CN114726545A - Block chain based decentralized group encryption session maintaining method - Google Patents
Block chain based decentralized group encryption session maintaining method Download PDFInfo
- Publication number
- CN114726545A CN114726545A CN202210420043.XA CN202210420043A CN114726545A CN 114726545 A CN114726545 A CN 114726545A CN 202210420043 A CN202210420043 A CN 202210420043A CN 114726545 A CN114726545 A CN 114726545A
- Authority
- CN
- China
- Prior art keywords
- group
- intelligent contract
- public key
- message
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3249—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Algebra (AREA)
- Mathematical Analysis (AREA)
- Mathematical Optimization (AREA)
- Mathematical Physics (AREA)
- Pure & Applied Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a block chain intelligent contract and distributed storage technology, in particular to a block chain decentralized group encryption session maintaining method, which realizes the generation and verification of an invitation code by using an asymmetric encryption algorithm technology, invitees can enhance the account security without exposing the block chain account numbers of the invitees in the whole process, when a group speaks, the message to be submitted is encrypted by using a communication public key on a group address book to obtain a set of encrypted versions of the message sent to other users of the group, the set file is stored in a distributed storage network to obtain the hash of the file, the user in any group can obtain an encrypted ciphertext by using the hash, namely, the communication data is stored on the distributed storage network, a group message queue is maintained by using a data structure of the block chain intelligent contract, the hash of the encrypted file of the message is maintained in the queue, and the establishment of a decentralized social group and the encryption communication process are realized.
Description
Technical Field
The invention relates to the field of blockchain and web3.0 social groups, in particular to a method for establishing a group and maintaining encrypted communication based on blockchain decentralization.
Background
Communication group establishment and communication maintenance in the current social field need to rely on a centralized social network, a user establishes a group after verifying identity through registering an account, and actively or passively invites the user with the existing centralized network account to join the group, and communication sending and receiving in the group all rely on a centralized service facility.
Most of the prior art schemes are realized by adopting a centralization method, but the realization of the prior art adopting a decentralization method has a certain privacy security problem more or less.
Disclosure of Invention
The invention aims to provide a method for establishing a decentralized communication group based on a block chain by utilizing a block chain intelligent contract technology, which is characterized by comprising the following steps of:
s1, a group creator creates a communication group with any theme, describes the group by using a group keyword, sets configuration parameters of the group, and submits a block chain intelligent contract for realizing the group function, wherein the configuration parameters comprise the number of participants and the group name;
s2, the group creator uses the asymmetric encryption algorithm to generate a group invitation code private key as the invitation code, the invitation code private key deduces the invitation code public key through the asymmetric encryption algorithm, the group creator submits the group invitation code public key to the intelligent contract through the intelligent contract to establish the data structure invitecodes { User0_ public key, User1 public key, User N public key } which is formed by the invitee public key and the public key, and at the same time, the group creator creates the data structure of the User public key list for group communication, namely the data structure of the group address book, which is formed by the public key, the signature information: user _ key _ list ([ { [ Chat _ Pub ]: [ invite _ sign _ text) ]), where the public key will be derived by the private key asymmetric encryption algorithm of group communication purposes that the group members individually generate and hold for group communication purposes; the signature information is the information signed by the private key of the user communication destination, and the signature information can be easily verified by the public key; the asymmetric encryption algorithm can be an elliptic curve and RSA encryption algorithm; each time a public key item is added to the group address book, the public key item indicates that a user is invited to successfully join a group;
s3, the group creator informs the invitee of the invitation code private key through the non-intelligent contract interaction approach, the non-intelligent contract interaction approach includes but is not limited to mail, short message, instant chat, voice chat tools;
s4, invitee receives the invitation code private key, generates the group communication private key of the corresponding group communication usage, and then deduces the group communication public key by using the asymmetric encryption algorithm based on the group communication private key, which is used for the invitee to communicate with other group members after joining the group;
s5, the invitee signs the public key for group communication by the received invitation code private key and submits the public key to the intelligent contract;
s6, the intelligent contract receives the signature information submitted by the invitee, firstly verifies whether the signature information is signed by the invitation code private key through the invitation code public key, and after confirmation, the intelligent contract executes the following operations:
a) deleting the invitation code public key which is submitted by the invitee and has been verified to be used;
b) adding a group communication public key generated by an invitee into an invitee list in the intelligent contract, wherein the invitee list becomes a group address book;
and S7, other invitees join the group through the steps S3-S6 until the invitation codes are all used, and the public keys of the invitation codes are deleted after the user joins.
A method for maintaining a group encryption session through blockchain decentralization, comprising the steps of:
s1, after the invitee joins the group address book of the intelligent contract, the invitee indicates that the group chat is entered, and before the group speaker sends the message, the group address book of the intelligent contract is downloaded;
s2, performing asymmetric encryption calculation on the message to be sent one by one according to the group communication public key of each invitee in the group address book to obtain an encrypted ciphertext array file, wherein the data structure of the ciphertext array file is composed of the group communication public key and the encrypted message;
s3, submitting the obtained ciphertext array file to a distributed storage network;
s4, obtaining a hash value of a ciphertext array file in the distributed storage network, and submitting the hash value to a message queue of an intelligent contract, wherein the message queue takes the block height as a key and the hash value as a value;
s5, downloading the message queue of the intelligent contract according to the block height in sequence by the group members, searching the ciphertext array file from the distributed storage network through the hash value, finding the group communication public key of each group member, and decrypting by using the group communication private key of each group member to obtain the message.
The invention has the beneficial effects that: the establishment of the group is established through a decentralized block chain intelligent contract, and is different from the traditional social group establishment relying on centralized service facilities.
The group is established through the invitation code, the invention realizes the generation and verification of the invitation code by using the asymmetric encryption algorithm technology, invitees can not expose own block chain accounts with digital assets in the whole process so as to enhance the account safety,
when a group speaks, a message to be submitted is encrypted by using a communication public key on a group address book, so that a set of encrypted versions of the message sent to other users in the group is obtained, the set file is stored in a distributed storage network, the hash of the file is obtained, the user in any group can obtain an encrypted ciphertext by using the hash, namely, the communication data is stored on the distributed storage network, a group message queue is maintained through a data structure of a block chain intelligent contract, and the hash of the encrypted file of the message is maintained in the queue.
And (4) enabling the group members to exit the group, and utilizing the private key signature to submit to the intelligent contract to realize the elimination from the group address book, safely exiting the group and not receiving the messages in the group any more.
Meanwhile, the group establishment and maintenance can be independent of any centralized service facility as long as the blockchain exists and the intelligent contract can be executed.
Drawings
For ease of illustration, the present invention is described in detail by the following preferred embodiments and the accompanying drawings.
FIG. 1 is a schematic diagram of the establishment of a blockchain decentralized group according to the present invention;
fig. 2 is a timing diagram of establishment of a session and maintenance of an encrypted session based on a blockchain decentralized group according to the present invention, which explains how the session is securely established and maintained by encryption techniques.
Detailed Description
In order to make the implementation objects, technical solutions and features of the present application clearer, the technical solutions implemented by the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some examples of the present application, but not all implementation cases. The embodiments of the subject application, as generally described and illustrated in the figures herein, could be arranged and designed in a wide variety of different configurations.
Therefore, the detailed description of the embodiments provided in the present application is not intended to limit the scope of the claims of the present application, but is merely representative of particular embodiments of the present application. All other embodiments obtained by a person skilled in the art without any inventive step based on the embodiments in this application are within the scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
In the description of the present application, it is further noted that the terms group, communication session, session channel, communication channel, asymmetric encryption, smart contract are to be understood in a broad sense unless explicitly stated or limited otherwise. The specific meaning of the above terms in this application will be understood to be a specific case for those of ordinary skill in the art.
In view of this, the present embodiment provides a method for establishing a decentralized group based on a block chain, and the following describes the scheme provided by the embodiment of the present invention in detail:
first, referring to fig. 1 and 2, the method comprises the following steps:
s1, a group creator creates a communication group with any theme, describes the group by using a group keyword, sets configuration parameters of the group, and submits a block chain intelligent contract for realizing the group function, wherein the configuration parameters comprise the number of participants and the group name;
s2, the group creator uses the asymmetric encryption algorithm to generate a group of invitation code private keys as invitation codes, the invitation code private keys derive invitation code public keys through the asymmetric encryption algorithm, the group creator submits the group of invitation code public keys to an intelligent contract through an intelligent contract to establish a data structure of an invitation code array formed by invitechnologies { User0_ public key, User1 public key, User public key }, and simultaneously creates a data structure of a User public key list for group communication: user _ key _ list ({ [ Chat _ Pub ]: [ invite _ sign _ text ]), the public key is derived from the group communication private key which is independently generated and held by the group members for group communication; the signature information is the information obtained by the user signing the private key corresponding to the public key of the received invitation code; the asymmetric encryption algorithm can be an elliptic curve encryption algorithm or an RSA encryption algorithm;
s3, the group creator informs the invitee of the private key of the invitation code through a non-intelligent contract interaction way; non-intelligent contract interaction approaches include, but are not limited to, email, SMS, instant chat, voice chat tools
S4, invitee receives the invitation code private key, generates the group communication private key of the corresponding group communication usage, and then deduces the group communication public key by using the asymmetric encryption algorithm based on the group communication private key, which is used for the invitee to communicate with other group members after joining the group;
s5, the invitee signs the public key for group communication by the received invitation code private key and submits the public key to the intelligent contract;
s6, the intelligent contract receives the signature information submitted by the invitee, firstly verifies whether the signature information is signed by the invitation code private key through the invitation code public key, and after confirmation, the intelligent contract executes the following operations:
a) deleting the invitation code public key which is submitted by the invitee and has been verified to be used;
b) adding a group communication public key generated by an invitee into an invitee list in the intelligent contract, wherein the invitee list becomes a group address book at the moment;
and S7, other invitees join the group through the steps S3-S6 until the invitation codes are all used, and the public keys of the invitation codes are deleted after the user joins.
A method for maintaining a group encryption session through blockchain decentralization, comprising the steps of:
s1, after the invitee joins the group address book of the intelligent contract, the invitee enters into group chat, and before the group user X sends the message msg, the group address book of the intelligent contract is downloaded;
s2, performing asymmetric encryption calculation on the message one by one according to the group communication public key Chat _ Pub of each invitee in the group address book to obtain an encrypted ciphertext CryptoMsg ciphertext array file, wherein the data structure of the ciphertext array file is formed by the group communication public key Chat _ Pub-encrypted message CryptoMsg
sender: [ public key of user X ],
timestamp: [ current transmission Timestamp ],
Messagess:[
{
【Chat_Pub_0】: CryptoMsg0
},
......
{
【Chat_Pub_X】: CryptoMsgX
}
];
s3, submitting the obtained ciphertext array file to a distributed storage network, wherein IPFS is adopted in the embodiment;
s4, obtaining a hash value msgHash of a ciphertext array file in the distributed storage network, submitting the hash value msgHash to a message queue of an intelligent contract, wherein the message queue takes the block height as a key, and takes the hash value msgHash as a value:
{
[ Block height H ]: the msgHash0 is sent to the mobile station,
msgxHash1 [ height of the sector Hx ],
......
};
s5, the group members download the message queues of the intelligent contracts in sequence according to the block heights, the ciphertext array files are searched from the distributed storage network through the hash values, the group members try to decrypt the message ciphertexts sent to the group members at each height by using the group communication private keys of the group members, and the message plaintexts are obtained after decryption is successful.
The message of this embodiment may be plain text information, or a format file such as json or xml for describing a rich media format.
The invention has the beneficial effects that: different from the traditional social group establishment relying on centralized service facilities, the group establishment of the invention is established through a block chain intelligent contract
The group is established through an invitation code, the invention is characterized in that the generation and verification of the invitation code are realized by using an asymmetric encryption algorithm technology, invitees can enhance the safety of digital assets without exposing own account numbers with the digital assets in the whole process, meanwhile, when a group talks, messages to be submitted are encrypted by using public keys on a group address book, so that a set of encrypted versions of the messages sent to other users of the group is obtained, the set file is stored in a distributed storage network to obtain the hash of the file, the users in any group can obtain an encrypted ciphertext by using the hash, namely, the communication data of the invention is stored in the distributed storage network, a group message queue is maintained through a data structure of a block chain intelligent contract, and the hash of the encrypted file of the message is maintained in the queue.
The group members quit the group, and the group members can be removed from the group address book by submitting the intelligent contract with the private key signature, and the group members safely quit the group without receiving the information in the group.
Meanwhile, the group establishment and maintenance can be independent of any centralized service facility as long as the blockchain exists and the intelligent contract can be executed.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part. The block chain in the invention is not limited to a certain block chain, but comprises all block chains supporting the intelligent contract function, and the distributed storage network is not limited to a distributed storage network realized by a certain technology, but supports a storage network which is distributed and stored in file blocks and can be referred to by a unique hash value and utilize the hash value to access the file. The public key corresponding to the private key of the invention takes asymmetric encryption algorithms such as an elliptic algorithm and the like as an example of a derivation algorithm from the private key to the public key, and practically any algorithm meeting the following characteristics can be adopted:
1. the private key may derive the public key;
2. the public key can not directly derive the private key, or the deduction needs to be cracked and calculated resources which can not be met by a real production environment, so that the public key can not derive the private key;
3. the cipher text encrypted by the public key can be decrypted by the private key, and if the private key is not correct, the decryption operation cannot be completed;
4. the submitted information may be signed with the private key and the public key may be used to verify that the information is indeed an operation by the person holding the private key.
It is noted that terms such as communication session, session channel, communication channel, etc. are industry colloquial calls herein. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element recited by the phrase "comprising" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
The above description is only for various embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of changes or substitutions within the technical scope of the present application, and all such changes or substitutions are included in the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
Claims (1)
1. A method for maintaining a group encryption session based on block chain decentralized is characterized by comprising the following steps:
s1, after the invitee joins the group address book of the intelligent contract, the invitee enters into group chat, and before the group speaker sends the message, the group address book of the intelligent contract is downloaded;
s2, performing asymmetric encryption calculation on the messages one by one according to the group communication public key of each invitee in the group address book to obtain an encrypted ciphertext array file, wherein the data structure of the ciphertext array file is formed by the group communication public key-encrypted messages;
s3, submitting the obtained ciphertext array file to a distributed storage network;
s4, obtaining a hash value of a ciphertext array file in the distributed storage network, and submitting the hash value to a message queue of an intelligent contract, wherein the message queue takes the block height as a key and the hash value as a value;
s5, downloading the message queue of the intelligent contract according to the block height in sequence by the group members, searching the ciphertext array file from the distributed storage network through the hash value, finding the group communication public key of each group member, and decrypting by using the group communication private key of each group member to obtain the message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210420043.XA CN114726545A (en) | 2022-03-02 | 2022-03-02 | Block chain based decentralized group encryption session maintaining method |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210420043.XA CN114726545A (en) | 2022-03-02 | 2022-03-02 | Block chain based decentralized group encryption session maintaining method |
CN202210194819.0A CN114338046B (en) | 2022-03-02 | 2022-03-02 | Decentralized group establishing method based on block chain |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210194819.0A Division CN114338046B (en) | 2022-03-02 | 2022-03-02 | Decentralized group establishing method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114726545A true CN114726545A (en) | 2022-07-08 |
Family
ID=81030279
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210194819.0A Active CN114338046B (en) | 2022-03-02 | 2022-03-02 | Decentralized group establishing method based on block chain |
CN202210420043.XA Pending CN114726545A (en) | 2022-03-02 | 2022-03-02 | Block chain based decentralized group encryption session maintaining method |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210194819.0A Active CN114338046B (en) | 2022-03-02 | 2022-03-02 | Decentralized group establishing method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN114338046B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115334025A (en) * | 2022-10-12 | 2022-11-11 | 北京百度网讯科技有限公司 | Decentralized instant messaging method, decentralized instant messaging device, decentralized instant messaging equipment and storage medium |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100959074B1 (en) * | 2007-12-12 | 2010-05-20 | 한국전자통신연구원 | The security group creation and authentication on the p2p network |
CN106850195B (en) * | 2016-04-18 | 2020-05-19 | 中国科学院信息工程研究所 | Group key negotiation and communication method in instant communication |
CN110035002B (en) * | 2019-04-01 | 2021-09-10 | 达闼机器人有限公司 | Method for implementing instant messaging, terminal equipment and storage medium |
CN110264354B (en) * | 2019-05-31 | 2020-09-01 | 阿里巴巴集团控股有限公司 | Method and device for creating block chain account and verifying block chain transaction |
CN111669434B (en) * | 2020-05-18 | 2023-07-04 | 支付宝实验室(新加坡)有限公司 | Method, system, device and equipment for establishing communication group |
-
2022
- 2022-03-02 CN CN202210194819.0A patent/CN114338046B/en active Active
- 2022-03-02 CN CN202210420043.XA patent/CN114726545A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115334025A (en) * | 2022-10-12 | 2022-11-11 | 北京百度网讯科技有限公司 | Decentralized instant messaging method, decentralized instant messaging device, decentralized instant messaging equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN114338046B (en) | 2022-05-24 |
CN114338046A (en) | 2022-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11050563B2 (en) | Method of exchanging keys by smart contract implemented on a blockchain | |
US8972731B2 (en) | Systems, devices, and methods for securely transmitting a security parameter to a computing device | |
US7996673B2 (en) | System, method and computer product for sending encrypted messages to recipients where the sender does not possess the credentials of the recipient | |
CN109639828A (en) | Conversation message treating method and apparatus | |
EP2282442A1 (en) | Key distributing method, public key of key distribution centre online updating method and device | |
US20130246794A1 (en) | Systems, devices, and methods for securely transmitting a security parameter to a computing device | |
US20100268943A1 (en) | Method and System for Source Authentication in Group Communications | |
CN102484583A (en) | Ecure key management in multimedia communication system | |
CN113037499B (en) | Block chain encryption communication method and system | |
KR20080046593A (en) | System and method for secure record protocol using shared knowledge of mobile user credentials | |
CN110048849A (en) | A kind of session cipher negotiating method of multilayer protection | |
CN114338046B (en) | Decentralized group establishing method based on block chain | |
US10530581B2 (en) | Authenticated broadcast encryption | |
CN107104938B (en) | Method for establishing secure data exchange channel, client and computer readable medium | |
Valkonen et al. | Ad hoc security associations for groups | |
EP2239918B1 (en) | Systems, devices and methods for securely transmitting a security parameter to a computing device | |
CN113468580A (en) | Multi-party collaborative signature method and system | |
EP2239919B1 (en) | Systems, devices and methods for securely transmitting a security parameter to a computing device | |
CN116865970A (en) | Multiparty cooperative key generation and digital signature method and system based on national cryptographic algorithm | |
Sandoval et al. | Pakemail: authentication and key management in decentralized secure email and messaging via pake | |
CN112235320B (en) | Cipher-based video networking multicast communication method and device | |
EP4106264A1 (en) | System and method for performing secure key exchange | |
Shin et al. | A verifier-based password-authenticated key exchange using tamper-proof hardware | |
CN112235799B (en) | Network access authentication method and system for terminal equipment | |
Saxena et al. | BAS-VAS: A novel secure protocol for value added service delivery to mobile devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |