PREREQUEST and a user identification UID;
s2, generating time stamp T by block chain after receiving the pre-record chain request1And two random numbers r and rkStore (UID, r)k,T1) And random numbers r and r are addedkReturning to the web server;
s3, calculating a symmetric encryption key and a data hash value H through the web server, and encrypting the data H | | | r by using the symmetric encryption keykObtain the ciphertext C1And combines the ciphertext C1Coding the two-dimension code into the two-dimension code, and displaying the two-dimension code to a user on a web interface;
s4, scanning the two-dimensional code by using the terminal app, and decoding to obtain a ciphertext C1Calculating a data decryption key1, and decrypting the data H | | | r | | | | r using a decryption key1kUsing the user private key sk through the terminal appuSign H | | r and generate signature sig and timestamp T2Random number rkAs symmetrical addingSecret key encryption timestamp T2Obtaining a ciphertext C by the Hash value H and the random number r2Sending a chain recording request to the block chain;
the chaining REQUEST comprises a REQUEST identifier REQUEST, an application identifier appID, a user identifier UID, a random number r, a signature sig and a ciphertext C2;
S5, after the block chain receives the chain recording request, inquiring (UID, r) to obtain the random number rkAnd a time stamp T1Using a random number rkDecipher ciphertext C2Using the user public key pkuVerifying the signature sig if not queried (UID, r) or the signature sig fails verification or | T1-T2If | ≧ thres, thres is the threshold, then link failure is remembered, if (UID, r) is queried and signature sig verifies and | T1-T2|<When thres, starting to record the chain to obtain a chain recording result res, wherein the chain recording sent to the web server by the block chain comprises an application identifier appID, a user identifier UID and the chain recording result res;
and S6, displaying the corresponding chain recording result res to the user on the web interface according to the chain recording sent to the web server by the block chain.
2. The data chaining method based on the terminal signature as claimed in claim 1, wherein the formula for calculating the symmetric encryption key in step S3 is as follows:
key=hash(skw·pku)
in the above formula, the hash is a hash algorithm, skwFor web server private key, pkuIs a user public key;
the calculation formula of the data hash value H is as follows:
H=hash(D)。
3. the method for chaining data based on terminal signature as claimed in claim 1, wherein said ciphertext C in step S31The calculation formula of (2) is as follows:
C1=Enckey(H||r||rk)
in the above equation, Enc is a symmetric encryption algorithm.
4. The terminal-signature-based data chaining method according to claim 1, wherein the calculation formula of the decryption key1 in step S4 is:
key1=hash(sku·pkw)
in the above formula, the hash is a hash algorithm, skuFor the user's private key, pkwIs a web server public key;
the decryption data H | | r | | | rkThe calculation formula of (2) is as follows:
H||r||rk=Deckey1(C1)
in the above equation, Dec is a symmetric decryption algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010994253.0A CN112163171B (en) | 2020-09-21 | 2020-09-21 | Data chaining method based on terminal signature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010994253.0A CN112163171B (en) | 2020-09-21 | 2020-09-21 | Data chaining method based on terminal signature |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112163171A true CN112163171A (en) | 2021-01-01 |
CN112163171B CN112163171B (en) | 2022-03-18 |
Family
ID=73863059
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010994253.0A Active CN112163171B (en) | 2020-09-21 | 2020-09-21 | Data chaining method based on terminal signature |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112163171B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107070948A (en) * | 2017-05-23 | 2017-08-18 | 广东工业大学 | Signature and verification method based on hybrid encryption algorithm in cloud storage |
CN107491946A (en) * | 2017-07-10 | 2017-12-19 | 北京云知科技有限公司 | It is a kind of to store virtual objects to the method, apparatus of block chain and electronic equipment |
CN107493162A (en) * | 2017-07-25 | 2017-12-19 | 中国联合网络通信集团有限公司 | The implementation method and device of block chain node |
CN107769924A (en) * | 2017-09-11 | 2018-03-06 | 福建新大陆支付技术有限公司 | Verify the method and system of POS APK signatures |
CN109376198A (en) * | 2018-10-10 | 2019-02-22 | 百洲集团 | A kind of client quickly enters the method and apparatus of chain |
CN110493174A (en) * | 2019-07-01 | 2019-11-22 | 黄智康 | System and method are investigated using the universal electric file of block chain |
CN110493007A (en) * | 2019-09-06 | 2019-11-22 | 腾讯科技(深圳)有限公司 | A kind of Information Authentication method, apparatus, equipment and storage medium based on block chain |
US20190358515A1 (en) * | 2016-05-02 | 2019-11-28 | Bao Tran | Blockchain |
CN110602089A (en) * | 2019-09-11 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain-based medical data storage method, device, equipment and storage medium |
US10554414B1 (en) * | 2018-08-06 | 2020-02-04 | Tyson York Winarski | Material exchange format MXF file augmented with blockchain hashing technology |
CN110826111A (en) * | 2019-06-26 | 2020-02-21 | 腾讯科技(深圳)有限公司 | Test supervision method, device, equipment and storage medium |
CN110955909A (en) * | 2019-10-12 | 2020-04-03 | 四川九洲电器集团有限责任公司 | Personal data protection method and block link point |
-
2020
- 2020-09-21 CN CN202010994253.0A patent/CN112163171B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190358515A1 (en) * | 2016-05-02 | 2019-11-28 | Bao Tran | Blockchain |
CN107070948A (en) * | 2017-05-23 | 2017-08-18 | 广东工业大学 | Signature and verification method based on hybrid encryption algorithm in cloud storage |
CN107491946A (en) * | 2017-07-10 | 2017-12-19 | 北京云知科技有限公司 | It is a kind of to store virtual objects to the method, apparatus of block chain and electronic equipment |
CN107493162A (en) * | 2017-07-25 | 2017-12-19 | 中国联合网络通信集团有限公司 | The implementation method and device of block chain node |
CN107769924A (en) * | 2017-09-11 | 2018-03-06 | 福建新大陆支付技术有限公司 | Verify the method and system of POS APK signatures |
US10554414B1 (en) * | 2018-08-06 | 2020-02-04 | Tyson York Winarski | Material exchange format MXF file augmented with blockchain hashing technology |
CN109376198A (en) * | 2018-10-10 | 2019-02-22 | 百洲集团 | A kind of client quickly enters the method and apparatus of chain |
CN110826111A (en) * | 2019-06-26 | 2020-02-21 | 腾讯科技(深圳)有限公司 | Test supervision method, device, equipment and storage medium |
CN110493174A (en) * | 2019-07-01 | 2019-11-22 | 黄智康 | System and method are investigated using the universal electric file of block chain |
CN110493007A (en) * | 2019-09-06 | 2019-11-22 | 腾讯科技(深圳)有限公司 | A kind of Information Authentication method, apparatus, equipment and storage medium based on block chain |
CN110602089A (en) * | 2019-09-11 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Block chain-based medical data storage method, device, equipment and storage medium |
CN110955909A (en) * | 2019-10-12 | 2020-04-03 | 四川九洲电器集团有限责任公司 | Personal data protection method and block link point |
Non-Patent Citations (3)
Title |
---|
周艺华 等: "基于区块链技术的数据存证管理系统", 《信息网络安全》 * |
谢开 等: "区块链技术在电力交易中的应用与展望", 《电力系统自动化》 * |
郭炫: "基于区块链技术的数据存储管理系统的研究与实现", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 * |
Also Published As
Publication number | Publication date |
---|---|
CN112163171B (en) | 2022-03-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107948189B (en) | Asymmetric password identity authentication method and device, computer equipment and storage medium | |
CN110213042B (en) | Cloud data deduplication method based on certificate-free proxy re-encryption | |
US11223486B2 (en) | Digital signature method, device, and system | |
CN110048849B (en) | Multi-layer protection session key negotiation method | |
CN103763356A (en) | Establishment method, device and system for connection of secure sockets layers | |
CN112104454B (en) | Data secure transmission method and system | |
CN111884811B (en) | Block chain-based data evidence storing method and data evidence storing platform | |
CN104901935A (en) | Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem) | |
CN104301108A (en) | Signcryption method based from identity environment to certificateless environment | |
CN111080299B (en) | Anti-repudiation method for transaction information, client and server | |
CN113630248A (en) | Session key negotiation method | |
KR20210063378A (en) | Computer-implemented systems and methods that share common secrets | |
CN110086630B (en) | Method for generating digital signature based on Edwards curve | |
CN108809996B (en) | Integrity auditing method for duplicate deletion stored data with different popularity | |
CN111669275B (en) | Master-slave cooperative signature method capable of selecting slave nodes in wireless network environment | |
CN112839328B (en) | Close-contact data verification method, client, server and storage medium | |
CN106850584A (en) | A kind of anonymous authentication method of curstomer-oriented/server network | |
WO2018047132A1 (en) | A system and method for authentication and secure communication | |
GB2589390A (en) | Methods of generating a key and a communication method | |
CN116318654A (en) | SM2 algorithm collaborative signature system, method and equipment integrating quantum key distribution | |
CN112163171B (en) | Data chaining method based on terminal signature | |
CN116232578A (en) | Multi-party collaborative signature system, method and equipment integrating quantum key distribution | |
KR20120039133A (en) | Apparatus and method that generates originality verification and certifies originality verification | |
CN113014376B (en) | Method for safety authentication between user and server | |
CN114386086A (en) | Blacklist data sharing method and obtaining method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |