CN114022259A - Bidding method and device based on public key designation and identity verification - Google Patents

Bidding method and device based on public key designation and identity verification Download PDF

Info

Publication number
CN114022259A
CN114022259A CN202111334121.6A CN202111334121A CN114022259A CN 114022259 A CN114022259 A CN 114022259A CN 202111334121 A CN202111334121 A CN 202111334121A CN 114022259 A CN114022259 A CN 114022259A
Authority
CN
China
Prior art keywords
sub
public key
bidding
key
root
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111334121.6A
Other languages
Chinese (zh)
Other versions
CN114022259B (en
Inventor
王莉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Huachun Network Technology Co ltd
Original Assignee
Shaanxi Huachun Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Huachun Network Technology Co ltd filed Critical Shaanxi Huachun Network Technology Co ltd
Priority to CN202111334121.6A priority Critical patent/CN114022259B/en
Publication of CN114022259A publication Critical patent/CN114022259A/en
Application granted granted Critical
Publication of CN114022259B publication Critical patent/CN114022259B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The application discloses a bidding method based on public key designation and identity verification, which comprises the following steps: generating a pair of root public key R and root private key V which correspond to each other by using a hierarchical certainty-based method; generating a plurality of sub private keys Vi at the tender party by a root private key V and a secret key generating tool; controlling a bidder to generate a plurality of sub public keys Ri through a root public key R and a secret key generation tool respectively, wherein the sub private keys Vi correspond to the sub public keys Ri one to one; designating a number i, signing the number i, and controlling a bidder to verify the accuracy of the number i according to the signature: controlling the bidder to select one sub public key Ri to encrypt the bidding document according to the designated number i and transmitting the sub public key Ri to the tenderer; and the tenderer decrypts the bidding document through the sub private key Vi to obtain the bidding document. The sub public key Ri is not directly issued, but is generated and selected by a bidder, and when the sub public key Ri is appointed, the number i of the appointed sub public key Ri is subjected to signature verification and is correspondingly selected, so that the reliability of the bidding process is improved.

Description

Bidding method and device based on public key designation and identity verification
Technical Field
The present application relates to the field of bidding technologies, and in particular, to a public key random bidding method, device, computer device, and storage medium.
Background
The traditional bidding is that after a tenderer sends out announcements, the tenderer makes bidding documents and delivers the bidding documents to the tenderer, the tenderer organizes and opens the bidding documents uniformly on the bidding opening day, and submits the bidding documents to an expert group for review and gives ranking so as to avoid the behaviors of influencing the fairness of the bidding process, such as bid cross, malicious bid document modification and the like. Technical development promotes the improvement of bidding work efficiency, the existing bidding work is widely transferred to an online environment, and the true accuracy and confidentiality of bidding documents are ensured by an encryption system in the online environment.
The conventional bidding scheme realizes bidding document encryption by an asymmetric encryption method, a specific bidder encrypts a bidding document through a public key and delivers the bidding document to the bidding party, the bidding party stores a private key and decrypts the bidding document through the private key, the scheme needs to keep the private key absolutely secret, and if the private key is stolen, all bidding documents delivered to the bidding party face the risk of being stolen.
On the basis, some schemes provide that a plurality of groups of corresponding public keys and private keys are generated based on a hierarchical certainty method, and the bidding documents are obtained in a way that a tenderer decrypts the bidding documents by using the private keys corresponding to the public keys used by bidders, so that the situation that one private key is stolen and the bidding documents of all bidders are in danger is avoided.
Disclosure of Invention
The embodiment of the application aims to provide a bidding method for improving delivery reliability of a bidding document by a bidding encryption mode for verifying a number i.
In order to solve the above technical problem, an embodiment of the present application provides a public key random bidding method, which adopts the following technical solutions:
a bidding method based on public key designation and identity verification comprises the following steps:
generating a pair of root public key R and root private key V which correspond to each other by using a hierarchical certainty-based method;
generating a plurality of sub private keys Vi at the tender party by a root private key V and a secret key generating tool;
controlling a bidder to generate a plurality of sub public keys Ri through a root public key R and a secret key generation tool respectively, wherein the sub private keys Vi correspond to the sub public keys Ri one to one;
designating a number i, signing the number i, and controlling a bidder to verify the accuracy of the number i according to the signature:
controlling the bidder to select one sub public key Ri to encrypt the bidding document according to the designated number i and transmitting the sub public key Ri to the tenderer;
and the tenderer decrypts the bidding document through the sub private key Vi to obtain the bidding document.
Further, the step of signing specifically includes:
signing the number i through a sub private key Vi corresponding to the designated number i;
the step of verifying the accuracy of the number i specifically includes:
and controlling the bidder to verify the signature by specifying the sub public key Ri corresponding to the number i so as to determine that the number i is signed by the corresponding sub private key Vi.
Further, the step of signing the number i specifically includes: combining the serial number i with a random number to obtain an intermediate number, and signing the intermediate number through the sub private key Vi;
the step of verifying the signature specifically includes: and selecting the sub public key Ri to decrypt the intermediate number according to the plaintext of the number i, and verifying the decrypted intermediate number according to the plaintext of the intermediate number to determine that the intermediate number is sent by a tenderer, wherein the plaintext of the number i and the plaintext of the intermediate number are sent to the tenderer through the tenderer.
Further, the step of verifying the signature further includes verifying whether the decrypted intermediate number is correct according to a combination of the plaintext of the random number and the plaintext of the number i.
Further, the step of verifying the signature further includes: and acquiring a decrypted number i according to the decrypted intermediate number and the plaintext of the random number, and verifying the decrypted number i through the plaintext of the number i to determine that the number i is sent by the tenderer.
Further, the method for acquiring the intermediate number specifically includes negotiating a combination position of the random number and the number i with the tenderer;
inserting the number i into the negotiated binding position to obtain an intermediate number.
Further, the step of obtaining a decrypted number i according to the decrypted intermediate number and the plaintext of the random number specifically includes: and separating the plaintext of the random number from the decrypted intermediate number according to the combination position to obtain a decrypted number i.
In order to solve the above technical problem, an embodiment of the present application further provides a bidding apparatus based on public key specification and identity verification, which adopts the following technical solutions:
a bidding apparatus based on public key designation and authentication, comprising:
the system comprises a root key generation module, a root key generation module and a root key generation module, wherein the root key generation module is used for generating a pair of root public keys R and root private keys V which correspond to each other by utilizing a hierarchical certainty-based method;
the sub-private key generation module is used for generating a plurality of sub-private keys Vi at the tender party through a root private key V and a secret key generation tool;
the sub public key generation module is used for controlling a bidder to generate a plurality of sub public keys Ri through a root public key R and a secret key generation tool respectively, wherein the sub public keys Vi correspond to the sub public keys Ri one to one;
the verification and number designation module is used for designating a number i, signing the number i and controlling a bidder to verify the accuracy of the number i according to the signature:
the encryption module is used for controlling the bidder to select one sub public key Ri to encrypt the bidding document according to the designated number i and transmit the sub public key Ri to the tenderer;
and the decryption module is used for decrypting the bidding document through the sub private key Vi by the bidding party to obtain the bidding document.
In order to solve the above technical problem, an embodiment of the present application further provides a computer device, which adopts the following technical solutions:
a computer device comprising a memory in which a computer program is stored and a processor which, when executing the computer program, carries out the steps of a public key designation and authentication based bidding method as described above.
In order to solve the above technical problem, an embodiment of the present application further provides a computer-readable storage medium, which adopts the following technical solutions:
a computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of a public key designation and authentication based bidding method as described above.
Compared with the prior art, the embodiment of the application mainly has the following beneficial effects: generating a root public key and a root private key V, wherein the root private key V keeps secret and guarantees the safety of a password system;
the root public key R and the secret key generating tool are externally issued so that a bidder can generate a plurality of sub public keys according to the root public key R and the secret key generating tool; then, the bidder selects an appointed sub public key Ri from the plurality of sub public keys Ri, and the sub public key Ri is appointed by a number i;
the number i is signed by a designated party before transmission, and the bidder verifies the signature after receiving the designated number i to ensure the authenticity of the number i and prevent the pirate from tampering.
The sub public key Ri of the scheme is not directly issued to the bidder, but is generated and selected by the bidder, and when the sub public key Ri is appointed, the number i of the appointed sub public key Ri is signed and verified, so that the authenticity of the number i is ensured, and the reliability of the bidding process is improved.
Drawings
In order to more clearly illustrate the solution of the present application, the drawings needed for describing the embodiments of the present application will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and that other drawings can be obtained by those skilled in the art without inventive effort.
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a method for public key designation and authentication based bidding according to the present application;
FIG. 3 is a schematic block diagram of an embodiment of a bidding apparatus based on public key assignment and authentication according to the present application;
FIG. 4 is a schematic block diagram of one embodiment of a computer device according to the present application.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "including" and "having," and any variations thereof, in the description and claims of this application and the description of the above figures are intended to cover non-exclusive inclusions. The terms "first," "second," and the like in the description and claims of this application or in the above-described drawings are used for distinguishing between different objects and not for describing a particular order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings.
As shown in fig. 1, the method described in the embodiment of the present application may be applied to a system architecture, which may include a terminal device 11, a terminal device 12, a terminal device 13, a network 14, and a server 15. Network 14 serves as a medium for providing communication links between terminal devices 11, 12, 13, and server 15. Network 14 may include various types of connections, such as wire, wireless communication links, or fiber optic cables, to name a few.
The user may interact with the server 15 via the network 14 using the terminal device 11, the terminal device 12, the terminal device 13 to receive or send messages or the like. Various communication client applications, such as a web browser application, a shopping application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like, may be installed on the terminal devices 11, 12, and 13.
The terminal devices 11, 12, 13 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III, mpeg compression standard Audio Layer 3), MP4 players (Moving Picture Experts Group Audio Layer IV, mpeg compression standard Audio Layer 4), laptop portable computers, desktop computers, and the like.
The server 15 may be a server that provides various services, such as a background server that provides support for pages displayed on the terminal device 11, the terminal device 12, and the terminal device 13.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring to fig. 2, a flow diagram of one embodiment of a public key random bidding method according to the present application is shown.
In this embodiment, an electronic device (for example, the server/terminal device shown in fig. 1) operating by a public key random bidding method may request or receive data and information through a wired connection manner or a wireless connection manner. It should be noted that the wireless connection means may include, but is not limited to, a 3G/4G connection, a WiFi connection, a bluetooth connection, a WiMAX connection, a Zigbee connection, a uwb (ultra wideband) connection, and other wireless connection means now known or developed in the future.
A bidding method based on public key designation and identity verification comprises the following steps:
step S100: generating a pair of root public key R and root private key V which correspond to each other by using a hierarchical certainty-based method;
generating a root public key R and a root private key V, wherein the root private key V keeps secret and guarantees the safety of a password system;
the hierarchical deterministic method can generate a root private key V and a chain code, a root public key R which corresponds to the root private key V one by one is generated by the root private key V matching with a private key generating tool, the root public key R matches with the chain code, a plurality of sub public keys Ri can be generated by the private key generating tool, the root private key V matches with the chain code, and a sub private key Vi can be generated by the private key generating tool, wherein the number of the sub private key Vi and the sub public keys Ri is controlled by parameters introduced in the private key generating tool. The generated sub public keys Ri and the sub private keys Vi are in one-to-one correspondence through numbers i.
Step S200: generating a plurality of sub private keys Vi at the tender party by a root private key V and a secret key generating tool;
step S300: controlling a bidder to generate a plurality of sub public keys Ri through a root public key R and a secret key generation tool respectively, wherein the sub private keys Vi correspond to the sub public keys Ri one to one;
the root public key R and the secret key generating tool are externally issued so that a bidder can generate a plurality of sub public keys Ri according to the root public key R and the secret key generating tool; then, the bidder selects an appointed sub public key Ri from the plurality of sub public keys Ri, and the sub public key Ri is appointed by a number i;
step S400: designating a number i, signing the number i, and controlling a bidder to verify the accuracy of the number i according to the signature:
the number i is signed by a designated party before transmission, and the bidder verifies the signature after receiving the designated number i to ensure the authenticity of the number i and prevent the pirate from tampering.
Step S500: controlling the bidder to select one sub public key Ri to encrypt the bidding document according to the designated number i and transmitting the sub public key Ri to the tenderer;
step S600: and the tenderer decrypts the bidding document through the sub private key Vi to obtain the bidding document.
The sub public key Ri of the scheme is not directly issued to the bidder, but is generated and selected by the bidder, and when the sub public key Ri is appointed, the number i of the appointed sub public key Ri is signed and verified, so that the authenticity of the number i is ensured, and the reliability of the bidding process is improved.
On the basis, the root public key R, the secret key generation tool, the number n of bidders and the set number i can be respectively sent to the bidders to improve the safety of the sub-secret keys, and if the secret-stealing parties want to forge the information of the bidders by intercepting the form of the sub-secret keys, the root public key R, the secret key generation tool and the number n of bidders need to be intercepted at the same time to generate the same group of sub-public keys RiAnd selects the correct sub-public key RiThe counterfeit encryption of the label is carried out, and the counterfeit difficulty is greatly improved.
Further, the step of signing specifically includes:
step S401: signing the number i through a sub private key Vi corresponding to the designated number i;
the sub-private key Vi, the sub-public key Ri and the number i are corresponding, the number i is signed by the sub-private key Vi corresponding to the specified number i, and the sub-public key Ri corresponding to the number i is required to be used for unlocking the signature.
The step of verifying the accuracy of the number i specifically includes:
step S402: and controlling the bidder to verify the signature by specifying the sub public key Ri corresponding to the number i so as to determine that the number i is signed by the corresponding sub private key Vi.
And selecting the sub public key Ri corresponding to the number i to decrypt the signature, wherein the signature can be successfully decrypted to verify the signature of Vi, and the content of the signature is the number i, so that the number i received by the bidder is proved to be accurate, and the difficulty of counterfeiting and tampering by a third party is extremely high.
Further, the step of signing the number i specifically includes: combining the serial number i with a random number to obtain an intermediate number, and signing the intermediate number through the sub private key Vi;
the step of verifying the signature specifically includes: and selecting the sub public key Ri to decrypt the intermediate number according to the plaintext of the number i, and verifying the decrypted intermediate number according to the plaintext of the intermediate number to determine that the intermediate number is sent by a tenderer, wherein the plaintext of the number i and the plaintext of the intermediate number are sent to the tenderer through the tenderer.
Specifically, the complexity of the number i is low, a random number is combined to obtain an intermediate number, and the intermediate number is signed and verified through the sub private key Vi and the sub public key Ri corresponding to the number i, so that a secret thief can be prevented from forging a signature.
Further, the step of verifying the signature further includes verifying whether the decrypted intermediate number is correct according to a combination of the plaintext of the random number and the plaintext of the number i.
Specifically, in order to designate a sub public key Ri to the bidder, the plaintext of the number i is sent to the bidder before verification, and at the moment, a random number is sent to the bidder separately, so that the number of information needing to be monitored and stolen when a password thief forges a signature is increased, the difficulty of forging the signature is increased, and the success rate of a bidding system is improved.
Further, the step of verifying the signature further includes: and acquiring a decrypted number i according to the decrypted intermediate number and the plaintext of the random number, and verifying the decrypted number i through the plaintext of the number i to determine that the number i is sent by the tenderer.
In another embodiment, the intermediate number decrypted by the public key Ri and the plaintext of the random number are eliminated, so as to verify whether the number i in the intermediate number is consistent with the number i corresponding to the public key Ri.
Further, the method for acquiring the intermediate number specifically includes negotiating a combination position of the random number and the number i with the tenderer;
inserting the number i into the negotiated binding position to obtain an intermediate number.
The scheme controls the structure of the intermediate number after the combination of the number i and the random number is more definite, and prevents confusion caused by the consistency of the numbers of the random number and the number i in the intermediate number.
Further, the step of obtaining a decrypted number i according to the decrypted intermediate number and the plaintext of the random number specifically includes: and separating the plaintext of the random number from the decrypted intermediate number according to the combination position to obtain a decrypted number i.
Specifically, the plaintext of the random number is separated according to the combined position according to the verification result of the intermediate number, so that the accuracy of the random number is verified on one hand, and the accuracy of the number i after separation is verified on the other hand, so that the validity of the signature is verified.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the computer program is executed. The storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random Access Memory (RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
With further reference to fig. 4, as an implementation of the method shown in fig. 2, the present application provides an embodiment of a public-key random bidding apparatus, where the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be applied to various electronic devices.
A bidding apparatus based on public key designation and authentication, comprising:
a root key generation module 100, configured to generate a pair of root public key R and root private key V corresponding to each other by using a hierarchical deterministic method;
the sub-private key generation module 200 is configured to generate a plurality of sub-private keys Vi in the tender party through the root private key V and the key generation tool;
the sub public key generation module 300 is configured to control a bidder to generate a plurality of sub public keys Ri through a root public key R and a secret key generation tool, where the sub public keys Vi correspond to the sub public keys Ri one to one;
the verification and number designation module 400 is used for designating a number i, signing the number i, and controlling a bidder to verify the accuracy of the number i according to the signature:
the encryption module 500 is used for controlling the bidder to select one sub public key Ri to encrypt the bidding document according to the designated number i and transmit the sub public key Ri to the tenderer;
and the decryption module 600 is configured to decrypt the bidding document through the sub private key Vi to obtain the bidding document.
Generating a root public key and a root private key, wherein the root private key V keeps secret and guarantees the safety of a password system;
the root public key R and the secret key generating tool are externally issued so that a bidder can generate a plurality of sub public keys according to the root public key R and the secret key generating tool; then, the bidder selects an appointed sub public key Ri from the plurality of sub public keys Ri, and the sub public key Ri is appointed by a number i;
the number i is signed by a designated party before transmission, and the bidder verifies the signature after receiving the designated number i to ensure the authenticity of the number i and prevent the pirate from tampering.
The sub public key Ri of the scheme is not directly issued to the bidder, but is generated and selected by the bidder, and when the sub public key Ri is appointed, the number i of the appointed sub public key Ri is signed and verified, so that the authenticity of the number i is ensured, and the reliability of the bidding process is improved.
In order to solve the technical problem, an embodiment of the present application further provides a computer device. Referring to fig. 4, fig. 4 is a block diagram of a basic structure of a computer device according to the present embodiment.
The computer device 6 comprises a memory 61, a processor 62, a network interface 63 communicatively connected to each other via a system bus. It is noted that only a computer device 6 having components 61-63 is shown, but it is understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead. As will be understood by those skilled in the art, the computer device is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The computer device can be a desktop computer, a notebook, a palm computer, a cloud server and other computing devices. The computer equipment can carry out man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch panel or voice control equipment and the like.
The memory 61 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the memory 61 may be an internal storage unit of the computer device 6, such as a hard disk or a memory of the computer device 6. In other embodiments, the memory 61 may also be an external storage device of the computer device 6, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the computer device 6. Of course, the memory 61 may also comprise both an internal storage unit of the computer device 6 and an external storage device thereof. In this embodiment, the memory 61 is generally used for storing an operating system installed in the computer device 6 and various application software, such as a program code of a public key random bidding method. Further, the memory 61 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 62 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 62 is typically used to control the overall operation of the computer device 6. In this embodiment, the processor 62 is configured to execute the program code stored in the memory 61 or process data, for example, execute the program code of the public key random bidding method.
The network interface 63 may comprise a wireless network interface or a wired network interface, and the network interface 63 is typically used for establishing a communication connection between the computer device 6 and other electronic devices.
The present application further provides another embodiment, which is to provide a computer-readable storage medium storing a public-key random tendering program, which is executable by at least one processor to cause the at least one processor to perform the steps of a public-key random tendering method as described above.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
It is to be understood that the above-described embodiments are merely illustrative of some, but not restrictive, of the broad invention, and that the appended drawings illustrate preferred embodiments of the invention and do not limit the scope of the invention. This application is capable of embodiments in many different forms and is provided for the purpose of enabling a thorough understanding of the disclosure of the application. Although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to one skilled in the art that the present application may be practiced without modification or with equivalents of some of the features described in the foregoing embodiments. All equivalent structures made by using the contents of the specification and the drawings of the present application are directly or indirectly applied to other related technical fields and are within the protection scope of the present application.

Claims (10)

1. A bidding method based on public key designation and identity verification is characterized by comprising the following steps:
generating a pair of root public key R and root private key V which correspond to each other by using a hierarchical certainty-based method;
generating a plurality of sub private keys Vi at the tender party by a root private key V and a secret key generating tool;
controlling a bidder to generate a plurality of sub public keys Ri through a root public key R and a secret key generation tool respectively, wherein the sub private keys Vi correspond to the sub public keys Ri one to one;
designating a number i, signing the number i, and controlling a bidder to verify the accuracy of the number i according to the signature:
controlling the bidder to select one sub public key Ri to encrypt the bidding document according to the designated number i and transmitting the sub public key Ri to the tenderer;
and the tenderer decrypts the bidding document through the sub private key Vi to obtain the bidding document.
2. The bidding method based on public key assignment and identity verification according to claim 1, wherein the step of signing specifically comprises:
signing the number i through a sub private key Vi corresponding to the designated number i;
the step of verifying the accuracy of the number i specifically includes:
and controlling the bidder to verify the signature by specifying the sub public key Ri corresponding to the number i so as to determine that the number i is signed by the corresponding sub private key Vi.
3. The bidding method based on public key assignment and identity verification according to claim 2, wherein the step of signing the number i specifically comprises: combining the serial number i with a random number to obtain an intermediate number, and signing the intermediate number through the sub private key Vi;
the step of verifying the signature specifically includes: and selecting the sub public key Ri to decrypt the intermediate number according to the plaintext of the number i, and verifying the decrypted intermediate number according to the plaintext of the intermediate number to determine that the intermediate number is sent by a tenderer, wherein the plaintext of the number i and the plaintext of the intermediate number are sent to the tenderer through the tenderer.
4. The tendering method based on public key specification and identity verification as claimed in claim 3, characterized in that the random numbers are generated by a tendering agency of a third party and transmitted to a tenderer and a bidder respectively;
and the step of verifying the signature further comprises verifying whether the decrypted intermediate number is correct or not according to the combination of the plaintext of the random number and the plaintext of the number i.
5. The bidding method based on public key assignment and identity verification of claim 3, wherein the step of verifying the signature further comprises: and acquiring a decrypted number i according to the decrypted intermediate number and the plaintext of the random number, and verifying the decrypted number i through the plaintext of the number i to determine that the number i is sent by the tenderer.
6. The bidding method based on public key assignment and identity verification according to claim 5, wherein the method for obtaining the intermediate number specifically comprises negotiating a combination position of a random number and a number i with a bidding party;
inserting the number i into the negotiated binding position to obtain an intermediate number.
7. The bidding method based on public key assignment and identity verification according to claim 6, wherein the step of obtaining the decrypted number i according to the decrypted intermediate number and the plaintext of the random number specifically comprises: and separating the plaintext of the random number from the decrypted intermediate number according to the combination position to obtain a decrypted number i.
8. A bidding device based on public key assignment and identity verification, comprising:
the system comprises a root key generation module, a root key generation module and a root key generation module, wherein the root key generation module is used for generating a pair of root public keys R and root private keys V which correspond to each other by utilizing a hierarchical certainty-based method;
the sub-private key generation module is used for generating a plurality of sub-private keys Vi at the tender party through a root private key V and a secret key generation tool;
the sub public key generation module is used for controlling a bidder to generate a plurality of sub public keys Ri through a root public key R and a secret key generation tool respectively, wherein the sub public keys Vi correspond to the sub public keys Ri one to one;
the verification and number designation module is used for designating a number i, signing the number i and controlling a bidder to verify the accuracy of the number i according to the signature:
the encryption module is used for controlling the bidder to select one sub public key Ri to encrypt the bidding document according to the designated number i and transmit the sub public key Ri to the tenderer;
and the decryption module is used for decrypting the bidding document through the sub private key Vi by the bidding party to obtain the bidding document.
9. A computer device comprising a memory and a processor, the memory having stored therein a computer program, characterized in that: the processor, when executing the computer program, realizes the steps of a public key designation and identity verification based bidding method according to any one of claims 1 to 7.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, carries out the steps of a public key designation and identity verification based bidding method according to any one of claims 1 to 7.
CN202111334121.6A 2021-11-11 2021-11-11 Bidding method and device based on public key assignment and identity verification Active CN114022259B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111334121.6A CN114022259B (en) 2021-11-11 2021-11-11 Bidding method and device based on public key assignment and identity verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111334121.6A CN114022259B (en) 2021-11-11 2021-11-11 Bidding method and device based on public key assignment and identity verification

Publications (2)

Publication Number Publication Date
CN114022259A true CN114022259A (en) 2022-02-08
CN114022259B CN114022259B (en) 2023-08-25

Family

ID=80063630

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111334121.6A Active CN114022259B (en) 2021-11-11 2021-11-11 Bidding method and device based on public key assignment and identity verification

Country Status (1)

Country Link
CN (1) CN114022259B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106603236A (en) * 2015-10-15 2017-04-26 收付宝科技有限公司 Method and device for generating signature
WO2018076365A1 (en) * 2016-10-31 2018-05-03 美的智慧家居科技有限公司 Key negotiation method and device
CN109039639A (en) * 2018-08-01 2018-12-18 国网江苏招标有限公司 Bidding system based on layering certainty cryptological technique
WO2019001061A1 (en) * 2017-06-26 2019-01-03 深圳市文鼎创数据科技有限公司 Payment verification method and system, and mobile device and security authentication device
CN111262707A (en) * 2020-01-16 2020-06-09 余志刚 Digital signature method, verification method, device and storage medium
CN111614469A (en) * 2020-05-27 2020-09-01 深圳壹账通智能科技有限公司 Digital signature generation method, device, equipment and storage medium
CN111800262A (en) * 2020-07-01 2020-10-20 北京金山云网络技术有限公司 Digital asset processing method and device and electronic equipment
CN112184216A (en) * 2020-08-20 2021-01-05 深圳华数云计算技术有限公司 Digital currency transaction method, device, digital currency transaction system and storage medium
US20210143990A1 (en) * 2019-11-07 2021-05-13 Micron Technology, Inc. Delegation of cryptographic key to a memory sub-system

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106603236A (en) * 2015-10-15 2017-04-26 收付宝科技有限公司 Method and device for generating signature
WO2018076365A1 (en) * 2016-10-31 2018-05-03 美的智慧家居科技有限公司 Key negotiation method and device
WO2019001061A1 (en) * 2017-06-26 2019-01-03 深圳市文鼎创数据科技有限公司 Payment verification method and system, and mobile device and security authentication device
CN109039639A (en) * 2018-08-01 2018-12-18 国网江苏招标有限公司 Bidding system based on layering certainty cryptological technique
US20210143990A1 (en) * 2019-11-07 2021-05-13 Micron Technology, Inc. Delegation of cryptographic key to a memory sub-system
CN111262707A (en) * 2020-01-16 2020-06-09 余志刚 Digital signature method, verification method, device and storage medium
CN111614469A (en) * 2020-05-27 2020-09-01 深圳壹账通智能科技有限公司 Digital signature generation method, device, equipment and storage medium
CN111800262A (en) * 2020-07-01 2020-10-20 北京金山云网络技术有限公司 Digital asset processing method and device and electronic equipment
CN112184216A (en) * 2020-08-20 2021-01-05 深圳华数云计算技术有限公司 Digital currency transaction method, device, digital currency transaction system and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李福 等: "电子招投标系统的安全体系设计与应用", 科学技术与工程, no. 13 *

Also Published As

Publication number Publication date
CN114022259B (en) 2023-08-25

Similar Documents

Publication Publication Date Title
CN109951489B (en) Digital identity authentication method, equipment, device, system and storage medium
CN111080295B (en) Electronic contract processing method and device based on blockchain
EP4081921B1 (en) Contactless card personal identification system
CN111835511A (en) Data security transmission method and device, computer equipment and storage medium
US10990692B2 (en) Managing data handling policies
CN109660534B (en) Multi-merchant-based security authentication method and device, electronic equipment and storage medium
EP1142194A1 (en) Method and system for implementing a digital signature
CN111931209A (en) Contract information verification method and device based on zero knowledge certification
CN116226289A (en) Electronic certificate management method, device, equipment and storage medium based on blockchain
CN113434882A (en) Communication protection method and device of application program, computer equipment and storage medium
CN111464295B (en) Bank card making method and device
CN111245594B (en) Homomorphic operation-based collaborative signature method and system
CN110414269B (en) Processing method, related device, storage medium and system of application installation package
CN109768969B (en) Authority control method, Internet of things terminal and electronic equipment
CN113783690B (en) Authentication-based bidding method and device
CN114022259B (en) Bidding method and device based on public key assignment and identity verification
CN111343170B (en) Electronic signing method and system
CN114022260B (en) Bidding method and device based on key designation, computer equipment and memory
CN109639409B (en) Key initialization method, key initialization device, electronic equipment and computer-readable storage medium
CN112529537A (en) Patent licensing method, device, equipment and storage medium based on block chain
CN113783689B (en) Sign information processing method and device
CN114640491A (en) Communication method and system
CN114697956B (en) Secure communication method and device based on double links
CN114726597B (en) Data transmission method, device, system and storage medium
CN116992470B (en) Collaborative authorization protocol signing method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant