CN112163171A - Data chaining method based on terminal signature - Google Patents

Data chaining method based on terminal signature Download PDF

Info

Publication number
CN112163171A
CN112163171A CN202010994253.0A CN202010994253A CN112163171A CN 112163171 A CN112163171 A CN 112163171A CN 202010994253 A CN202010994253 A CN 202010994253A CN 112163171 A CN112163171 A CN 112163171A
Authority
CN
China
Prior art keywords
data
user
chain
signature
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010994253.0A
Other languages
Chinese (zh)
Other versions
CN112163171B (en
Inventor
姜孟杉
李亚荣
白健
王震
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electronic Technology Cyber Security Co Ltd
Original Assignee
China Electronic Technology Cyber Security Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Electronic Technology Cyber Security Co Ltd filed Critical China Electronic Technology Cyber Security Co Ltd
Priority to CN202010994253.0A priority Critical patent/CN112163171B/en
Publication of CN112163171A publication Critical patent/CN112163171A/en
Application granted granted Critical
Publication of CN112163171B publication Critical patent/CN112163171B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9554Retrieval from the web using information identifiers, e.g. uniform resource locators [URL] by using bar codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

The invention discloses a data chaining method based on terminal signature. In the whole data chaining process, a user only needs to perform simple clicking or code scanning operation on a web interface and a terminal app, so that the communication overhead is reduced, and the user experience is improved. In the invention, data interacted by three parties is encrypted and the link recording request contains the signature of a user, so that the unforgeability of the link recording request is ensured; authenticating timeliness of the chaining request using the timestamp; data are always stored at a web end, no data leakage risk exists, and a private key is always stored at a terminal, so that the safety of the private key of a user is ensured.

Description

Data chaining method based on terminal signature
Technical Field
The invention relates to the technical field of block chains, in particular to a data chaining method based on terminal signatures.
Background
The user usually stores data in the cloud server due to insufficient storage space and the like, and when the user records the data hash on the block chain, the data hash needs to be signed by using a private key. One approach is to sign on the server side, but this reveals the private key to the server; the other method is to sign at a terminal, but the current terminal signing schemes all need the interaction of the terminal and a server to complete the transmission of data such as hash values, and how to reduce the communication overhead and how to chain the hash values are also problems to be solved.
Disclosure of Invention
Aiming at the defects in the prior art, the data chaining method based on the terminal signature solves the problems of the design of a two-dimensional code at a web end, the design of a terminal signature scheme and the design of a three-party interaction protocol of a block chain, a server and a user terminal.
In order to achieve the purpose of the invention, the invention adopts the technical scheme that: a data chaining method based on terminal signature is characterized by comprising the following steps:
s1, selecting data D on the web interface, and sending a pre-record chain request to the blockchain through the web server;
the pre-record chain request comprises a request identification PREREQUEST and a user identification UID;
s2, generating time stamp T by block chain after receiving the pre-record chain request1And two random numbers r and rkStore (UID, r)k,T1) And random numbers r and r are addedkReturning to the web server;
s3, calculating a symmetric encryption key and a data hash value H through the web server, and encrypting the data H | | | r by using the symmetric encryption keykObtain the ciphertext C1And combines the ciphertext C1Encoding into two-dimensional code, and showing to user in web interfaceTwo-dimensional codes;
s4, scanning the two-dimensional code by using the terminal app, and decoding to obtain a ciphertext C1Calculating a data decryption key1, and decrypting the data H | | | r | | | | r using a decryption key1kUsing the user private key sk through the terminal appuSign H | | r and generate signature sig and timestamp T2Random number rkEncrypting a timestamp T as a symmetric encryption key2Obtaining a ciphertext C by the Hash value H and the random number r2Sending a chain recording request to the block chain;
the chaining REQUEST comprises a REQUEST identifier REQUEST, an application identifier appID, a user identifier UID, a random number r, a signature sig and a ciphertext C2
S5, after the block chain receives the chain recording request, inquiring (UID, r) to obtain the random number rkAnd a time stamp T1Using a random number rkDecipher ciphertext C2Using the user public key pkuVerifying the signature sig if not queried (UID, r) or the signature sig fails verification or | T1-T2If | ≧ thres, thres is the threshold, then link failure is remembered, if (UID, r) is queried and signature sig verifies and | T1-T2|<When thres, starting to record the chain to obtain a chain recording result res, wherein the chain recording sent to the web server by the block chain comprises an application identifier appID, a user identifier UID and the chain recording result res;
and S6, displaying the corresponding chain recording result res to the user on the web interface according to the chain recording sent to the web server by the block chain.
Further: the calculation formula of the symmetric encryption key in step S3 is:
key=hash(skw·pku)
in the above formula, the hash is a hash algorithm, skwFor web server private key, pkuIs a user public key;
the calculation formula of the data hash value H is as follows:
H=hash(D)。
further: the ciphertext C in the step S31The calculation formula of (2) is as follows:
C1=Enckey(H||r||rk)
in the above equation, Enc is a symmetric encryption algorithm.
Further: the calculation formula of the decryption key1 in step S4 is:
key1=hash(sku·pkw)
in the above formula, the hash is a hash algorithm, skuFor the user's private key, pkwIs a web server public key;
the decryption data H | | r | | | rkThe calculation formula of (2) is as follows:
H||r||rk=Deckey1(C1)
in the above equation, Dec is a symmetric decryption algorithm.
Further: the calculation formula of the signature sig in the step S4 is as follows:
Figure BDA0002691972040000031
in the above formula, Sign is a Sign function, skuIs the user private key.
Further: the ciphertext C in the step S42The calculation formula of (2) is as follows:
Figure BDA0002691972040000032
in the above equation, Enc is a symmetric encryption algorithm.
Further: in the step S5, a random number r is usedkDecipher ciphertext C2The calculation formula of (2) is as follows:
Figure BDA0002691972040000033
in the above equation, Dec is a symmetric decryption algorithm.
The invention has the beneficial effects that:
(1) in the whole data chaining process, a user only needs to perform simple clicking or code scanning operation on a web interface and a terminal app, so that the communication overhead is reduced, and the user experience is improved.
(2) In the invention, data interacted by three parties is encrypted and the link recording request contains the signature of a user, so that the unforgeability of the link recording request is ensured; authenticating timeliness of the chaining request using the timestamp; data are always stored at a web end, no data leakage risk exists, and a private key is always stored at a terminal, so that the safety of the private key of a user is ensured.
Drawings
FIG. 1 is a flow chart of the present invention;
FIG. 2 is a diagram of a three-way interaction protocol according to the present invention.
Detailed Description
The following description of the embodiments of the present invention is provided to facilitate the understanding of the present invention by those skilled in the art, but it should be understood that the present invention is not limited to the scope of the embodiments, and it will be apparent to those skilled in the art that various changes may be made without departing from the spirit and scope of the invention as defined and defined in the appended claims, and all matters produced by the invention using the inventive concept are protected.
The invention designs a method for signing data at a terminal and directly initiating a chain-logging request by the terminal aiming at a scene that a user needs to sign a hash value of the data in a user data chain-logging process, the data is stored in a server, and a user private key is kept by the user.
The user and the web server each have a pair of keys, user key: (sk)u,pku) The web server key: (sk)w,pkw)。
As shown in fig. 1, a data chaining method based on terminal signature includes the following steps:
s1, selecting data D on the web interface, and sending a pre-record chain request to the blockchain through the web server;
the pre-record chain request comprises a request identification PREREQUEST and a user identification UID;
s2, generating time stamp T by block chain after receiving the pre-record chain request1And two random numbers r and rkStoring(UID,r,rk,T1) And random numbers r and r are addedkReturning to the web server;
s3, calculating a symmetric encryption key and a data hash value H through the web server, and encrypting the data H | | | r by using the symmetric encryption keykObtain the ciphertext C1And combines the ciphertext C1Coding the two-dimension code into the two-dimension code, and displaying the two-dimension code to a user on a web interface;
the calculation formula of the symmetric encryption key is as follows:
key=hash(skw·pku)
in the above formula, the hash is a hash algorithm, skwFor web server private key, pkuIs a user public key;
the calculation formula of the data hash value H is as follows:
H=hash(D)。
ciphertext C1The calculation formula of (2) is as follows:
C1=Enckey(H||r||rk)
in the above equation, Enc is a symmetric encryption algorithm.
S4, scanning the two-dimensional code by using the terminal app, and decoding to obtain a ciphertext C1Calculating a data decryption key1, and decrypting the data H | | | r | | | | r using a decryption key1kUsing the user private key sk through the terminal appuSign H | | r and generate signature sig and timestamp T2Random number rkEncrypting a timestamp T as a symmetric encryption key2Obtaining a ciphertext C by the Hash value H and the random number r2Sending a chain recording request to the block chain;
the chaining REQUEST comprises a REQUEST identifier REQUEST, an application identifier appID, a user identifier UID, a random number r, a signature sig and a ciphertext C2
The calculation formula of the decryption key1 is:
key1=hash(sku·pkw)
in the above formula, the hash is a hash algorithm, skuFor the user's private key, pkwIs a web server public key;
the decryption data H | | r | | | rkIs calculated byThe formula is as follows:
H||r||rk=Deckey1(C1)
in the above equation, Dec is a symmetric decryption algorithm.
The calculation formula of the signature sig is as follows:
Figure BDA0002691972040000051
in the above formula, Sign is a Sign function, skuIs the user private key.
Ciphertext C2The calculation formula of (2) is as follows:
Figure BDA0002691972040000052
in the above equation, Enc is a symmetric encryption algorithm.
S5, after the block chain receives the chain recording request, inquiring (UID, r) to obtain the random number rkAnd a time stamp T1Using a random number rkDecipher ciphertext C2Using the user public key pkuVerifying the signature sig if not queried (UID, r) or the signature sig fails verification or | T1-T2If | ≧ thres, thres is the threshold, then link failure is remembered, if (UID, r) is queried and signature sig verifies and | T1-T2|<When thres, starting to record the chain to obtain a chain recording result res, wherein the chain recording sent to the web server by the block chain comprises an application identifier appID, a user identifier UID and the chain recording result res;
using a random number rkDecipher ciphertext C2The calculation formula of (2) is as follows:
Figure BDA0002691972040000061
in the above equation, Dec is a symmetric decryption algorithm.
And S6, displaying the corresponding chain recording result res to the user on the web interface according to the chain recording sent to the web server by the block chain.
The invention comprises three entities: blockchains, web servers, and users. Fig. 2 shows a schematic diagram of a three-party interaction protocol, which specifically includes:
(1) and generating the two-dimensional code. The method comprises the steps that a user selects data on a web interface, a web server sends a pre-chaining request to a blockchain, the blockchain returns a random number to the web server for later verification of the chaining request, the web server generates a two-dimensional code, and the two-dimensional code comprises the data needing the user signature and verification data needed by the chaining;
(2) the user scans the code and notes the chain. And scanning the two-dimensional code by using the terminal app by the user, signing the data, and sending a chain logging request to the block chain.
(3) And displaying the chain recording result. And verifying the legality of the chaining request by the blockchain, returning the chaining result to the web server, and displaying the chaining result to the user by the web server in a web interface.

Claims (7)

1. A data chaining method based on terminal signature is characterized by comprising the following steps:
s1, selecting data D on the web interface, and sending a pre-record chain request to the blockchain through the web server;
the pre-record chain request comprises a request identification PREREQUEST and a user identification UID;
s2, generating time stamp T by block chain after receiving the pre-record chain request1And two random numbers r and rkStore (UID, r)k,T1) And random numbers r and r are addedkReturning to the web server;
s3, calculating a symmetric encryption key and a data hash value H through the web server, and encrypting the data H | | | r by using the symmetric encryption keykObtain the ciphertext C1And combines the ciphertext C1Coding the two-dimension code into the two-dimension code, and displaying the two-dimension code to a user on a web interface;
s4, scanning the two-dimensional code by using the terminal app, and decoding to obtain a ciphertext C1Calculating a data decryption key1, and decrypting the data H | | | r | | | | r using a decryption key1kUsing the user private key sk through the terminal appuSign H | | r and generate signature sig and timestamp T2Random number rkAs symmetrical addingSecret key encryption timestamp T2Obtaining a ciphertext C by the Hash value H and the random number r2Sending a chain recording request to the block chain;
the chaining REQUEST comprises a REQUEST identifier REQUEST, an application identifier appID, a user identifier UID, a random number r, a signature sig and a ciphertext C2
S5, after the block chain receives the chain recording request, inquiring (UID, r) to obtain the random number rkAnd a time stamp T1Using a random number rkDecipher ciphertext C2Using the user public key pkuVerifying the signature sig if not queried (UID, r) or the signature sig fails verification or | T1-T2If | ≧ thres, thres is the threshold, then link failure is remembered, if (UID, r) is queried and signature sig verifies and | T1-T2|<When thres, starting to record the chain to obtain a chain recording result res, wherein the chain recording sent to the web server by the block chain comprises an application identifier appID, a user identifier UID and the chain recording result res;
and S6, displaying the corresponding chain recording result res to the user on the web interface according to the chain recording sent to the web server by the block chain.
2. The data chaining method based on the terminal signature as claimed in claim 1, wherein the formula for calculating the symmetric encryption key in step S3 is as follows:
key=hash(skw·pku)
in the above formula, the hash is a hash algorithm, skwFor web server private key, pkuIs a user public key;
the calculation formula of the data hash value H is as follows:
H=hash(D)。
3. the method for chaining data based on terminal signature as claimed in claim 1, wherein said ciphertext C in step S31The calculation formula of (2) is as follows:
C1=Enckey(H||r||rk)
in the above equation, Enc is a symmetric encryption algorithm.
4. The terminal-signature-based data chaining method according to claim 1, wherein the calculation formula of the decryption key1 in step S4 is:
key1=hash(sku·pkw)
in the above formula, the hash is a hash algorithm, skuFor the user's private key, pkwIs a web server public key;
the decryption data H | | r | | | rkThe calculation formula of (2) is as follows:
H||r||rk=Deckey1(C1)
in the above equation, Dec is a symmetric decryption algorithm.
5. The method for chaining data based on terminal signature as claimed in claim 1, wherein the calculation formula of signature sig in step S4 is:
Figure FDA0002691972030000021
in the above formula, Sign is a Sign function, skuIs the user private key.
6. The method for chaining data based on terminal signature as claimed in claim 1, wherein said ciphertext C in step S42The calculation formula of (2) is as follows:
Figure FDA0002691972030000022
in the above equation, Enc is a symmetric encryption algorithm.
7. The method for chaining data based on terminal signature as claimed in claim 1, wherein said step S5 uses a random number rkDecipher ciphertext C2The calculation formula of (2) is as follows:
Figure FDA0002691972030000031
in the above equation, Dec is a symmetric decryption algorithm.
CN202010994253.0A 2020-09-21 2020-09-21 Data chaining method based on terminal signature Active CN112163171B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010994253.0A CN112163171B (en) 2020-09-21 2020-09-21 Data chaining method based on terminal signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010994253.0A CN112163171B (en) 2020-09-21 2020-09-21 Data chaining method based on terminal signature

Publications (2)

Publication Number Publication Date
CN112163171A true CN112163171A (en) 2021-01-01
CN112163171B CN112163171B (en) 2022-03-18

Family

ID=73863059

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010994253.0A Active CN112163171B (en) 2020-09-21 2020-09-21 Data chaining method based on terminal signature

Country Status (1)

Country Link
CN (1) CN112163171B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107070948A (en) * 2017-05-23 2017-08-18 广东工业大学 Signature and verification method based on hybrid encryption algorithm in cloud storage
CN107491946A (en) * 2017-07-10 2017-12-19 北京云知科技有限公司 It is a kind of to store virtual objects to the method, apparatus of block chain and electronic equipment
CN107493162A (en) * 2017-07-25 2017-12-19 中国联合网络通信集团有限公司 The implementation method and device of block chain node
CN107769924A (en) * 2017-09-11 2018-03-06 福建新大陆支付技术有限公司 Verify the method and system of POS APK signatures
CN109376198A (en) * 2018-10-10 2019-02-22 百洲集团 A kind of client quickly enters the method and apparatus of chain
CN110493174A (en) * 2019-07-01 2019-11-22 黄智康 System and method are investigated using the universal electric file of block chain
CN110493007A (en) * 2019-09-06 2019-11-22 腾讯科技(深圳)有限公司 A kind of Information Authentication method, apparatus, equipment and storage medium based on block chain
US20190358515A1 (en) * 2016-05-02 2019-11-28 Bao Tran Blockchain
CN110602089A (en) * 2019-09-11 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based medical data storage method, device, equipment and storage medium
US10554414B1 (en) * 2018-08-06 2020-02-04 Tyson York Winarski Material exchange format MXF file augmented with blockchain hashing technology
CN110826111A (en) * 2019-06-26 2020-02-21 腾讯科技(深圳)有限公司 Test supervision method, device, equipment and storage medium
CN110955909A (en) * 2019-10-12 2020-04-03 四川九洲电器集团有限责任公司 Personal data protection method and block link point

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190358515A1 (en) * 2016-05-02 2019-11-28 Bao Tran Blockchain
CN107070948A (en) * 2017-05-23 2017-08-18 广东工业大学 Signature and verification method based on hybrid encryption algorithm in cloud storage
CN107491946A (en) * 2017-07-10 2017-12-19 北京云知科技有限公司 It is a kind of to store virtual objects to the method, apparatus of block chain and electronic equipment
CN107493162A (en) * 2017-07-25 2017-12-19 中国联合网络通信集团有限公司 The implementation method and device of block chain node
CN107769924A (en) * 2017-09-11 2018-03-06 福建新大陆支付技术有限公司 Verify the method and system of POS APK signatures
US10554414B1 (en) * 2018-08-06 2020-02-04 Tyson York Winarski Material exchange format MXF file augmented with blockchain hashing technology
CN109376198A (en) * 2018-10-10 2019-02-22 百洲集团 A kind of client quickly enters the method and apparatus of chain
CN110826111A (en) * 2019-06-26 2020-02-21 腾讯科技(深圳)有限公司 Test supervision method, device, equipment and storage medium
CN110493174A (en) * 2019-07-01 2019-11-22 黄智康 System and method are investigated using the universal electric file of block chain
CN110493007A (en) * 2019-09-06 2019-11-22 腾讯科技(深圳)有限公司 A kind of Information Authentication method, apparatus, equipment and storage medium based on block chain
CN110602089A (en) * 2019-09-11 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based medical data storage method, device, equipment and storage medium
CN110955909A (en) * 2019-10-12 2020-04-03 四川九洲电器集团有限责任公司 Personal data protection method and block link point

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
周艺华 等: "基于区块链技术的数据存证管理系统", 《信息网络安全》 *
谢开 等: "区块链技术在电力交易中的应用与展望", 《电力系统自动化》 *
郭炫: "基于区块链技术的数据存储管理系统的研究与实现", 《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》 *

Also Published As

Publication number Publication date
CN112163171B (en) 2022-03-18

Similar Documents

Publication Publication Date Title
CN107948189B (en) Asymmetric password identity authentication method and device, computer equipment and storage medium
CN110213042B (en) Cloud data deduplication method based on certificate-free proxy re-encryption
US11223486B2 (en) Digital signature method, device, and system
CN110048849B (en) Multi-layer protection session key negotiation method
CN103763356A (en) Establishment method, device and system for connection of secure sockets layers
CN112104454B (en) Data secure transmission method and system
CN111884811B (en) Block chain-based data evidence storing method and data evidence storing platform
CN104901935A (en) Bilateral authentication and data interaction security protection method based on CPK (Combined Public Key Cryptosystem)
CN104301108A (en) Signcryption method based from identity environment to certificateless environment
CN111080299B (en) Anti-repudiation method for transaction information, client and server
CN113630248A (en) Session key negotiation method
KR20210063378A (en) Computer-implemented systems and methods that share common secrets
CN110086630B (en) Method for generating digital signature based on Edwards curve
CN108809996B (en) Integrity auditing method for duplicate deletion stored data with different popularity
CN111669275B (en) Master-slave cooperative signature method capable of selecting slave nodes in wireless network environment
CN112839328B (en) Close-contact data verification method, client, server and storage medium
CN106850584A (en) A kind of anonymous authentication method of curstomer-oriented/server network
WO2018047132A1 (en) A system and method for authentication and secure communication
GB2589390A (en) Methods of generating a key and a communication method
CN116318654A (en) SM2 algorithm collaborative signature system, method and equipment integrating quantum key distribution
CN112163171B (en) Data chaining method based on terminal signature
CN116232578A (en) Multi-party collaborative signature system, method and equipment integrating quantum key distribution
KR20120039133A (en) Apparatus and method that generates originality verification and certifies originality verification
CN113014376B (en) Method for safety authentication between user and server
CN114386086A (en) Blacklist data sharing method and obtaining method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant