CN113642018A - Key management method based on block chain - Google Patents
Key management method based on block chain Download PDFInfo
- Publication number
- CN113642018A CN113642018A CN202110920189.6A CN202110920189A CN113642018A CN 113642018 A CN113642018 A CN 113642018A CN 202110920189 A CN202110920189 A CN 202110920189A CN 113642018 A CN113642018 A CN 113642018A
- Authority
- CN
- China
- Prior art keywords
- sender
- data
- key
- private key
- receiver
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 26
- 238000012795 verification Methods 0.000 claims abstract description 5
- 230000005540 biological transmission Effects 0.000 claims description 34
- 238000012163 sequencing technique Methods 0.000 claims description 6
- 230000006378 damage Effects 0.000 claims description 2
- 238000000034 method Methods 0.000 claims description 2
- 238000004364 calculation method Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a block chain-based key management method, which comprises the following steps: s1, determining identity information of the sender and the receiver, and recording; s2, the sender outputs an instruction, after the server receives the instruction, the server encrypts, calculates and stores the instruction by using the public key of the receiver, and then sends the ciphertext of the original text and the signature of the sender; s3, transmitting the ciphertext of the original text and the signature of the sender to a receiver through a network, and selecting the private key of the management terminal by the receiver; s4, the receiving party decrypts the private key of the receiving party and verifies the private key of the sending party; and S5, after the verification is finished, the information is simultaneously sent to the receivers, the receivers receive the information and then decode or store the data, the data can be sent to a plurality of receivers by determining the number of the senders, and before the sending, the senders can determine the uniqueness and reading times of the data, so that the possibility of losing caused by forgetting to delete the data after stealing or reading for a plurality of times is reduced.
Description
Technical Field
The invention relates to the technical field of block chain key management, in particular to a block chain key management method.
Background
The block chain is a term in the technical field of information, and essentially, the block chain is a shared database, data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'open transparency', 'collective maintenance' and the like, and based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has a wide application prospect;
however, the current block chain key management method is disordered in transmission mode, and the required information cannot be normally received by a sender and a receiver after transmission easily, and the encryption mode is inconsistent with the decryption mode, so that the receiving mode is difficult, the data reception is unstable, and even the possibility of stealing occurs.
Disclosure of Invention
The invention provides a block chain-based key management method, which can effectively solve the problems that the conventional block chain key management method proposed in the background art is disordered in a transmission mode, a sender and a receiver cannot normally receive required information after transmission, an encryption mode is inconsistent with a decryption mode, the receiving mode is difficult, data receiving is unstable, and even stealing is possible.
In order to achieve the purpose, the invention provides the following technical scheme: a block chain-based key management method comprises the following steps:
s1, determining identity information of the sender and the receiver, and recording;
s2, the sender outputs an instruction, after the server receives the instruction, the server encrypts, calculates and stores the instruction by using the public key of the receiver, and then sends the ciphertext of the original text and the signature of the sender;
s3, transmitting the ciphertext of the original text and the signature of the sender to a receiver through a network, and selecting the private key of the management terminal by the receiver;
s4, the receiving party decrypts the private key of the receiving party and verifies the private key of the sending party;
and S5, after the verification is finished, the information is simultaneously sent to the receiving party, and the receiving party reads or stores the data after receiving the information.
According to the technical scheme, the signature of the sender is obtained by signing the data after calculation and storage, and the signature is carried out through a private key of the sender;
in S2, the number of senders is one, the sender may be an administrator of the server, the number of receivers may be deleted, and anonymity is removed.
According to the technical scheme, the number of the receiving parties in the step S3 is single or multiple, wherein multiple members can share, synchronize and copy the database, and multiple receiving parties can also finish the data sharing, synchronizing and copying;
when the key is personal, one-to-one operation can be realized, the accuracy and the safety are improved, when a plurality of persons exist, one-to-many operation can be realized, the convenient data receiving performance is improved, when the key is one-to-many, the sending party can select the using times of the key or set the automatic destroying time, the reading times and the time are convenient to control, and then the time, the times and the downloading state after the operation of the user can be known through the server.
According to the technical scheme, the algorithm calculated in the S2 and the S4 is formed by matching one or more of DES, AES and IEDA.
According to the technical scheme, in the transmission in the step S3, after receiving the data, the server selects one-time transmission, symmetric transmission or asymmetric transmission, and determines the data according to the re-reading of the receiving party and the requirements of the use frequency and the density, wherein the sender determines the form of the data in the transmission;
the sender can divide the data transmitted at this time into words and a plurality of transmission modes for transmission, the transmitted data is encrypted and calculated and stored by a plurality of public keys, the receiver can verify by the private key of the sender, the data is arranged and integrated, and the transmission can be carried out without sequencing.
According to the above technical solution, in S5, after the receiving side receives the instruction from the sending side, the sending side is given an electronic receipt.
According to the technical scheme, after the private key of the receiving party is decrypted, the private key of the receiving party is calculated again, and the data after the data and the public key of the sending party are verified are sent to the receiving party at the same time.
According to the above technical solution, in S3, when a network user needs to send an encryption message to another user through a public key cryptosystem, a certificate is needed to obtain a public key of the user, so as to complete an encryption operation;
when the digital signature of another user needs to be verified, the public key of the user also needs to be obtained by inquiring the public key certificate so as to verify the digital signature;
and (4) revoking the certificate, namely, when the validity period of the certificate is exceeded, the sender can revoke the certificate, and when a public and private key pair needs to be replaced due to the leakage of a private key, a request can be sent to the server to revoke the certificate.
Compared with the prior art, the invention has the beneficial effects that: the invention has scientific and reasonable structure and safe and convenient use, can send data to a plurality of receivers by determining the number of the senders, and before sending, the senders can determine the uniqueness and reading times of the data, thereby reducing the possibility of losing caused by forgetting to delete the data after stealing the data or reading the data for a plurality of times, secondly, the receivers can verify the data by the private key of the senders by encrypting and calculating the transmitted data by a plurality of public keys, and the large-scale data can be separately transmitted without sequencing in the transmission, thereby reducing the possibility of losing or stealing the data, then the private key can be used for a plurality of times by an encryption mode and reading the data by a plurality of people and one person, thereby realizing safer and more comprehensive reading records and realizing the effect of more transparence of key management, is suitable for better popularization and use.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.
In the drawings:
FIG. 1 is a schematic diagram of the structure of the process steps of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Example 1:
as shown in fig. 1, the present invention provides a technical solution, a block chain key management method, including the following steps:
s1, determining identity information of the sender and the receiver, and recording;
s2, the sender outputs an instruction, after the server receives the instruction, the server encrypts, calculates and stores the instruction by using the public key of the receiver, and then sends the ciphertext of the original text and the signature of the sender;
s3, transmitting the ciphertext of the original text and the signature of the sender to a receiver through a network, and selecting the private key of the management terminal by the receiver;
s4, the receiving party decrypts the private key of the receiving party and verifies the private key of the sending party;
and S5, after the verification is finished, the information is simultaneously sent to the receiving party, and the receiving party reads or stores the data after receiving the information.
According to the technical scheme, the signature of the sender is carried out by signing the data after calculation and storage, and the signature is carried out by a private key of the sender;
in S2, the number of senders is one, the sender may be an administrator of the server, the number of recipients may be deleted, and anonymity is removed.
According to the technical scheme, the receiver in the S3 is single;
when the operation is personal, one-to-one operation can be realized, and the accuracy and the safety are improved.
According to the technical scheme, the algorithm calculated in S2 and S4 is DES.
According to the technical scheme, in the transmission in S3, after receiving the data, the server selects one-time transmission, and determines the data according to the re-reading of the receiving party and the requirements of the use frequency and the density, wherein the sender determines the form of the data in the transmission;
the sender can divide the data transmitted at this time into words and transmit the data in a plurality of transmission modes, the transmitted data is encrypted, calculated and stored by a plurality of public keys, the receiver can verify the data by the private key of the sender, and the data is arranged and integrated without sequencing in transmission;
but a transmission can be added to provide the receiving sequence list so as to facilitate the receiving party to realize normal reading of data, and the data read at this time is sent singly and marked, and the receipt is sent more than once.
According to the technical scheme, in the S5, after the receiver receives the instruction of the sender, the sender is given an electronic receipt.
According to the technical scheme, after the private key of the receiving party is decrypted, the private key of the receiving party is calculated again, and the data verified by the public key of the sending party are simultaneously sent to the receiving party.
According to the above technical solution, when a network user needs to send an encryption message to another user through a public key cryptosystem in S3, a certificate is needed to obtain the public key of the user, so as to complete an encryption operation;
when the digital signature of another user needs to be verified, the public key of the user also needs to be obtained by inquiring the public key certificate so as to verify the digital signature;
and (4) revoking the certificate, namely, when the validity period of the certificate is exceeded, the sender can revoke the certificate, and when a public and private key pair needs to be replaced due to the leakage of a private key, a request can be sent to the server to revoke the certificate.
Example 2:
as shown in fig. 1, the present invention provides a technical solution, a block chain key management method, including the following steps:
s1, determining identity information of the sender and the receiver, and recording;
s2, the sender outputs an instruction, after the server receives the instruction, the server encrypts, calculates and stores the instruction by using the public key of the receiver, and then sends the ciphertext of the original text and the signature of the sender;
s3, transmitting the ciphertext of the original text and the signature of the sender to a receiver through a network, and selecting the private key of the management terminal by the receiver;
s4, the receiving party decrypts the private key of the receiving party and verifies the private key of the sending party;
and S5, after the verification is finished, the information is simultaneously sent to the receiving party, and the receiving party reads or stores the data after receiving the information.
According to the technical scheme, the signature of the sender is carried out by signing the data after calculation and storage, and the signature is carried out by a private key of the sender;
in S2, the number of senders is one, the sender may be an administrator of the server, the number of recipients may be deleted, and anonymity is removed.
According to the technical scheme, the number of the receiving parties in the S3 is multiple, wherein the multiple members can share, synchronize and copy the database, and the multiple receiving parties can also finish the data sharing, synchronizing and copying;
in the case of multiple persons, one-to-many operation can be realized, the convenient data receiving performance is improved, and in the case of one-to-many operation, the sender can select the use times of the key or set the automatic destruction time, so that the reading times and time are convenient to control, and the time, the times and the downloading state after operation of the user can be known through the server.
According to the technical scheme, the algorithm calculated in S2 and S4 is DES.
According to the technical scheme, in the transmission in S3, after receiving the data, the server selects one-time transmission, and determines the data according to the re-reading of the receiving party and the requirements of the use frequency and the density, wherein the sender determines the form of the data in the transmission;
the sender can divide the data transmitted at this time into words and transmit the data in a plurality of transmission modes, the transmitted data is encrypted, calculated and stored by a plurality of public keys, the receiver can verify the data by the private key of the sender, and the data is arranged and integrated without sequencing in transmission;
but a transmission can be added to provide the receiving sequence list so as to facilitate the receiving party to realize normal reading of data, and the data read at this time is sent singly and marked, and the receipt is sent more than once.
According to the technical scheme, in the S5, after the receiver receives the instruction of the sender, the sender is given an electronic receipt.
According to the technical scheme, after the private key of the receiving party is decrypted, the private key of the receiving party is calculated again, and the data verified by the public key of the sending party are simultaneously sent to the receiving party.
According to the above technical solution, when a network user needs to send an encryption message to another user through a public key cryptosystem in S3, a certificate is needed to obtain the public key of the user, so as to complete an encryption operation;
when the digital signature of another user needs to be verified, the public key of the user also needs to be obtained by inquiring the public key certificate so as to verify the digital signature;
and (4) revoking the certificate, namely, when the validity period of the certificate is exceeded, the sender can revoke the certificate, and when a public and private key pair needs to be replaced due to the leakage of a private key, a request can be sent to the server to revoke the certificate.
Compared with the prior art, the invention has the beneficial effects that: the invention has scientific and reasonable structure and safe and convenient use, can send data to a plurality of receivers by determining the number of the senders, and before sending, the senders can determine the uniqueness and reading times of the data, thereby reducing the possibility of losing caused by forgetting to delete the data after stealing the data or reading the data for a plurality of times, secondly, the receivers can verify the data by the private key of the senders by encrypting and calculating the transmitted data by a plurality of public keys, and the large-scale data can be separately transmitted without sequencing in the transmission, thereby reducing the possibility of losing or stealing the data, then the private key can be used for a plurality of times by an encryption mode and reading the data by a plurality of people and one person, thereby realizing safer and more comprehensive reading records and realizing the effect of more transparence of key management, is suitable for better popularization and use.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (8)
1. A block chain-based key management method is characterized in that: the method comprises the following steps:
s1, determining identity information of the sender and the receiver, and recording;
s2, the sender outputs an instruction, after the server receives the instruction, the server encrypts, calculates and stores the instruction by using the public key of the receiver, and then sends the ciphertext of the original text and the signature of the sender;
s3, transmitting the ciphertext of the original text and the signature of the sender to a receiver through a network, and selecting the private key of the management terminal by the receiver;
s4, the receiving party decrypts the private key of the receiving party and verifies the private key of the sending party;
and S5, after the verification is finished, the information is simultaneously sent to the receiving party, and the receiving party reads or stores the data after receiving the information.
2. The blockchain-based key management method of claim 1, wherein the S2 signature at the sender is signed by computing the stored data, and the signature is performed by a sender private key;
in S2, the number of senders is one, the sender may be an administrator of the server, the number of receivers may be deleted, and anonymity is removed.
3. The blockchain-based key management method of claim 1, wherein the receiving party in S3 is a single or multiple people, wherein multiple members can share, synchronize and duplicate the database, and wherein multiple receiving parties can also be jointly used;
when the key is personal, one-to-one operation can be realized, when a plurality of persons exist, one-to-many operation can be realized, and when one-to-many operation is realized, the sender can select the use times of the key or set the automatic destruction time so as to be convenient for reading the times and controlling the time, and then the server can know the time, the times and the downloading state after the operation of the user.
4. The blockchain-based key management method of claim 1, wherein the algorithms calculated in S2 and S4 are one or more of DES, AES and IEDA.
5. The blockchain-based key management method of claim 1, wherein in the transmission in S3, after the server receives the data, the server selects one-time transmission, symmetric transmission or asymmetric transmission, and determines the data according to the re-reading and using frequency and density requirement of the receiving party, and the sender determines the form of the data in the transmission;
the sender can divide the data transmitted at this time into words and a plurality of transmission modes for transmission, the transmitted data is encrypted and calculated and stored by a plurality of public keys, the receiver can verify by the private key of the sender, the data is arranged and integrated, and the transmission can be carried out without sequencing.
6. The blockchain-based key management method of claim 1, wherein in S5, after the receiving party receives the instruction from the sending party, the sending party is given an electronic receipt.
7. The blockchain-based key management method of claim 1, wherein the private key of the receiving party is decrypted at S5, and then the decrypted private key is recalculated to send the data and the data verified by the public key of the sending party to the receiving party at the same time.
8. The blockchain-based key management method of claim 1, wherein in S3, when a network user needs to send an encrypted message to another user through a public key cryptosystem, a certificate is needed to obtain a public key of the user to complete an encryption operation;
when the digital signature of another user needs to be verified, the public key of the user also needs to be obtained by inquiring the public key certificate so as to verify the digital signature;
and (4) revoking the certificate, namely, when the validity period of the certificate is exceeded, the sender can revoke the certificate, and when a public and private key pair needs to be replaced due to the leakage of a private key, a request can be sent to the server to revoke the certificate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110920189.6A CN113642018A (en) | 2021-08-11 | 2021-08-11 | Key management method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110920189.6A CN113642018A (en) | 2021-08-11 | 2021-08-11 | Key management method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113642018A true CN113642018A (en) | 2021-11-12 |
Family
ID=78420859
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110920189.6A Pending CN113642018A (en) | 2021-08-11 | 2021-08-11 | Key management method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113642018A (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101720071A (en) * | 2009-12-01 | 2010-06-02 | 郑州信大捷安信息技术有限公司 | Short message two-stage encryption transmission and secure storage method based on safety SIM card |
CN103138939A (en) * | 2013-03-28 | 2013-06-05 | 武汉大学 | Secret key use time management method based on credible platform module under cloud storage mode |
CN106911704A (en) * | 2017-03-13 | 2017-06-30 | 北京轻信科技有限公司 | A kind of encrypting and decrypting method based on block chain |
CN107301521A (en) * | 2017-06-26 | 2017-10-27 | 深圳前海华深安信物联技术有限公司 | Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain |
CN109802825A (en) * | 2017-11-17 | 2019-05-24 | 深圳市金证科技股份有限公司 | A kind of data encryption, the method for decryption, system and terminal device |
CN109889495A (en) * | 2019-01-10 | 2019-06-14 | 如般量子科技有限公司 | Anti- quantum calculation electronic seal method and system based on multiple unsymmetrical key ponds |
CN110335051A (en) * | 2019-07-03 | 2019-10-15 | 烟台市同翔网络科技有限责任公司 | A kind of unique code publication of food labelling based on block chain major-minor chain technology and circulation source tracing method |
CN110932863A (en) * | 2019-11-19 | 2020-03-27 | 中国人民武装警察部队工程大学 | Generalized signcryption method based on coding |
CN111639361A (en) * | 2020-05-15 | 2020-09-08 | 中国科学院信息工程研究所 | Block chain key management method, multi-person common signature method and electronic device |
CN111901336A (en) * | 2020-07-28 | 2020-11-06 | 安徽高山科技有限公司 | Block chain-based digital identity authentication method |
CN112688999A (en) * | 2020-12-18 | 2021-04-20 | 武汉科技大学 | TrustZone-based key use frequency management method and system in cloud storage mode |
-
2021
- 2021-08-11 CN CN202110920189.6A patent/CN113642018A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101720071A (en) * | 2009-12-01 | 2010-06-02 | 郑州信大捷安信息技术有限公司 | Short message two-stage encryption transmission and secure storage method based on safety SIM card |
CN103138939A (en) * | 2013-03-28 | 2013-06-05 | 武汉大学 | Secret key use time management method based on credible platform module under cloud storage mode |
CN106911704A (en) * | 2017-03-13 | 2017-06-30 | 北京轻信科技有限公司 | A kind of encrypting and decrypting method based on block chain |
CN107301521A (en) * | 2017-06-26 | 2017-10-27 | 深圳前海华深安信物联技术有限公司 | Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain |
CN109802825A (en) * | 2017-11-17 | 2019-05-24 | 深圳市金证科技股份有限公司 | A kind of data encryption, the method for decryption, system and terminal device |
CN109889495A (en) * | 2019-01-10 | 2019-06-14 | 如般量子科技有限公司 | Anti- quantum calculation electronic seal method and system based on multiple unsymmetrical key ponds |
CN110335051A (en) * | 2019-07-03 | 2019-10-15 | 烟台市同翔网络科技有限责任公司 | A kind of unique code publication of food labelling based on block chain major-minor chain technology and circulation source tracing method |
CN110932863A (en) * | 2019-11-19 | 2020-03-27 | 中国人民武装警察部队工程大学 | Generalized signcryption method based on coding |
CN111639361A (en) * | 2020-05-15 | 2020-09-08 | 中国科学院信息工程研究所 | Block chain key management method, multi-person common signature method and electronic device |
CN111901336A (en) * | 2020-07-28 | 2020-11-06 | 安徽高山科技有限公司 | Block chain-based digital identity authentication method |
CN112688999A (en) * | 2020-12-18 | 2021-04-20 | 武汉科技大学 | TrustZone-based key use frequency management method and system in cloud storage mode |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109587132B (en) | Data transmission method and device based on alliance chain | |
Borisov et al. | Off-the-record communication, or, why not to use PGP | |
US10985910B2 (en) | Method for exchanging keys authenticated by blockchain | |
CN106104562B (en) | System and method for securely storing and recovering confidential data | |
CN103354498B (en) | A kind of file encryption transmission method of identity-based | |
US7634085B1 (en) | Identity-based-encryption system with partial attribute matching | |
US8094822B2 (en) | Broadcast encryption key distribution system | |
CN109559122A (en) | Block chain data transmission method and block chain data transmission system | |
US20020154782A1 (en) | System and method for key distribution to maintain secure communication | |
US20130083926A1 (en) | Quantum key management | |
US9130744B1 (en) | Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary | |
Kremer et al. | A multi-party non-repudiation protocol | |
US9148449B2 (en) | Efficient encryption, escrow and digital signatures | |
Yao et al. | A novel revocable and identity-based conditional proxy re-encryption scheme with ciphertext evolution for secure cloud data sharing | |
CN111049738B (en) | E-mail data security protection method based on hybrid encryption | |
CN109962924B (en) | Group chat construction method, group message sending method, group message receiving method and system | |
CN108011856B (en) | Method and device for transmitting data | |
CN111131311A (en) | Data transmission method based on block chain and block chain link point | |
JPH1020779A (en) | Key changing method in open key cipher system | |
TWI761243B (en) | Encryption system and encryption method for group instant massaging | |
CN113642018A (en) | Key management method based on block chain | |
KR20100023629A (en) | Method and system of distributing group key using broadcasting message authentication on wireless sensor network and recording medium using this | |
CN111488618B (en) | Block chain-based one-time pad encryption method, device and storage medium | |
Wong et al. | E–mail protocols with perfect forward secrecy | |
JPH06112935A (en) | Ciphering communication method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220928 Address after: Room 305, No. 188, Zhugu Shi Road, Wulian, Central City, Longgang Street, Longgang District, Shenzhen, Guangdong 518000 Applicant after: Jiaqiao (Shenzhen) Investment Co.,Ltd. Address before: D-1908, 19th floor, building 222, Wangjing Xiyuan, Chaoyang District, Beijing Applicant before: Yongqi (Beijing) Technology Co.,Ltd. |
|
TA01 | Transfer of patent application right |