CN113536347A - Bidding method and system based on digital signature - Google Patents

Bidding method and system based on digital signature Download PDF

Info

Publication number
CN113536347A
CN113536347A CN202110830327.1A CN202110830327A CN113536347A CN 113536347 A CN113536347 A CN 113536347A CN 202110830327 A CN202110830327 A CN 202110830327A CN 113536347 A CN113536347 A CN 113536347A
Authority
CN
China
Prior art keywords
group
signature
ring
bidding
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110830327.1A
Other languages
Chinese (zh)
Inventor
陈虹宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Cinghoo Technology Co ltd
Original Assignee
Sichuan Cinghoo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Cinghoo Technology Co ltd filed Critical Sichuan Cinghoo Technology Co ltd
Priority to CN202110830327.1A priority Critical patent/CN113536347A/en
Publication of CN113536347A publication Critical patent/CN113536347A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions

Abstract

The invention discloses a bidding method and a system based on digital signatures, wherein in the bidding process, a digital signature method is adopted to sign and store files generated in the bidding process, and the digital signature method comprises a group signature method and a ring signature method which are anonymous signatures; the invention has the advantages that the ring signature protocol is used, when the bidding unit receives the bidding document, only whether the bidding party is a ring member can be determined, but the identity of the bidding party cannot be determined, and the identity anonymity of the bidding party can be ensured; identity authentication is realized on the premise of not exposing user safety information, and the method can help the bidding and inviting parties to effectively overcome risks; through the chaining of the ring signatures, the bidding unit can effectively judge whether any two ring signatures come from one bidding party, so that the uniqueness of the legal bidding party is ensured.

Description

Bidding method and system based on digital signature
Technical Field
The invention relates to the technical field of bidding, in particular to a bidding method and system based on digital signatures.
Background
In recent years, the bidding service has not only been limited to bidding and bidding in a fixed place, but also online bidding, and this new form brings great convenience to customers and manufacturers, i.e. saving money and time, so this form is gradually replacing the traditional bidding form, but in the online bidding adopted today, the signature of the file in the bidding process is not transparent, and the security of the signed file in the bidding cannot be guaranteed, and the authenticity of the signed file cannot be guaranteed.
In view of this, the present application is specifically made.
Disclosure of Invention
The invention aims to solve the technical problem of how to realize the authenticity of the signature in the transmission file in the online bidding process, and aims to provide a bidding method and a system based on digital signature, which can increase the security of the signature file and ensure the openness and transparency of the signature file in the bidding business processing process.
The invention is realized by the following technical scheme:
a digital signature-based bidding method is characterized in that in a bidding process, a digital signature method is adopted to sign and store files generated in the bidding process, and the digital signature method comprises a group signature method and a ring signature method, and both the group signature method and the ring signature method are anonymous signatures.
In the traditional on-line bidding business processing, all on-line bidding modes are adopted, but in the traditional on-line bidding business processing, the transmission processing is usually carried out on the basis of web pages, but in the file transmission process, the file cannot be disclosed and transparent, and in the file signature of the bidding business processing, the file is not encrypted, so that the authenticity cannot be ensured; the invention provides a bidding method based on digital signature, which combines the group signature and ring signature functions with anonymity performance with the bidding service processing, realizes the encryption of a signature file and can ensure the privacy of personnel in the processing process.
Preferably, the specific method steps of the group signature include:
creating a group through a first user, and simultaneously generating a group management private key and a group public key based on the created group, wherein the first user is a trusted third party;
all qualified bidders to participate in bidding are taken as group members to join a group, and the group member private keys are distributed to the group members through a first user based on a group management private key, wherein the group members comprise a tenderer and a bidder;
the group members acquire a first file, sign the first file based on a private key of the group members to acquire a second file, and transmit the second file through an anonymous channel, wherein the first file is a file which is transmitted to the group members and needs to be signed by the group members;
randomly selecting one verifier, and verifying the group signature in the second file based on the group public key;
and after the verification is completed, the group member authority is revoked by the first user publishing the revocation private key list.
Preferably, the group signature method further includes an open signature method, and the method includes: based on the group management private key, the group signature is obtained through the first user, and the group membership is obtained according to the group signature.
Preferably, the group signature further comprises a first supervisor for tracking the group signature.
Preferably, the specific method steps of the ring signature include:
acquiring a plurality of ring members, wherein each ring member is provided with a corresponding private key;
the ring members create rings through own private keys and a plurality of ring member public keys, and generate ring public keys based on the created rings;
each member on the ring generates a ring signature based on the ring public key and the corresponding private key; the ring members are bidders.
Preferably, the ring signature method further includes a signature verification method, and the signature verification method includes: and taking the tenderer as a verifier to verify the ring signature through the ring public key.
The embodiment also discloses a bidding system based on digital signature, which is used for signing and storing the file generated by the bidding process by adopting a digital signature method in the bidding process, wherein the digital signature method comprises a group signature method and a ring signature method, and both the group signature method and the ring signature method are anonymous signatures.
Preferably, the method comprises the following steps:
a group creation module: the group management system comprises a first user, a second user and a third party, wherein the first user is used for creating a group and simultaneously generating a group management private key and a group public key based on the created group, and the first user is a trusted third party;
the private key distribution module: the system comprises a group management private key, a first user and a second user, wherein the group management private key is used for distributing a group member private key to the group members through the first user, and the group members comprise a tenderer and a bidder;
the file transmission module is used for acquiring a first file by a group member, signing the first file based on a private key of the group member to acquire a second file, and transmitting the second file through an anonymous channel, wherein the first file is a file which is transmitted to the group member and needs to be signed by the group member;
the verification module is used for randomly selecting one verifier and verifying the group signature in the second file based on the group public key;
and the revocation module is used for revoking the group member authority by publishing a revocation private key list by the first user after the verification is finished.
Preferably, the method comprises the following steps:
the system comprises a member acquisition module, a member acquisition module and a member management module, wherein the member acquisition module is used for acquiring a plurality of ring members, and each ring member is provided with a corresponding private key;
the public key creating module is used for creating rings by the ring members through own private keys and a plurality of ring member public keys and generating ring public keys based on the created rings;
the signature generation module is used for generating a ring signature by each member on the ring based on the ring public key and the corresponding private key; the ring members are bidders.
Compared with the prior art, the invention has the following advantages and beneficial effects:
1. according to the bidding method and system based on digital signature, provided by the embodiment of the invention, a ring signature protocol is used, when a bidding unit receives a bidding document, only whether a bidder is a ring member can be determined, but the identity of the bidder cannot be determined, and the bidder can ensure the anonymity of the identity;
2. the bidding method and the system based on the digital signature provided by the embodiment of the invention realize identity authentication on the premise of not exposing the safety information of the user, and can help the bidding parties to effectively overcome risks;
3. according to the bidding method and system based on the digital signature, provided by the embodiment of the invention, through the chaining property of the ring signatures, a bidding unit can effectively judge whether any two ring signatures come from one bidder, so that the uniqueness of a legal bidder is ensured.
Drawings
In order to more clearly illustrate the technical solutions of the exemplary embodiments of the present invention, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and that for those skilled in the art, other related drawings can be obtained from these drawings without inventive effort.
FIG. 1 is a flow chart of group signatures
FIG. 2 is a ring signature flow diagram
FIG. 3 is a schematic diagram of a group signature system
FIG. 4 is a schematic diagram of a ring signature system
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is further described in detail below with reference to examples and accompanying drawings, and the exemplary embodiments and descriptions thereof are only used for explaining the present invention and are not meant to limit the present invention.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. However, it will be apparent to one of ordinary skill in the art that: it is not necessary to employ these specific details to practice the present invention. In other instances, well-known structures, circuits, materials, or methods have not been described in detail so as not to obscure the present invention.
Throughout the specification, reference to "one embodiment," "an embodiment," "one example," or "an example" means: the particular features, structures, or characteristics described in connection with the embodiment or example are included in at least one embodiment of the invention. Thus, the appearances of the phrases "one embodiment," "an embodiment," "one example" or "an example" in various places throughout this specification are not necessarily all referring to the same embodiment or example. Furthermore, the particular features, structures, or characteristics may be combined in any suitable combination and/or sub-combination in one or more embodiments or examples. Further, those of ordinary skill in the art will appreciate that the illustrations provided herein are for illustrative purposes and are not necessarily drawn to scale. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
In the description of the present invention, the terms "front", "rear", "left", "right", "upper", "lower", "vertical", "horizontal", "upper", "lower", "inner", "outer", etc. indicate orientations or positional relationships based on those shown in the drawings, and are only for convenience of description and simplicity of description, but do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed in a particular orientation, and be operated, and therefore, should not be construed as limiting the scope of the present invention.
Example one
The embodiment discloses a digital signature-based bidding method, in a bidding process, a digital signature method is adopted to sign and store a file generated in the bidding process, and the digital signature method comprises a group signature method and a ring signature method, and both of the group signature method and the ring signature method are anonymous signatures.
Digital signatures are a class of cryptographic techniques that can realize identity and content authentication, and are mainly used to indicate the approval of a signature subject to the validity of specific data content, and can ensure the verifiability of the identity of the signature subject, the integrity (non-falsification) of the data content, the non-forgeability of the signature itself, the non-repudiation of the signature behavior, and the like. Digital signature is an important cryptography technical means for solving the problems of identity authentication and content authentication under a public key cryptosystem. In order to meet privacy protection requirements such as identity anonymity or content hiding and the like on the basis of the traditional digital signature, special digital signature algorithms supporting privacy protection such as group signature and ring signature are deeply researched and widely applied and explored.
In an anonymous bidding scenario, when a user delivers a bidding document, in order to prove that the identity is credible and the qualification is reliable, the user wants to prove that the user is in a specific user group to the outside, but does not want to expose the specific identity, so that a digital signature technology supporting identity anonymity is required to be used for signing related information; a supervision role is introduced to trace the signature if necessary and deduct the specific user generating the signature, wherein a signer can randomly select a certain number of users as ring members to realize anonymous signature, and secret information can be completely and anonymously disclosed.
As shown in fig. 1, the specific method steps of group signature include:
creating a group through a first user, and simultaneously generating a group management private key and a group public key based on the created group, wherein the first user is a trusted third party;
in this embodiment, the first user is a group administrator, and is mainly responsible for creating a group and joining group members, and in the group members, a group signature can be generated by a group in which a representative of any one of the group members is located, the verifier can verify that the signature is signed by the members in the group, the group management private key is used for generating a group member private key and opening the group signature, and the group public key is used for verifying the group signature.
All qualified bidders to participate in bidding are taken as group members to join a group, and the group member private keys are distributed to the group members through a first user based on a group management private key, wherein the group members comprise a tenderer and a bidder; the trusted third party is used as a key distributor, all qualified bidders to participate in bidding join the group and distribute the private keys of the group members respectively.
The group members acquire a first file, sign the first file based on a private key of the group members to acquire a second file, and transmit the second file through an anonymous channel, wherein the first file is a file which is transmitted to the group members and needs to be signed by the group members;
randomly selecting one verifier, and verifying the group signature in the second file based on the group public key;
however, the verifier cannot determine which group member the verified group signature is, so that certain anonymity is guaranteed while the provincial authentication is realized.
After the verification is completed, the group member authority is revoked by the first user publishing the revocation private key list; similar to the PKI-based Certificate Revocation mechanism, the CA needs to maintain a Certificate Revocation List (CRL) to revoke the group members; the bidder may verify that the bidder is one of the predetermined valid bidders, but cannot determine the specific identity of the bidder.
The group signature method also comprises a signature opening method, and the method comprises the following steps: based on the group management private key, the group signature is obtained through the first user, and the group membership is obtained according to the group signature.
The group signature further comprises a first supervisor for tracking the group signature; in the open bidding scene based on the block chain, the information such as the bidding documents is disclosed on the chain, and the anonymous bidding based on the group signature can also prevent the bidding party from knowing the identity of the bidding party corresponding to other bidding documents.
As shown in fig. 2, in order to achieve more sufficient anonymity based on the group signature-based anonymous bidding scheme, the bidding process is considered to be designed as a ring signature-based anonymous bidding method, and the specific method steps of the ring signature include:
acquiring a plurality of ring members, wherein each ring member is provided with a corresponding private key; the ring members create rings through own private keys and a plurality of ring member public keys, and generate ring public keys based on the created rings; each member on the ring generates a ring signature based on the ring public key and the corresponding private key; the ring members are bidders.
The bidders use their own private keys and all bidder public keys to participate in bidding to create a ring, and perform ring signature on bidding documents, and then send the ring signature to the tenderer through an anonymous channel to realize anonymous bidding.
The ring signature method also comprises a signature verification method, wherein the signature verification method comprises the following steps: the tenderer is used as a verifier, the ring public key is used for verifying the ring signature, and the tenderer can verify that the bidder is one of the bidders who are to participate in bidding, but cannot determine the specific identity of the bidder.
The method solves the application safety problem of the electronic bidding system in the service handling process, solves the problems of identity authentication, bidding document signature, data encryption, responsibility confirmation and time authentication in the electronic bidding system on the basis of an electronic signature method by combining a platform application process, integrally improves the safety level of the electronic bidding system, ensures the safety of the data of the electronic bidding system, lays a safety foundation for the stable operation of the electronic bidding system, ensures that the online bidding is more transparent, and really realizes the openness, justice and fairness of the bidding process.
The digital signature has the functions of: one is to be able to determine that the message was indeed signed and sent by the sender because someone else cannot impersonate the sender's signature; the second is that the digital signature can determine the integrity of the message. Because the digital signature is characterized in that it represents the characteristics of the document, if the document changes, the value of the digital digest will also change. Different files will get different digital summaries. The one-time digital signature involves a hash function, the public key of the receiver, and the private key of the sender.
Example two
The embodiment discloses a bidding system based on digital signatures, which implements the method according to the first embodiment, and the system is used for signing and storing files generated in the bidding process by adopting a digital signature method in the bidding process, wherein the digital signature method comprises a group signature method and a ring signature method, and both the group signature method and the ring signature method are anonymous signatures.
As shown in fig. 3, the group signature includes:
a group creation module: the group management system comprises a first user, a second user and a third party, wherein the first user is used for creating a group and simultaneously generating a group management private key and a group public key based on the created group, and the first user is a trusted third party;
the private key distribution module: the system comprises a group management private key, a first user and a second user, wherein the group management private key is used for distributing a group member private key to the group members through the first user, and the group members comprise a tenderer and a bidder;
the file transmission module is used for acquiring a first file by a group member, signing the first file based on a private key of the group member to acquire a second file, and transmitting the second file through an anonymous channel, wherein the first file is a file which is transmitted to the group member and needs to be signed by the group member;
the verification module is used for randomly selecting one verifier and verifying the group signature in the second file based on the group public key;
and the revocation module is used for revoking the group member authority by publishing a revocation private key list by the first user after the verification is finished.
As shown in fig. 4, the ring signature includes:
the system comprises a member acquisition module, a member acquisition module and a member management module, wherein the member acquisition module is used for acquiring a plurality of ring members, and each ring member is provided with a corresponding private key;
the public key creating module is used for creating rings by the ring members through own private keys and a plurality of ring member public keys and generating ring public keys based on the created rings;
the signature generation module is used for generating a ring signature by each member on the ring based on the ring public key and the corresponding private key; the ring members are bidders.
The digital signature has the functions of: one is to be able to determine that the message was indeed signed and sent by the sender because someone else cannot impersonate the sender's signature; the second is that the digital signature can determine the integrity of the message. Because the digital signature is characterized in that it represents the characteristics of the document, if the document changes, the value of the digital digest will also change. Different files will get different digital summaries. The one-time digital signature involves a hash function, the public key of the receiver, and the private key of the sender.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (9)

1. A bidding method based on digital signatures is characterized in that in the bidding process, a digital signature method is adopted to sign and store files generated in the bidding process, and the digital signature method comprises a group signature method and a ring signature method, and both the group signature method and the ring signature method are anonymous signatures.
2. The bidding method according to claim 1, wherein the group signature comprises the following steps:
creating a group through a first user, and simultaneously generating a group management private key and a group public key based on the created group, wherein the first user is a trusted third party;
all qualified bidders to participate in bidding are taken as group members to join a group, and the group member private keys are distributed to the group members through a first user based on a group management private key, wherein the group members comprise a tenderer and a bidder;
the group members acquire a first file, sign the first file based on a private key of the group members to acquire a second file, and transmit the second file through an anonymous channel, wherein the first file is a file which is transmitted to the group members and needs to be signed by the group members;
randomly selecting one verifier, and verifying the group signature in the second file based on the group public key;
and after the verification is completed, the group member authority is revoked by the first user publishing the revocation private key list.
3. The bidding method according to claim 2, wherein the group signature method further comprises the step of opening the signature method by: based on the group management private key, the group signature is obtained through the first user, and the group membership is obtained according to the group signature.
4. The method of claim 2, wherein the group signature further comprises a first supervisor, and the first supervisor is configured to track the group signature.
5. The bidding method according to claim 1, wherein the ring signature comprises the following steps:
acquiring a plurality of ring members, wherein each ring member is provided with a corresponding private key;
the ring members create rings through own private keys and a plurality of ring member public keys, and generate ring public keys based on the created rings;
each member on the ring generates a ring signature based on the ring public key and the corresponding private key; the ring members are bidders.
6. The bidding method according to claim 5, wherein the ring signature method further comprises a signature verification method, and the signature verification method comprises: and taking the tenderer as a verifier to verify the ring signature through the ring public key.
7. A bidding system based on digital signature, characterized in that the method of claim 1 is implemented, and the system is used for signing and saving the document generated by the bidding process by using a digital signature method in the bidding process, wherein the digital signature method comprises a group signature method and a ring signature method, and both of the group signature method and the ring signature method are anonymous signatures.
8. The system of claim 7, comprising:
a group creation module: the group management system comprises a first user, a second user and a third party, wherein the first user is used for creating a group and simultaneously generating a group management private key and a group public key based on the created group, and the first user is a trusted third party;
the private key distribution module: the system comprises a group management private key, a first user and a second user, wherein the group management private key is used for distributing a group member private key to the group members through the first user, and the group members comprise a tenderer and a bidder;
the file transmission module is used for acquiring a first file by a group member, signing the first file based on a private key of the group member to acquire a second file, and transmitting the second file through an anonymous channel, wherein the first file is a file which is transmitted to the group member and needs to be signed by the group member;
the verification module is used for randomly selecting one verifier and verifying the group signature in the second file based on the group public key;
and the revocation module is used for revoking the group member authority by publishing a revocation private key list by the first user after the verification is finished.
9. The system of claim 7, comprising:
the system comprises a member acquisition module, a member acquisition module and a member management module, wherein the member acquisition module is used for acquiring a plurality of ring members, and each ring member is provided with a corresponding private key;
the public key creating module is used for creating rings by the ring members through own private keys and a plurality of ring member public keys and generating ring public keys based on the created rings;
the signature generation module is used for generating a ring signature by each member on the ring based on the ring public key and the corresponding private key; the ring members are bidders.
CN202110830327.1A 2021-07-22 2021-07-22 Bidding method and system based on digital signature Pending CN113536347A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110830327.1A CN113536347A (en) 2021-07-22 2021-07-22 Bidding method and system based on digital signature

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110830327.1A CN113536347A (en) 2021-07-22 2021-07-22 Bidding method and system based on digital signature

Publications (1)

Publication Number Publication Date
CN113536347A true CN113536347A (en) 2021-10-22

Family

ID=78120454

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110830327.1A Pending CN113536347A (en) 2021-07-22 2021-07-22 Bidding method and system based on digital signature

Country Status (1)

Country Link
CN (1) CN113536347A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114820147A (en) * 2022-06-02 2022-07-29 杭州天谷信息科技有限公司 Signing method and signing system for staged electronic contract
CN115174247A (en) * 2022-07-18 2022-10-11 中国工商银行股份有限公司 Object tracking method and device based on block chain and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090129600A1 (en) * 2007-11-15 2009-05-21 Brickell Ernie F Apparatus and method for a direct anonymous attestation scheme from short-group signatures
CN102377565A (en) * 2010-08-06 2012-03-14 陈国敏 Linkable ring signature method based on appointed verifier
CN102663640A (en) * 2012-05-02 2012-09-12 四川建设网有限责任公司 Remote bidding method and system
CN109064297A (en) * 2018-07-13 2018-12-21 宁夏神州好易信息发展股份有限公司 A kind of quickly online electronics opening of bid method
CN110190970A (en) * 2019-06-25 2019-08-30 电子科技大学 Based on publicly-owned chain can anonymity revocation ring signatures and its generation and cancelling method
CN112633712A (en) * 2020-12-26 2021-04-09 西安科锐盛创新科技有限公司 Online bidding method and system based on GRS codes

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090129600A1 (en) * 2007-11-15 2009-05-21 Brickell Ernie F Apparatus and method for a direct anonymous attestation scheme from short-group signatures
CN102377565A (en) * 2010-08-06 2012-03-14 陈国敏 Linkable ring signature method based on appointed verifier
CN102663640A (en) * 2012-05-02 2012-09-12 四川建设网有限责任公司 Remote bidding method and system
CN109064297A (en) * 2018-07-13 2018-12-21 宁夏神州好易信息发展股份有限公司 A kind of quickly online electronics opening of bid method
CN110190970A (en) * 2019-06-25 2019-08-30 电子科技大学 Based on publicly-owned chain can anonymity revocation ring signatures and its generation and cancelling method
CN112633712A (en) * 2020-12-26 2021-04-09 西安科锐盛创新科技有限公司 Online bidding method and system based on GRS codes

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
01元宇宙: "数字化契约如何守护?解析群/环签名的妙用|隐私保护周三见第16论", 《微信公众平台》, pages 1 - 10 *
PLATON: "区块链与密码学全民课堂第9-11讲:白话群签名", 《微信公众平台》, pages 1 - 5 *
程筱筱;刘晓洁;李涛;胡晓勤;梁静;沙开波;毛昶;: "基于PKI的网上招投标系统设计与实现", 计算机应用研究, no. 08 *
綦科;马歆;: "基于群签名方案的电力市场发电竞标安全模型", 电力信息化, no. 07 *
胡建荣等: "公路工程中利用群签名的电子投标方案", 《交通标准化》, no. 4, pages 30 - 35 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114820147A (en) * 2022-06-02 2022-07-29 杭州天谷信息科技有限公司 Signing method and signing system for staged electronic contract
CN114820147B (en) * 2022-06-02 2022-11-25 杭州天谷信息科技有限公司 Signing method and signing system for staged electronic contract
CN115174247A (en) * 2022-07-18 2022-10-11 中国工商银行股份有限公司 Object tracking method and device based on block chain and electronic equipment

Similar Documents

Publication Publication Date Title
CN107911216B (en) Block chain transaction privacy protection method and system
CN109067801B (en) Identity authentication method, identity authentication device and computer readable medium
Chen et al. Threshold anonymous announcement in VANETs
CN101521569B (en) Method, equipment and system for realizing service access
Lai et al. Applying semigroup property of enhanced Chebyshev polynomials to anonymous authentication protocol
CN109687976A (en) Fleet's establishment and management method and system based on block chain and PKI authentication mechanism
CN101212293B (en) Identity authentication method and system
CN111654363B (en) Group signature and homomorphic encryption-based alliance chain privacy protection method
US20060206433A1 (en) Secure and authenticated delivery of data from an automated meter reading system
US10742426B2 (en) Public key infrastructure and method of distribution
CN109450843B (en) SSL certificate management method and system based on block chain
CN108833373B (en) Instant messaging and anonymous access method for relation privacy protection social network
JPH09505711A (en) Computer network encryption key distribution system
CN113761582B (en) Group signature-based supervision blockchain transaction privacy protection method and system
GB2385955A (en) Key certification using certificate chains
CN103905384A (en) Embedded inter-terminal session handshake realization method based on security digital certificate
CN113536347A (en) Bidding method and system based on digital signature
Muftic Bix certificates: Cryptographic tokens for anonymous transactions based on certificates public ledger
CN114531243B (en) Alliance chain transaction privacy protection method based on label encryption and zero knowledge proof
CN110945833B (en) Method and system for multi-mode identification network privacy protection and identity management
EP2372947A1 (en) Secure and traceable digital transmission method and envelope
CN116432204B (en) Supervision transaction privacy protection method based on homomorphic encryption and zero knowledge proof
CN115174277B (en) Data communication and file exchange method based on block chain
Vaziripour et al. Social Authentication for {End-to-End} Encryption
CN101957962A (en) Application and verification method of electronic stamp software system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination