CN114520728A - Distributed anonymous marking method and system - Google Patents
Distributed anonymous marking method and system Download PDFInfo
- Publication number
- CN114520728A CN114520728A CN202210417933.5A CN202210417933A CN114520728A CN 114520728 A CN114520728 A CN 114520728A CN 202210417933 A CN202210417933 A CN 202210417933A CN 114520728 A CN114520728 A CN 114520728A
- Authority
- CN
- China
- Prior art keywords
- marking
- random
- check code
- hash value
- random check
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09B—EDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
- G09B7/00—Electrically-operated teaching apparatus or devices working with questions and answers
- G09B7/02—Electrically-operated teaching apparatus or devices working with questions and answers of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3006—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters
- H04L9/302—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy underlying computational problems or public-key parameters involving the integer factorization problem, e.g. RSA or quadratic sieve [QS] schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
Abstract
The invention discloses a distributed anonymous marking method and a distributed anonymous marking system, a public key certificate is registered for a marking appraiser terminal and is disclosed to all appraisers, the marking appraiser terminal generates a random check code by itself and calculates a hash value of the random check code, the marking appraiser terminal carries out anonymous signature on the hash value of the random check code by using a whole member public key and a personal private key, and the signed random check code hash value is registered on a system public chain until all the marking appraiser terminals finish the registration of the random check code hash value; when the examination papers are formally examined, the examination paper examination results of each examination paper examination and examination assistant terminal are added with random check codes and submitted together; and the system server calculates the hash value of the random check code and compares the hash value with the hash value on the public link to judge the effectiveness. The distributed paper marking and evaluation system and the distributed paper marking and evaluation method realize complete anonymity of distributed paper marking and evaluation committees based on the block chain, the ring signature and the one-way characteristic of the hash function, and adopt the random check code as an anonymous authentication means, thereby reducing the calculation overhead of the system and improving the data interaction efficiency.
Description
Technical Field
The invention relates to information security and user privacy protection technologies, in particular to a distributed anonymous marking scoring method and system.
Background
Digital signatures are a public key cryptographic algorithm that can perform the functions of traditional signatures or stamps, ensuring the integrity, authenticity and non-repudiation of information transmissions. However, in some problems related to user privacy protection, the conventional digital signature cannot meet the requirements of the application. For example: under the epidemic situation, examination paper reading experts in various places cannot gather together to carry out closed examination paper reading on examination papers of examinees, and online examination paper reading is a distributed solution with high efficiency.
The traditional marking and scoring system comprises a server and a plurality of marking and scoring clients, wherein the marking and scoring clients transmit marking results to the server in an encrypted manner through a system public key, the server decrypts the marking and scoring results through a system private key to obtain the marking and scoring results, and in order to achieve independent judgment and objective justice, the anonymity of the identity of a marking expert needs to be guaranteed. Conventional digital signatures do not have anonymity.
Ring signatures are a signature mechanism proposed by Rivest et al to achieve anonymity. It is a signature for a group, but does not require a group establishment process, nor a group administrator. The signer only needs to spontaneously select a part of the public keys of the members and then generates a signature through the private key of the signer. The signer and the user who has chosen the public key form a signature group. It is computationally possible to verify that the signature originates from a certain user of the signature group, but that no specific user can be located. The anonymity performance of ring signatures provides a technical basis for distributed anonymity scoring. The technology is also widely used in the fields of anonymous election, electronic money and the like.
However, because the ring signature involves complex public key encryption and decryption calculations many times, there is a great efficiency problem in both certificate verification management and actual information transmission, and in order to achieve the effect of anonymity, the calculation overhead of the system is increased, and the transmission efficiency is reduced. Especially in a distributed examination paper marking scene, if complex ring signature authentication is performed on each examination paper marking result, the practicability of the anonymous examination paper marking system is reduced, so that the anonymity of examination paper marking evaluation committees is ensured, meanwhile, the calculation overhead of the system is reduced, the practicability of the system is enhanced, and the technical problem to be solved urgently is solved.
On the other hand, in the scoring scene of the paper marking, the traditional ring signature is difficult to find and avoid cheating on the scoring result of the paper marking, and the traceability of the anonymous signature is difficult.
In an examination paper marking scene, an examination paper marking evaluation client sometimes requires to claim an examination paper marking evaluation result given by the examination paper marking evaluation client, but in order to achieve better anonymity, the traditional examination paper marking evaluation system is difficult to achieve that the examination paper marking evaluation client claims the examination paper marking evaluation result given by the examination paper marking evaluation client.
Disclosure of Invention
In order to solve the defects of the prior art, ensure the anonymity of the scoring judges, reduce the calculation cost of the system and improve the data interaction efficiency, the invention adopts the following technical scheme:
a distributed anonymous marking scoring method comprises a server and a group of marking evaluation terminals, wherein the marking evaluation terminals transmit marking results to the server in an encrypted manner through a system public key, the server decrypts the marking results through a system private key to obtain the marking results, and the method adopts anonymous marking scoring and comprises the following steps:
step S1: registering a public key certificate, namely registering the public key certificate for an examination paper marking evaluation side, and disclosing the public key certificate to all examination paper marking evaluation sides through a certificate public chain;
step S2: generating a random check code and a hash value thereof, and generating the random check code for verifying the result of the examination paper by the examination paper evaluation clientcodeAnd calculating the hash value of the random check codem;
Step S3: the registration of the hash value of the random check code comprises the following steps:
step S3.1: the marking and appraising client carries out anonymous signature on the hash value of the random check code through a public key in the public key certificate and a private key of the marking and appraising client;
step S3.2: registering the random check code hash value after anonymous signature on a check code public chain until all the examination paper review judges finish the registration of the random check code hash value;
step S3.3: after all the scoring evaluation terminals finish the registration of the hash values of the random check codes, collectively declaring that each scoring evaluation terminal successfully finishes the registration of the hash values of the random check codes, the number of the registered hash values of the random check codes is consistent with that of the scoring evaluation terminals, and if the registered hash values of the random check codes are not consistent with that of the scoring evaluation terminals, re-registering the hash values of the random check codes;
because no user privacy is involved in the registration process of the random check code hash value, and a cheater is easy to find out in the final collective declaration stage, the cheater cheats without any benefit, namely the behavior that a certain judge registers the random check code hash value more is avoided;
step S4: the certification with the anonymous marking result of the marking result, after the marking evaluation side finishes formal marking, the marking result is added with the random check code generated in the step S2codeThe encrypted data is transmitted to a server after being encrypted by a system public key;
step S5: and (4) verifying the validity of the marking result, wherein the server receives and decrypts the file returned by the marking evaluation client through a system private key, calculates the hash value of the random check code attached to the marking result, compares the hash value of the marking result with the hash value of the random check code recorded in the check code public chain, and confirms the validity of the marking result.
Further, the step S3.1 comprises the steps of:
step S3.1.1: based on the hash value of the random check codemComputing an encryption keykEncryption keykFor encryption algorithmsThe secret key of (a);
step S3.1.2: according to the number of the scoring judges participating in scoringnGenerating a corresponding private certificate, wherein the current marking evaluation client is the firstsThe number of the evaluation committee is 1 or lesss≤nThe private certificate of other n-1 scoring judges is(ii) a Each private certificate is a character string which is not less than 16 bits in length and needs to contain upper and lower case letters, numbers and special characters;
step S3.1.3: calculating a hash value of the private certificate and disclosing it as an anonymous signatureRandom parameter ofR i ,i=1,2,…,s-1,s+1,…,n;
Step S3.1.4: obtaining public keys of other marking evaluation terminals disclosed in the certificate public chain, respectively encrypting n-1 random parameters through the public keys to obtain n-1 encrypted private certificatesy i ,i=1,2,…,s-1,s+1,…,n;
Step S3.1.6: constructing a closed loop functionC k,v()Let us order(ii) a Wherein the content of the first and second substances,let us orderObtaining the encrypted private certificate of the current paper marking appraiser≧ indicates xor;
step S3.1.7: private key based on current paper marking judge terminalAnd calculating a random parameter disclosed by anonymous signature of the current scoring evaluation side;
Step S3.2 comprises the steps of:
Step S3.2.3: checking calculationIf yes, registering the check code hash value to a cochain, namely uploading a check code common chain; otherwise, the uplink is rejected.
And generating a private certificate by an examination and review judge, and calculating a hash value of the private certificate as a random parameter of the final disclosure of the ring signature to realize traceable authentication of the signature.
The validity of the random check code is ensured by means of the ring signature and block chain technology, and complete anonymity of the paper marking and appraising committee is realized.
Further, in step S3.3, based on the anonymous signature algorithm, the paper marking and evaluation client can declare that the random check code is owned by the node, and the method includes the following steps:
S3.3.2: by private certificationThe calculated hash value and the random parameter on the anonymous signatureAnd verifying, wherein when the random check codes are consistent, the random check codes are all owned by the node.
The hash value of the private certificate of the marking evaluation client is used as the random parameter of the ring signature by combining the one-way irreversible characteristic of the hash function, and the marking evaluation client can claim the random check code of the client, namely claim the marking evaluation result given by the client if necessary.
Further, in the step S3.1.1, a symmetric encryption algorithm is adoptedA 256-bit key k sequence is generated using a hash function,。
further, in the step S3.1.3, based on the secure hash function SHA256, the hash value of the private certificate is calculated more than or equal to 5000 times in iteration as the random parameter for signature disclosure。
In step S3.1.4, the public key of the reader isThe private key isUsing public keysAnd (3) realizing forward transformation:,which is a representation of a random parameter,g i () represents an encryption operation,y i Representing encrypted random parameters only by means of a private keyCan realize reverse transformation,g i -1 The (DEG) represents a decryption operation, and the encryption process of the n-1 private certificates is the encryption process of the random parameter,R i Indicates that it is going to useiAnd (4) a random parameter encrypted by a public key of the bit marking evaluation client.
Further, in the step S3.3.2, the server checks the calculation through a secure hash functionWhether to match random parameters on anonymous signaturesAnd if the random check codes are consistent, the random check codes are considered to be owned by the node.
Further, in step S1, the public key encryption algorithm of the reviewing commentator end may adopt the same public key encryption algorithm or different kinds of public key encryption algorithms, in the embodiment of the present invention, the RSA encryption algorithm is adopted, and the public key of the reviewing commentator end is adoptedP i Is a pair of integers (e, t), the private keyFor another pair of integers (d, t), the encryption process for plaintext p is c = e (p) = pe mod t, E (·) denotes an encryption operation, mod denotes a modulo operation, and the decryption process for the ciphertext c is p = d (c) = cdmod t, D (-) represents the decryption operation.
Further, in the step S2, a secure hash function is adoptedSHA256 to all panelistsPerforming cyclic iteration on the random check code, and calculating the hash value of the random check codeThe iteration cycle number is more than or equal to 5000 times, and the length of the corresponding random check code is 256 bits.
A distributed anonymous scoring system comprises a memory and one or more processors, wherein executable codes are stored in the memory, and when the one or more processors execute the executable codes, the one or more processors are used for realizing the distributed anonymous scoring method.
The invention has the advantages and beneficial effects that:
the invention utilizes the random check code as an effective authentication means for marking, greatly reduces the calculation overhead of the system and improves the transmission efficiency; the validity of the random check code is ensured by means of anonymous signature and block chain technology, and complete anonymity of the paper marking and evaluation committee is realized; after the hashed values of the random check codes are linked, a whole member judge confirmation link is added, and the action of applying for a plurality of random check codes by a single person is effectively avoided; the distributed anonymous marking and scoring method and system provided by the invention have complete anonymous characteristics, can effectively reduce the calculation overhead of the system, and have strong practical value.
Drawings
Fig. 1 is a schematic diagram of a distributed anonymous scoring process in the embodiment of the present invention.
Fig. 2 is a flowchart of a distributed anonymous scoring method according to an embodiment of the present invention.
FIG. 3 is a diagram illustrating the process of establishing a public chain of certificate of the paper marking reviewer according to an embodiment of the present invention.
FIG. 4 is a diagram illustrating the generation process of the hash value of the random check code of the paper marking reviewer according to the embodiment of the present invention.
FIG. 5 is a diagram illustrating an anonymous signing process of a random number check code hash value by an examination paper reader in an embodiment of the present invention.
Fig. 6 is a structural diagram of a distributed anonymous scoring system in an embodiment of the present invention.
Detailed Description
The following detailed description of embodiments of the invention refers to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present invention, are given by way of illustration and explanation only, not limitation.
As shown in fig. 1 and fig. 2, a distributed anonymous paper marking scoring method includes a server and a group of paper marking review committees, the paper marking review committees encrypt and transmit paper marking results to the server through a system public key, the server decrypts the paper marking results through a system private key to obtain the paper marking results, and the method for scoring the paper marking anonymously includes the following steps:
step S1: the public key certificate registration is to register a public key certificate for the examination paper review clients and to disclose the public key certificate to all examination paper review clients through a certificate public chain, as shown in fig. 3.
The public key of each scoring judge side isThe private key is. In this step, the user may select the same public key encryption algorithm, or may select different kinds of public key encryption algorithms.
In the embodiment of the invention, the adopted public key encryption algorithm is RSA encryption algorithm, and the public key of the marking and appraising clientIs a pair of integers (e, t), the private keyFor another pair of integers (d, t), the encryption process for plaintext p is c = e (p) = pe mod t, E (·) denotes an encryption operation, mod denotes a modulo operation, and the process of decrypting the ciphertext c is p = d (c) = cdmod t, D (-) represents the decryption operation.
Step S2: generating a random check code and a hash value thereof, and generating the random check code for verifying the result of the examination paper by the examination paper evaluation clientcodeAnd calculating the hash value of the random check codem。
In the embodiment of the invention, a secure hash function SHA256 is adopted to carry out cycle iteration on all random check codes of the appraisers of the examination papers, and the hash value of the random check code is calculatedThe iteration cycle number is greater than or equal to 5000 times, and the length of the corresponding random check code is 256 bits, as shown in fig. 4.
Step S3: and registering the hash value of the random check code, wherein the anonymous signature is carried out on the hash value of the random check code by the marking appraiser through a public key in the public key certificate and a private key of the marking appraiser, the anonymous signature is carried out on the hash value of the random check code, the anonymous signature is registered on a public chain of the check code, until all the marking appraiser finishes registering the hash value of the random check code, collective declaration is carried out, each marking appraiser successfully finishes registering the hash value of the random check code, the number of the registered hash values of the random check code is consistent with that of the marking appraiser, and if the numbers are not consistent, the registration of the hash value of the random check code is carried out again.
Because no user privacy is involved in the registration process of the random check code hash value and a cheater is easy to find out in the final collective declaration stage, the cheater cheats without any benefit, and the behavior that a certain judge registers the random check code hash value more can be avoided.
As shown in fig. 5, step S3.1: the anonymous signature adopts a ring signature and comprises the following steps:
step S3.1.1: based on the hash value of the random check codemComputing an encryption keykEncryption keykFor encryption algorithmsThe secret key of (a);
in the embodiment of the invention, a symmetric encryption algorithm is adoptedA 256-bit key k sequence is generated using a hash function,。
step S3.1.2: according to the number of the appraisers participating in the paper markingnGenerating a corresponding private certificate, wherein the current marking evaluation client is the firstsPosition assessment Committee, 1 ≤s≤nDetermining the private certification of other n-1 scoring judges。
In the embodiment of the invention, each private certificate is not less than 16 bits in length and needs to contain character strings of upper and lower case letters, numbers and special characters.
Step S3.1.3: random argument to disclose hash value of private certificate as anonymous signatureR i ,i=1,2,…,s-1,s+1,…,n;
In the embodiment of the invention, 5000 times of iteration calculation of the hash value of the private certificate is carried out based on the secure hash function SHA256 and is used as the random parameter for signature disclosure。
Step S3.1.4: obtaining public keys of other marking evaluation terminals disclosed in the certificate public chain, respectively encrypting and calculating n-1 private certificates through the public keys of the certificate public chain to obtain the encrypted n-1 private certificatesy i ,i=1,2,…,s-1,s+1,…,n。
The public key of each scoring judge side isThe private key is. By usingA forward transform can be implemented:,x i which represents the original data of the image data,g i (. cndot.) represents a forward transform operation,y i representing data after forward transformation, usingCan realize reverse transformation,g i -1 Denotes an inverse transformation operation, the encryption process of n-1 private certificates is,R i Indicates that it is going to useiAnd (4) a random parameter encrypted by a public key of the bit marking evaluation client.
Wherein the content of the first and second substances,let us orderObtaining the encrypted private certificate of the current marking appraiserAnd ∈ indicates exclusive or.
Step S3.1.7: private key based on current paper marking judge terminalCalculating random parameters disclosed by anonymous signature of current scoring appraiser。
Step S3.2: the method for registering uplink check by using the hash value of the random check code comprises the following steps:
Step S3.2.3: checking calculationWhether the result is true or not; if yes, registering the check code hash value on the uplink; otherwise, the uplink is rejected.
And generating a private certificate by the marking and appraising client, and calculating the hash value of the private certificate as a random parameter of the final disclosure of the ring signature to realize the traceable signature authentication.
The validity of the random check code is ensured by means of the ring signature and block chain technology, and complete anonymity of the marking and appraising client is realized.
Based on an anonymous signature algorithm, the paper marking and evaluating client can declare all the random check codes, and the method comprises the following steps:
S3.3.2: by private certificationThe calculated hash value and the random parameter on the anonymous signatureAnd verifying, wherein when the random check codes are consistent, the random check codes are all owned by the node.
In the embodiment of the invention, the system checks and calculates through a secure hash functionWhether or not to be associated with the signatureAnd (5) the consistency is achieved. If the random check codes are consistent, the random check codes are considered to be owned by the node.
The hash value of the private certificate of the marking evaluation client is used as the random parameter of the ring signature by combining the one-way irreversible characteristic of the hash function, and the marking evaluation client can claim the random check code of the client, namely claim the marking evaluation result given by the client if necessary.
Step S4: the certification with the anonymous marking result of the marking result, after the marking evaluation side finishes formal marking, the marking result is added with the random check code generated in the step S2codeAnd the encrypted data is transmitted to the server side through the system public key.
Step S5: and (4) verifying the validity of the marking result, wherein the server receives and decrypts the file returned by the marking evaluation client through a system private key, calculates the hash value of the random check code attached to the marking result, compares the hash value of the marking result with the hash value of the random check code recorded in the check code public chain, and confirms the validity of the marking result.
Corresponding to the embodiment of the distributed anonymous scoring method, the invention also provides an embodiment of a distributed anonymous scoring system.
Referring to fig. 6, the distributed anonymous scoring system provided in an embodiment of the present invention includes a memory and one or more processors, where the memory stores executable codes, and the one or more processors, when executing the executable codes, are configured to implement a distributed anonymous scoring method in the foregoing embodiments.
The embodiment of the distributed anonymous scoring system can be applied to any device with data processing capability, such as a computer or other devices. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. The software implementation is taken as an example, and as a logical device, the device is formed by reading corresponding computer program instructions in the nonvolatile memory into the memory for running through the processor of any device with data processing capability. From a hardware aspect, as shown in fig. 6, a hardware structure diagram of any device with data processing capability where the distributed anonymous scoring system of the present invention is located is shown, except for the processor, the memory, the network interface, and the nonvolatile memory shown in fig. 6, in the embodiment, any device with data processing capability where the apparatus is located may also include other hardware generally according to the actual function of the any device with data processing capability, which is not described again.
The implementation process of the functions and actions of each unit in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the invention. One of ordinary skill in the art can understand and implement it without inventive effort.
The embodiment of the invention also provides a computer-readable storage medium, wherein a program is stored on the computer-readable storage medium, and when the program is executed by a processor, the distributed anonymous scoring method in the embodiment is realized.
The computer readable storage medium may be an internal storage unit, such as a hard disk or a memory, of any data processing capability device described in any of the foregoing embodiments. The computer readable storage medium may also be any external storage device of a device with data processing capabilities, such as a plug-in hard disk, a Smart Media Card (SMC), an SD Card, a Flash memory Card (Flash Card), etc. provided on the device. Further, the computer readable storage medium may include both an internal storage unit and an external storage device of any data processing capable device. The computer-readable storage medium is used for storing the computer program and other programs and data required by the arbitrary data processing-capable device, and may also be used for temporarily storing data that has been output or is to be output.
The above examples are only intended to illustrate the technical solution of the present invention, and not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (10)
1. A distributed anonymous marking method comprises a server and a group of marking evaluation terminals, wherein the marking evaluation terminals encrypt and transmit marking results to the server through a system public key, and the server decrypts the marking results through a system private key to obtain the marking results, and is characterized in that: the scoring method adopts anonymous scoring and comprises the following steps:
step S1: registering a public key certificate, namely registering the public key certificate for an examination paper marking evaluation side, and disclosing the public key certificate to all examination paper marking evaluation sides through a certificate public chain;
step S2: generating a random check code and a hash value thereof, generating the random check code for verifying the result of the examination paper by the examination paper evaluation terminal, and calculating the hash value of the random check code;
step S3: the random check code hash value registration comprises the following steps:
step S3.1: the marking and appraising client carries out anonymous signature on the hash value of the random check code through a public key in the public key certificate and a private key of the marking and appraising client;
step S3.2: registering the random check code hash value after anonymous signature on a check code public chain until all the examination paper evaluation terminals finish the registration of the random check code hash value;
step S3.3: after all the scoring evaluation terminals finish the registration of the hash values of the random check codes, collectively declaring that each scoring evaluation terminal successfully finishes the registration of the hash values of the random check codes, the number of the registered hash values of the random check codes is consistent with that of the scoring evaluation terminals, and if the registered hash values of the random check codes are not consistent with that of the scoring evaluation terminals, re-registering the hash values of the random check codes;
step S4: the examination paper marking result is signed anonymously, after the examination paper marking evaluation side finishes formal examination paper marking, the examination paper marking evaluation side adds the random check code generated in the step S2 to the examination paper marking result, and the examination paper marking result is encrypted by a system public key and then is transmitted to the server side;
step S5: and (4) verifying the validity of the marking result, wherein the server receives and decrypts the file returned by the marking evaluation client through a system private key, calculates the hash value of the random check code attached to the marking result, compares the hash value of the marking result with the hash value of the random check code recorded in the check code public chain, and confirms the validity of the marking result.
2. The distributed anonymous scoring method according to claim 1, wherein:
step S3.1 comprises the steps of:
step S3.1.1: based on the hash value of the random check codemComputing an encryption keykEncryption keykFor encryption algorithmsThe secret key of (a);
step S3.1.2: according to the number of the scoring judges participating in scoringnGenerating a corresponding private certificate, wherein the current marking evaluation client is the firstsThe number of the evaluation committee is 1 or lesss≤nThe private certificate of other n-1 scoring judges is;
Step S3.1.3: calculating the hash value of the private certificate and using it as the random parameter for anonymous signature disclosureR i ,i=1,2,…,s-1,s+1,…,n;
Step S3.1.4: obtaining public keys of other marking evaluation terminals disclosed in the certificate public chain, respectively encrypting n-1 random parameters through the public keys to obtain n-1 encrypted private certificatesy i ,i=1,2,…,s-1,s+1,…,n;
Step S3.1.6: constructing a closed loop functionC k,v()Let us order(ii) a Wherein the content of the first and second substances,let us orderTo obtainTo the private certificate after the encryption of the current paper marking judge≧ indicates xor;
step S3.1.7: private key based on current paper marking evaluation clientAnd calculating a random parameter disclosed by anonymous signature of the current scoring evaluation side;
Step S3.2 comprises the steps of:
3. The distributed anonymous scoring method according to claim 2, wherein: in step S3.3, based on the anonymous signature algorithm, the paper marking and evaluation client can declare that the random check code is owned by the node, and the method includes the following steps:
6. The distributed anonymous scoring method according to claim 2, wherein: in the step S3.1.4, the public key of the reader isThe private key isUsing public keysAnd (3) realizing forward transformation:,which is a representation of a random parameter,g i () represents an encryption operation that is performed,y i representing encrypted random parameters only by means of a private keyCan realize reverse transformation,g i -1 The (DEG) represents a decryption operation, and the encryption process of the n-1 private certificates is the encryption process of the random parameter,R i Indicates that it is going to useiAnd (4) a random parameter encrypted by a public key of the bit marking evaluation client.
7. According to claim 3The distributed anonymous scoring method is characterized by comprising the following steps: in the step S3.3.2, the server checks and calculates through the secure hash functionWhether to match random parameters on anonymous signaturesAnd if the random check codes are consistent, the random check codes are considered to be owned by the node.
8. The distributed anonymous scoring method according to claim 1, wherein: in the step S1, the public key encryption algorithm of the paper marking evaluation side adopts the RSA encryption algorithm and the public key of the paper marking evaluation sideP i Is a pair of integers (e, t), the private keyFor another pair of integers (d, t), the encryption process on the plaintext p is c = e (p) = pe mod t, E (·) denotes an encryption operation, mod denotes a modulo operation, and the decryption process for the ciphertext c is p = d (c) = cdmod t, D (-) represents the decryption operation.
9. The distributed anonymous scoring method according to claim 1, wherein: in the step S2, a secure hash function is adoptedSHA256, performing loop iteration on all random check codes of the scoring judges, and calculating the hash value of the random check codeThe iteration cycle number is more than or equal to 5000 times, and the length of the corresponding random check code is 256 bits.
10. A distributed anonymous scoring system is characterized in that: comprising a memory having stored therein executable code and one or more processors operable when executing the executable code to implement a distributed anonymous scoring method according to any one of claims 1-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210417933.5A CN114520728B (en) | 2022-04-21 | 2022-04-21 | Distributed anonymous marking method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210417933.5A CN114520728B (en) | 2022-04-21 | 2022-04-21 | Distributed anonymous marking method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114520728A true CN114520728A (en) | 2022-05-20 |
CN114520728B CN114520728B (en) | 2022-08-05 |
Family
ID=81600277
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210417933.5A Active CN114520728B (en) | 2022-04-21 | 2022-04-21 | Distributed anonymous marking method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114520728B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101098223A (en) * | 2007-07-05 | 2008-01-02 | 李江 | Method and device for encrypting network user password |
US20150006895A1 (en) * | 2009-06-01 | 2015-01-01 | Maidsafe Foundation | Distributed network system |
CN111901292A (en) * | 2020-06-08 | 2020-11-06 | 徐华 | High and new enterprise evaluation system based on group signature |
CN111932052A (en) * | 2020-06-08 | 2020-11-13 | 徐华 | Teacher scoring management system based on anonymous mechanism |
CN111984959A (en) * | 2020-08-31 | 2020-11-24 | 北京数字认证股份有限公司 | Anonymous information publishing and verifying method and device |
CN112487468A (en) * | 2020-12-21 | 2021-03-12 | 暨南大学 | Traceable complete anonymous electronic voting method and system based on block chain |
CN112702159A (en) * | 2020-12-15 | 2021-04-23 | 浙江工商大学 | Online expert scoring method and system based on block chain |
CN113595738A (en) * | 2021-07-29 | 2021-11-02 | 南京工业大学 | Block chain-based collaborative position privacy protection method |
CN114005217A (en) * | 2021-10-21 | 2022-02-01 | 浙江工商大学 | Electronic voting system and method based on block chain |
-
2022
- 2022-04-21 CN CN202210417933.5A patent/CN114520728B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101098223A (en) * | 2007-07-05 | 2008-01-02 | 李江 | Method and device for encrypting network user password |
US20150006895A1 (en) * | 2009-06-01 | 2015-01-01 | Maidsafe Foundation | Distributed network system |
CN111901292A (en) * | 2020-06-08 | 2020-11-06 | 徐华 | High and new enterprise evaluation system based on group signature |
CN111932052A (en) * | 2020-06-08 | 2020-11-13 | 徐华 | Teacher scoring management system based on anonymous mechanism |
CN111984959A (en) * | 2020-08-31 | 2020-11-24 | 北京数字认证股份有限公司 | Anonymous information publishing and verifying method and device |
CN112702159A (en) * | 2020-12-15 | 2021-04-23 | 浙江工商大学 | Online expert scoring method and system based on block chain |
CN112487468A (en) * | 2020-12-21 | 2021-03-12 | 暨南大学 | Traceable complete anonymous electronic voting method and system based on block chain |
CN113595738A (en) * | 2021-07-29 | 2021-11-02 | 南京工业大学 | Block chain-based collaborative position privacy protection method |
CN114005217A (en) * | 2021-10-21 | 2022-02-01 | 浙江工商大学 | Electronic voting system and method based on block chain |
Non-Patent Citations (2)
Title |
---|
YUXIANG MA; YULEI WU; JINGGUO GE; JUN LI: "A New Architecture for Anonymous Use of Services in Distributed Computing Networks", 《2017 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS AND 2017 IEEE INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS (ISPA/IUCC)》 * |
崔耀: "一种可追踪的网络信息匿名发布方案", 《计算机与现代化 》 * |
Also Published As
Publication number | Publication date |
---|---|
CN114520728B (en) | 2022-08-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Chaidos et al. | BeleniosRF: A non-interactive receipt-free electronic voting scheme | |
CN110971405B (en) | SM2 signing and decrypting method and system with cooperation of multiple parties | |
Yu et al. | Enhanced privacy of a remote data integrity-checking protocol for secure cloud storage | |
Li et al. | Privacy preserving cloud data auditing with efficient key update | |
Wei et al. | SecCloud: Bridging secure storage and computation in cloud | |
RU2376651C2 (en) | Using isogenies to design cryptosystems | |
EP3496331A1 (en) | Two-party signature device and method | |
CN115804059A (en) | Generating secret shares | |
US20230037491A1 (en) | Cryptographic Operation | |
Xu et al. | Secure fuzzy identity-based public verification for cloud storage | |
WO2019174404A1 (en) | Digital group signature method, device and apparatus, and verification method, device and apparatus | |
CN114520728B (en) | Distributed anonymous marking method and system | |
TW202318833A (en) | Threshold signature scheme | |
Pape | Authentication in insecure environments: using visual cryptography and non-transferable credentials in practise | |
Peng | How Secure Are The Main Real-World Mix Networks—Case Studies To Explore Vulnerabilities And Usability | |
Lueks et al. | Vote to link: Recovering from misbehaving anonymous users | |
Beresneva et al. | Special digital signature schemes based on GOST R 34.10-2012 | |
Hanaoui et al. | MULTI-AGENT identity combined key Signature authentication PROTOCOL based schnorr signature with provable security under AVISPA | |
Fajiang et al. | An efficient anonymous remote attestation scheme for trusted computing based on improved CPK | |
Santos | Cryptography for pragmatic distributed trust and the role of blockchain | |
Bashir | Analysis and Improvement of Some Signcryption Schemes Based on Elliptic Curve | |
RU2774807C2 (en) | Homomorphous encryption for authentication using password | |
Ferradi | Integrity, authentication and confidentiality in public-key cryptography | |
Wu et al. | Attack Analysis on Two-party Signature and Threshold Signature Based on Dilithium | |
Sun et al. | A New Attack for Self-Certified Digital Signatures for E-Commerce Applications. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |