CN113079025A - Method and system compatible with multiple public key algorithm signatures - Google Patents

Method and system compatible with multiple public key algorithm signatures Download PDF

Info

Publication number
CN113079025A
CN113079025A CN202110373968.9A CN202110373968A CN113079025A CN 113079025 A CN113079025 A CN 113079025A CN 202110373968 A CN202110373968 A CN 202110373968A CN 113079025 A CN113079025 A CN 113079025A
Authority
CN
China
Prior art keywords
public key
signature
key encryption
encryption algorithm
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110373968.9A
Other languages
Chinese (zh)
Inventor
郑姣
宋金泽
李星星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wanxiang Blockchain Inc
Original Assignee
Shanghai Wanxiang Blockchain Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wanxiang Blockchain Inc filed Critical Shanghai Wanxiang Blockchain Inc
Priority to CN202110373968.9A priority Critical patent/CN113079025A/en
Publication of CN113079025A publication Critical patent/CN113079025A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a method and a system for signature compatible with a plurality of public key algorithms, comprising the following steps: step 1: introducing a code base of a public key encryption algorithm into an intelligent contract virtual machine on a block chain; step 2: adding transaction verification logic to the intelligent contract; and step 3: the user signs the transaction according to the public key encryption algorithm; and 4, step 4: the blockchain verifies the transaction signature according to a public key encryption algorithm and transaction verification logic. The invention supports the import of the old key, the original key of the user does not need to be replaced, and the original key can still be normally used on the block chain, thereby reducing the cost of the old system for butting the block chain.

Description

Method and system compatible with multiple public key algorithm signatures
Technical Field
The invention relates to the technical field of block chains, in particular to a method and a system compatible with a plurality of public key algorithm signatures.
Background
In a block chain, in order to ensure that data cannot be tampered in the whole system and ensure the identities of both parties of a transaction are true and reliable, and the like, signature authentication needs to be performed on transaction data.
At present, most block chains adopt a public key encryption algorithm to generate a public key and a private key, the public key is used for encrypting a transaction to obtain a transaction ciphertext, and the private key is used for decrypting the transaction ciphertext to perform signature verification on the transaction when the transaction is performed. Most of the existing block chains only support a public key encryption algorithm (most of the existing block chains adopt the SECP256K1 algorithm), and once the encryption algorithm is determined, the encryption algorithm cannot be changed unless incompatible upgrade is carried out, namely, the encryption algorithm cannot be changed on the premise of not influencing user experience.
Patent document CN109816383A (application number: CN201910131593.8) discloses a blockchain signature method, a blockchain wallet, and a blockchain, which are used to solve the problem that in the prior art, a single fixed public key encryption algorithm is used in a blockchain signature scheme, and the public key encryption algorithm cannot be changed, but the method needs to be implemented by using a blockchain and a matching blockchain wallet of the present invention, and is difficult to smoothly upgrade an old blockchain already in the market, and does not support the introduction of an old key, and needs to regenerate a new key by using the matching blockchain wallet.
Disclosure of Invention
In view of the defects in the prior art, the invention aims to provide a method and a system for signature compatible with a plurality of public key algorithms.
The method for signature compatible with a plurality of public key algorithms provided by the invention comprises the following steps:
step 1: introducing a code base of a public key encryption algorithm into an intelligent contract virtual machine on a block chain;
step 2: adding transaction verification logic to the intelligent contract;
and step 3: the user signs the transaction according to the public key encryption algorithm;
and 4, step 4: the blockchain verifies the transaction signature according to a public key encryption algorithm and transaction verification logic.
Preferably, the step 1 comprises: and the intelligent contract virtual machine encapsulates the function inlet of the public key encryption algorithm and calls the intelligent contract.
Preferably, the step 2 comprises: and calling a function inlet of the packaged public key encryption algorithm, and verifying the signature according to different public key encryption algorithms.
Preferably, the step 3 comprises:
step 3.1: the user uses the selected public key encryption algorithm to make a first signature on the first transaction information, and the first signature and the first transaction information are assembled to generate second transaction information;
step 3.2: and the user makes a second signature on the second transaction information by using a public key encryption algorithm originally supported by the blockchain and assembles the second signature into third transaction information.
Preferably, the step 4 comprises:
step 4.1: the block chain verifies the second signature in the third transaction information in an original mode;
step 4.2: the smart contract verifies the first signature using a user-selected public key encryption algorithm and smart contract transaction verification logic.
The system compatible with a plurality of public key algorithm signatures provided by the invention comprises:
module M1: introducing a code base of a public key encryption algorithm into an intelligent contract virtual machine on a block chain;
module M2: adding transaction verification logic to the intelligent contract;
module M3: the user signs the transaction according to the public key encryption algorithm;
module M4: the blockchain verifies the transaction signature according to a public key encryption algorithm and transaction verification logic.
Preferably, the module M1 includes: and the intelligent contract virtual machine encapsulates the function inlet of the public key encryption algorithm and calls the intelligent contract.
Preferably, the module M2 includes: and calling a function inlet of the packaged public key encryption algorithm, and verifying the signature according to different public key encryption algorithms.
Preferably, the module M3 includes:
module M3.1: the user uses the selected public key encryption algorithm to make a first signature on the first transaction information, and the first signature and the first transaction information are assembled to generate second transaction information;
module M3.2: and the user makes a second signature on the second transaction information by using a public key encryption algorithm originally supported by the blockchain and assembles the second signature into third transaction information.
Preferably, the module M4 includes:
module M4.1: the block chain verifies the second signature in the third transaction information in an original mode;
module M4.2: the smart contract verifies the first signature using a user-selected public key encryption algorithm and smart contract transaction verification logic.
Compared with the prior art, the invention has the following beneficial effects:
(1) by modifying the intelligent contract virtual machine and the method of the intelligent contract transaction verification logic, the problems of smooth upgrade on the existing block chain and compatibility of various public key encryption algorithms are solved; the verification of the original transaction signature of the blockchain is not required to be changed, only the upgrading is required to be carried out on an intelligent contract layer, compared with the modification of the blockchain transaction logic, the modification cost is lower, and the smooth upgrading can be realized;
(2) the public key encryption algorithm can be replaced, and the compatibility of the public key encryption algorithm in a block chain and other scenes is improved;
(3) the import of the old key is supported, the original key of the user does not need to be replaced, and the old key can still be normally used on the block chain, so that the cost of the old system for butting the block chain is reduced.
Drawings
Other features, objects and advantages of the invention will become more apparent upon reading of the detailed description of non-limiting embodiments with reference to the following drawings:
FIG. 1 is a schematic flow chart of the method of the present invention.
Detailed Description
The present invention will be described in detail with reference to specific examples. The following examples will assist those skilled in the art in further understanding the invention, but are not intended to limit the invention in any way. It should be noted that it would be obvious to those skilled in the art that various changes and modifications can be made without departing from the spirit of the invention. All falling within the scope of the present invention.
Example 1:
the method for signature compatible with a plurality of public key algorithms provided by the invention comprises the following steps: step 1: introducing a code base of a public key encryption algorithm into an intelligent contract virtual machine on a block chain; step 2: adding transaction verification logic to the intelligent contract; and step 3: the user signs the transaction according to the public key encryption algorithm; and 4, step 4: the blockchain verifies the transaction signature according to a public key encryption algorithm and transaction verification logic.
The step 1 comprises the following steps: and the intelligent contract virtual machine encapsulates the function inlet of the public key encryption algorithm and calls the intelligent contract. The step 2 comprises the following steps: and calling a function inlet of the packaged public key encryption algorithm, and verifying the signature according to different public key encryption algorithms. The step 3 comprises the following steps: step 3.1: the user uses the selected public key encryption algorithm to make a first signature on the first transaction information, and the first signature and the first transaction information are assembled to generate second transaction information; step 3.2: and the user makes a second signature on the second transaction information by using a public key encryption algorithm originally supported by the blockchain and assembles the second signature into third transaction information. The step 4 comprises the following steps: step 4.1: the block chain verifies the second signature in the third transaction information in an original mode; step 4.2: the smart contract verifies the first signature using a user-selected public key encryption algorithm and smart contract transaction verification logic.
The system compatible with a plurality of public key algorithm signatures provided by the invention comprises: module M1: introducing a code base of a public key encryption algorithm into an intelligent contract virtual machine on a block chain; module M2: adding transaction verification logic to the intelligent contract; module M3: the user signs the transaction according to the public key encryption algorithm; module M4: the blockchain verifies the transaction signature according to a public key encryption algorithm and transaction verification logic.
The module M1 includes: and the intelligent contract virtual machine encapsulates the function inlet of the public key encryption algorithm and calls the intelligent contract. The module M2 includes: and calling a function inlet of the packaged public key encryption algorithm, and verifying the signature according to different public key encryption algorithms. The module M3 includes: module M3.1: the user uses the selected public key encryption algorithm to make a first signature on the first transaction information, and the first signature and the first transaction information are assembled to generate second transaction information; module M3.2: and the user makes a second signature on the second transaction information by using a public key encryption algorithm originally supported by the blockchain and assembles the second signature into third transaction information. The module M4 includes: module M4.1: the block chain verifies the second signature in the third transaction information in an original mode; module M4.2: the smart contract verifies the first signature using a user-selected public key encryption algorithm and smart contract transaction verification logic.
Example 2:
example 2 is a preferred example of example 1.
Referring to fig. 1, the present invention provides a lightweight method for signature compatible with multiple public key algorithms, including the following steps:
step 1: transforming an intelligent contract virtual machine;
step 1.1: introducing a code base of a public key encryption algorithm into an intelligent contract virtual machine on a block chain;
public key encryption or asymmetric encryption: an algorithm of cryptography refers to an encryption algorithm that uses different keys for encryption and decryption. Common public key encryption algorithms: RSA, elliptic curve cryptography ECC, public key encryption algorithm Diffie-Hellman in Diffie-Hellman key exchange protocol, El Gamal, digital signature algorithm DSA, etc. Common code libraries that support public key encryption algorithms are: OpenSSL, Crypto + +, CryptLib, etc.
In the embodiment of the invention, the intelligent contract virtual machine provides computing resources and a running container for the intelligent contract, the intelligent contract needs to interact with the data of the block chain, and the intelligent contract virtual machine meets the data interactivity of the intelligent contract and the block chain or the interactivity with other contracts.
Step 1.2: opening a unified function entrance to an intelligent contract;
in the intelligent contract virtual machine, a code base of a public key encryption algorithm is introduced, and a function inlet is opened for calling the intelligent contract, so that the requirement of calling the public key encryption algorithm function by the intelligent contract can be met. Public key encryption algorithms typically provide functional entries for respective encryption functions, decryption functions, signature verification functions, and the like. The encryption function completes the encryption operation on the plaintext to generate a ciphertext; the decryption function completes decryption operation of the cipher text generated by the encryption function, and a plaintext is restored; the signature function completes the signature operation on the data to generate a signature; and the signature checking function completes signature checking operation of generating a signature for the signature function and outputs a signature checking result.
Because the function names and arguments of the encryption function, decryption function, signature verification function provided by different public key encryption algorithms are mostly not identical. In order to facilitate the function calling of the intelligent contract, the public key encryption algorithm in the step 1.1 can be subjected to a layer of uniform abstract function packaging in the intelligent contract virtual machine, and a set of uniform encryption function, a uniform decryption function, a uniform signature function and a uniform signature verification function are designed to be used as a function inlet of the public key encryption algorithm to call the intelligent contract. The unified encryption function completes the encryption operation on the plaintext according to the selected public key encryption algorithm to generate a ciphertext; the unified decryption function completes decryption operation of the ciphertext generated by the unified encryption function according to the selected public key encryption algorithm, and a plaintext is restored; the unified signature function completes the signature operation on the data according to the selected public key encryption algorithm to generate a signature; and the unified signature checking function completes signature checking operation of generating a signature for the unified signature function according to the selected public key encryption algorithm, and outputs a signature checking result.
In terms of architecture, the intelligent contract virtual machine provides computing resources and a running container for the intelligent contract, and the consensus and the execution module of the block chain are completely decoupled from the intelligent contract virtual machine, so that the introduction of the code base of the public key encryption algorithm into the intelligent contract virtual machine does not affect the transaction logic of the block chain, and the modification of the block chain is small.
Step 2: modifying intelligent contract transaction verification logic;
adding transaction signature verification logic on the intelligent contract, calling the uniform function entry of the public key encryption algorithm in the step 1.2, and performing different verifications on the signature according to different public key encryption algorithms. Because the smart contract transaction verification logic supports different public key encryption algorithms, verification of signatures generated by different public key encryption algorithms may be supported.
And step 3: the user signs the transaction;
step 3.1: generating a first signature;
the user uses the public key encryption algorithm selected by the user to make a first signature on the first transaction information, and the first signature and the first transaction information are assembled to generate second transaction information; the second transaction information carries an algorithm used by the first signature, a public key of a key used by the first signature, the first signature and the first transaction information.
Because the first signature is only verified by the intelligent contract and does not need to be verified by the blockchain transaction logic, the first signature is not limited by a public key encryption algorithm supported by the blockchain transaction logic, and a key used by the first signature can be freely replaced according to the requirement of a user and also supports the introduction of an original old key of the user; the key used by the first signature can be regenerated, and a key which is existed before by the user can also be used; the key used by the first signature may be a key previously registered on the blockchain, or may be a key that has not been previously registered on the blockchain; the algorithm used by the first signature is a public key encryption algorithm selected by the user; the public key encryption algorithm can be replaced by the key used by the first signature, so that the compatibility of the public key encryption algorithm in a blockchain and other scenes is improved. The key used by the first signature supports the import of an old key of a user, the original key of the user does not need to be replaced, the original key can still be normally used on the block chain, and the cost of the old system for butting the block chain is reduced.
Step 3.2: generating a second signature;
the user uses a public key encryption algorithm originally supported by the blockchain to make a second signature on the second transaction information and assembles third transaction information; the key used by the second signature may be a key that has been previously registered on the blockchain, or a key generated by re-registering on the blockchain; the algorithm used by the second signature is a public key encryption algorithm originally supported by the block chain, and the second signature is signed according to a signature method originally supported by the block chain; assembling the third transaction information according to the format and method originally supported by the block chain; the user sends the third transaction information to the blockchain.
And 4, step 4: verifying the transaction signature by the blockchain;
step 4.1: verifying the second signature;
the block link receives third transaction information sent by the user, analyzes the third transaction information according to an original mode, and verifies a second signature; the intelligent contract virtual machine sends second transaction information obtained by analyzing the third transaction information to the intelligent contract; the mode of verifying the second signature by the block chain is the same as the mode before the block chain is modified, so that the block chain verification method does not influence the original transaction logic of the block chain and can be smoothly upgraded.
Step 4.2: verifying the first signature;
the intelligent contract uses a public key encryption algorithm selected by the user, and uses the intelligent contract transaction verification logic in the step 2 to verify the first signature in the step 3.1; after receiving the second transaction information, the intelligent contract analyzes the second transaction information to obtain an algorithm used by the first signature, a public key of a key used by the first signature, the first signature and the first transaction information; the smart contract invokes the unified function entry of the public key algorithm in step 1.2, and verifies the first signature using the algorithm used by the first signature.
Those skilled in the art will appreciate that, in addition to implementing the systems, apparatus, and various modules thereof provided by the present invention in purely computer readable program code, the same procedures can be implemented entirely by logically programming method steps such that the systems, apparatus, and various modules thereof are provided in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Therefore, the system, the device and the modules thereof provided by the present invention can be considered as a hardware component, and the modules included in the system, the device and the modules thereof for implementing various programs can also be considered as structures in the hardware component; modules for performing various functions may also be considered to be both software programs for performing the methods and structures within hardware components.
The foregoing description of specific embodiments of the present invention has been presented. It is to be understood that the present invention is not limited to the specific embodiments described above, and that various changes or modifications may be made by one skilled in the art within the scope of the appended claims without departing from the spirit of the invention. The embodiments and features of the embodiments of the present application may be combined with each other arbitrarily without conflict.

Claims (10)

1. A method for signature compatibility with multiple public key algorithms, comprising:
step 1: introducing a code base of a public key encryption algorithm into an intelligent contract virtual machine on a block chain;
step 2: adding transaction verification logic to the intelligent contract;
and step 3: the user signs the transaction according to the public key encryption algorithm;
and 4, step 4: the blockchain verifies the transaction signature according to a public key encryption algorithm and transaction verification logic.
2. The method for compatible multiple public key algorithm signatures according to claim 1, wherein the step 1 comprises: and the intelligent contract virtual machine encapsulates the function inlet of the public key encryption algorithm and calls the intelligent contract.
3. The method of claim 2, wherein the step 2 comprises: and calling a function inlet of the packaged public key encryption algorithm, and verifying the signature according to different public key encryption algorithms.
4. The method of claim 3, wherein the step 3 comprises:
step 3.1: the user uses the selected public key encryption algorithm to make a first signature on the first transaction information, and the first signature and the first transaction information are assembled to generate second transaction information;
step 3.2: and the user makes a second signature on the second transaction information by using a public key encryption algorithm originally supported by the blockchain and assembles the second signature into third transaction information.
5. The method of claim 4, wherein the step 4 comprises:
step 4.1: the block chain verifies the second signature in the third transaction information in an original mode;
step 4.2: the smart contract verifies the first signature using a user-selected public key encryption algorithm and smart contract transaction verification logic.
6. A system for signature compatibility with a plurality of public key algorithms, comprising:
module M1: introducing a code base of a public key encryption algorithm into an intelligent contract virtual machine on a block chain;
module M2: adding transaction verification logic to the intelligent contract;
module M3: the user signs the transaction according to the public key encryption algorithm;
module M4: the blockchain verifies the transaction signature according to a public key encryption algorithm and transaction verification logic.
7. The system compatible with multiple public key algorithm signatures of claim 6, wherein said module M1 comprises: and the intelligent contract virtual machine encapsulates the function inlet of the public key encryption algorithm and calls the intelligent contract.
8. The system compatible with multiple public key algorithm signatures of claim 7, wherein said module M2 comprises: and calling a function inlet of the packaged public key encryption algorithm, and verifying the signature according to different public key encryption algorithms.
9. The system compatible with multiple public key algorithm signatures of claim 8, wherein said module M3 comprises:
module M3.1: the user uses the selected public key encryption algorithm to make a first signature on the first transaction information, and the first signature and the first transaction information are assembled to generate second transaction information;
module M3.2: and the user makes a second signature on the second transaction information by using a public key encryption algorithm originally supported by the blockchain and assembles the second signature into third transaction information.
10. The system compatible with multiple public key algorithm signatures of claim 9, wherein said module M4 comprises:
module M4.1: the block chain verifies the second signature in the third transaction information in an original mode;
module M4.2: the smart contract verifies the first signature using a user-selected public key encryption algorithm and smart contract transaction verification logic.
CN202110373968.9A 2021-04-07 2021-04-07 Method and system compatible with multiple public key algorithm signatures Pending CN113079025A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110373968.9A CN113079025A (en) 2021-04-07 2021-04-07 Method and system compatible with multiple public key algorithm signatures

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110373968.9A CN113079025A (en) 2021-04-07 2021-04-07 Method and system compatible with multiple public key algorithm signatures

Publications (1)

Publication Number Publication Date
CN113079025A true CN113079025A (en) 2021-07-06

Family

ID=76615579

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110373968.9A Pending CN113079025A (en) 2021-04-07 2021-04-07 Method and system compatible with multiple public key algorithm signatures

Country Status (1)

Country Link
CN (1) CN113079025A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115549928A (en) * 2022-11-30 2022-12-30 山东区块链研究院 Signature checking method, system, storage medium and equipment in block chain system
WO2024159802A1 (en) * 2023-01-31 2024-08-08 腾讯科技(深圳)有限公司 Blockchain transaction processing method, related device, and medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1514572A (en) * 2002-12-31 2004-07-21 北京因特时代信息技术有限公司 Distribution type data encryption method
CN108848058A (en) * 2018-05-07 2018-11-20 众安信息技术服务有限公司 Intelligent contract processing method and block catenary system
CN109816383A (en) * 2019-02-22 2019-05-28 杭州秘猿科技有限公司 A kind of block chain endorsement method, block chain wallet and block chain
CN109831298A (en) * 2019-01-31 2019-05-31 阿里巴巴集团控股有限公司 The method of security update key and node, storage medium in block chain
US20190207760A1 (en) * 2017-12-29 2019-07-04 Commissariat A L'energie Atomique Et Aux Energies Alternatives Method of exchanging keys by smart contract implemented on a blockchain
CN110602138A (en) * 2019-09-26 2019-12-20 腾讯科技(深圳)有限公司 Data processing method and device for block chain network, electronic equipment and storage medium
CN111222160A (en) * 2019-12-30 2020-06-02 联动优势(北京)数字科技有限公司 Intelligent contract execution method and system
CN111371559A (en) * 2020-02-27 2020-07-03 支付宝(杭州)信息技术有限公司 Material inventory data providing method, device and system based on block chain
US20200342092A1 (en) * 2019-04-26 2020-10-29 Alibaba Group Holding Limited Securely executing smart contract operations in a trusted execution environment
CN112288435A (en) * 2020-11-20 2021-01-29 天翼电子商务有限公司 Intelligent contract execution method supporting trusted execution environment
WO2021060720A1 (en) * 2019-09-26 2021-04-01 (주)하이퍼서트 Blockchain system supporting change in plain text data included in transaction

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1514572A (en) * 2002-12-31 2004-07-21 北京因特时代信息技术有限公司 Distribution type data encryption method
US20190207760A1 (en) * 2017-12-29 2019-07-04 Commissariat A L'energie Atomique Et Aux Energies Alternatives Method of exchanging keys by smart contract implemented on a blockchain
CN108848058A (en) * 2018-05-07 2018-11-20 众安信息技术服务有限公司 Intelligent contract processing method and block catenary system
CN109831298A (en) * 2019-01-31 2019-05-31 阿里巴巴集团控股有限公司 The method of security update key and node, storage medium in block chain
CN109816383A (en) * 2019-02-22 2019-05-28 杭州秘猿科技有限公司 A kind of block chain endorsement method, block chain wallet and block chain
US20200342092A1 (en) * 2019-04-26 2020-10-29 Alibaba Group Holding Limited Securely executing smart contract operations in a trusted execution environment
CN110602138A (en) * 2019-09-26 2019-12-20 腾讯科技(深圳)有限公司 Data processing method and device for block chain network, electronic equipment and storage medium
WO2021060720A1 (en) * 2019-09-26 2021-04-01 (주)하이퍼서트 Blockchain system supporting change in plain text data included in transaction
CN111222160A (en) * 2019-12-30 2020-06-02 联动优势(北京)数字科技有限公司 Intelligent contract execution method and system
CN111371559A (en) * 2020-02-27 2020-07-03 支付宝(杭州)信息技术有限公司 Material inventory data providing method, device and system based on block chain
CN112288435A (en) * 2020-11-20 2021-01-29 天翼电子商务有限公司 Intelligent contract execution method supporting trusted execution environment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115549928A (en) * 2022-11-30 2022-12-30 山东区块链研究院 Signature checking method, system, storage medium and equipment in block chain system
CN115549928B (en) * 2022-11-30 2023-06-13 山东区块链研究院 Signature verification method, system, storage medium and equipment in block chain system
WO2024159802A1 (en) * 2023-01-31 2024-08-08 腾讯科技(深圳)有限公司 Blockchain transaction processing method, related device, and medium

Similar Documents

Publication Publication Date Title
CN111355718B (en) Block chain intelligent contract cloud deployment system and method
CN110602138B (en) Data processing method and device for block chain network, electronic equipment and storage medium
WO2018145547A1 (en) Method for updating certificate issuer public key, and related device and system
CN105706048B (en) It is authenticated using the media client end device of hardware root of trust
JP4638912B2 (en) Method for transmitting a direct proof private key in a signed group to a device using a distribution CD
JP4501349B2 (en) System module execution device
US20220141039A1 (en) Certificate based security using post quantum cryptography
WO2016107203A1 (en) Identity authentication method and device
US8495383B2 (en) Method for the secure storing of program state data in an electronic device
CN104426658B (en) The method and device of authentication is carried out to the application on mobile terminal
CN113079025A (en) Method and system compatible with multiple public key algorithm signatures
CN113541970B (en) Method and system for using distributed identifier
CN112737779A (en) Service method and device for cipher machine, cipher machine and storage medium
CN110740038B (en) Blockchain and communication method, gateway, communication system and storage medium thereof
CN111859415A (en) Neural network model encryption system and method
CN114499892B (en) Firmware starting method and device, computer equipment and readable storage medium
CN111628863B (en) Data signature method and device, electronic equipment and storage medium
JPH1131105A (en) Device and method for producing data capsule
CN114223176B (en) Certificate management method and device
Kostiainen et al. Practical property-based attestation on mobile devices
CN113709734B (en) Unmanned aerial vehicle distributed identity authentication method based on blockchain
Schleiffer et al. Secure key management-a key feature for modern vehicle electronics
CN110474968B (en) Self-adaptive sensing type block chain mixed consensus mechanism structure and method thereof
CN116881936A (en) Trusted computing method and related equipment
CN115086048B (en) Data processing method, device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210706

RJ01 Rejection of invention patent application after publication