CN117220884A - Digital signature interactive verification method, system, equipment and medium - Google Patents
Digital signature interactive verification method, system, equipment and medium Download PDFInfo
- Publication number
- CN117220884A CN117220884A CN202311135857.XA CN202311135857A CN117220884A CN 117220884 A CN117220884 A CN 117220884A CN 202311135857 A CN202311135857 A CN 202311135857A CN 117220884 A CN117220884 A CN 117220884A
- Authority
- CN
- China
- Prior art keywords
- node
- digital signature
- credit
- server
- node server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 238000012795 verification Methods 0.000 title claims abstract description 48
- 230000002452 interceptive effect Effects 0.000 title claims abstract description 36
- 238000011156 evaluation Methods 0.000 claims description 41
- 230000008569 process Effects 0.000 claims description 18
- 230000001360 synchronised effect Effects 0.000 claims description 14
- 230000006399 behavior Effects 0.000 claims description 7
- 238000004590 computer program Methods 0.000 claims description 7
- 238000005266 casting Methods 0.000 claims description 5
- 230000000977 initiatory effect Effects 0.000 claims description 5
- 238000003780 insertion Methods 0.000 claims description 5
- 230000037431 insertion Effects 0.000 claims description 5
- 238000004422 calculation algorithm Methods 0.000 description 8
- 210000004556 brain Anatomy 0.000 description 7
- 238000004364 calculation method Methods 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 5
- 239000002699 waste material Substances 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000012545 processing Methods 0.000 description 2
- 230000001105 regulatory effect Effects 0.000 description 2
- 230000010076 replication Effects 0.000 description 2
- 230000003362 replicative effect Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002035 prolonged effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Landscapes
- Computer And Data Communications (AREA)
Abstract
The present disclosure relates to the field of digital signatures, and in particular, to a digital signature interactive verification method, system, device, and medium, where the method includes: writing the digital signature into a log queue in the master node server; if the determined leader node is a master node server, sending and executing the heartbeat of the leader node, and inserting the log queue into the tail of the log queue of the leader node by the master node server and synchronizing the log queue to a plurality of other node servers; if the heartbeat of the leading node is monitored, converting the main node server into a following node, and synchronizing the following node server to a plurality of other node servers in a log queue; and receiving the consensus results initiated by the plurality of other node servers, and if the received consensus results of the plurality of other node servers are consensus, transmitting the digital signature and the ciphertext data back to the signature proxy server. The present disclosure may reduce the probability of a leader node failing or being disconnected, reducing the occurrence of a reelect condition.
Description
Technical Field
The present disclosure relates to the field of digital signatures, and in particular, to a digital signature interactive verification method, system, device, and medium.
Background
Digital signature (Digital Signature, also known as public key digital signature) is a method that functions like a normal signature written on paper, but uses technology in the field of public key encryption for authenticating digital information. A set of digital signatures typically defines two complementary operations, one for signing and the other for verification. The user has a public key and a private key. Public key decryption (equivalent to verifying signature), public key can be released freely; the private key is encrypted (corresponding to the generation of the signature), and the private key is kept secret. In industries such as insurance, banking, electronic payment and the like, sensitive information such as user accounts, passwords, transaction accounts, transaction money, user information and the like is involved in the transaction process, and under the application scene, the application of a digital signature chain realized based on a blockchain technology is particularly needed.
The digital signature needs a public key and a private key, and usually the data exchange party needs to generate the public key and the private key under the same protocol, and the generated public key and the generated private key may have differences in different operating system environments of the data exchange party, so that differences can be generated on the issuing of the digital signature and the verification compatibility, and the data exchange fails. In addition, the implementation of the digital signature can be realized only by the validity consensus of each node server, and certain system resources are consumed in the process of verifying the validity consensus, for example, when a leader node is determined by using a Raft consensus algorithm, the problems of consumed system resources such as election and the like and increased digital signature waiting time are re-performed due to the occurrence of the situation of brain fracture or the like or the failure or disconnection of the leader node.
Disclosure of Invention
The disclosure provides a digital signature interactive verification method, a system, a device and a medium, which can solve the problems that the realization of a digital signature mentioned in the background technology needs to be realized by the validity consensus of each node server, certain system resources are consumed in the verification process of the validity consensus, for example, when a leader node is determined by using a Raft consensus algorithm, the leader node is subjected to fault or disconnection due to the occurrence of the situation of brain fracture or the like, the problem that the consumption of the system resources such as election is carried out again and the waiting time of the digital signature is prolonged. In order to solve the technical problems, the present disclosure provides the following technical solutions:
as an aspect of the embodiments of the present disclosure, there is provided a digital signature interactive verification method applied to a master node server, the node server including the master node server and a plurality of other node servers, including the steps of:
s10, acquiring the identity identification information of the user sent by the signature proxy server;
s20, acquiring a public and private key file uniquely corresponding to the identity identification information according to the identity identification information, wherein the public and private key file is prestored by a main node server and a plurality of other node servers according to the identity information of a user;
S30, carrying out asymmetric encryption on the identity identification information according to a public and private key file to obtain ciphertext data and a digital signature corresponding to the ciphertext data;
s40, writing the digital signature into a log queue in the master node server;
s50, if the determined leader node is a master node server, sending and executing heartbeats of the leader node, and inserting the log queue into the tail of the log queue of the leader node by the master node server and synchronizing the log queue to a plurality of other node servers; if the heartbeat of the leader node is monitored, converting the master node server into a following node, and sending a request for inserting the log queue into the tail of the log queue of the leader node, so that the leader node is synchronized to a plurality of other node servers, and executing S70 after the log queue is synchronized to the plurality of other node servers;
s60, if the master node server is not the leader node and the heartbeat of the leader node is not monitored within the time of overtime of election, initiating an election process, converting the master node server into a candidate state and casting a vote, then sending a RequestVote RPC message to request other node servers to participate in voting, receiving voting messages of the other node servers and counting the number of votes of each node server, determining the leader node according to the number of votes and credit coefficients corresponding to each node server in a chain credit scoring unit, and then executing the step S50; the on-chain credit scoring unit is arranged on each node server and shares a unified credit evaluation rule, and credit coefficients of each node server are calculated by using the credit evaluation rule based on historical behaviors of each node server;
S70, receiving a consensus result initiated by a plurality of other node servers, wherein the consensus result is that the plurality of other node servers judge whether the digital signature in the log queue is consistent with the user identity information in the public and private key files of the other node servers; if it is in agreement with the present one, the consensus result is consensus; if the two types of the data are inconsistent, the consensus result is that the consensus is not achieved;
s80, if the received consensus results of the plurality of other node servers are consensus, transmitting the digital signature and the ciphertext data back to the signature proxy server; if the received consensus result of the plurality of other node servers does not reach consensus, the signature verification failure information is returned to the signature proxy server.
Optionally, the credit rating rules include one or more of the following:
digital signature invalidation ratio: the number of the digital signature invalid proportion initiated by the node server discovered in the signature tracing process is the number, the fewer the digital signature invalid proportion is, the higher the credit coefficient is;
log consistency ratio: counting the log consistency in each node server, wherein the log consistency is the proportion consistent with other node servers, and the higher the log consistency proportion is, the higher the credit coefficient is;
Digital signature speed: the faster the node server completes the digital signature, the higher the credit coefficient;
outage probability: the lower the probability of a node server becoming disconnected or down, the higher the credit factor.
Optionally, determining the leader node according to the ticket number and the credit coefficient corresponding to each node server in the on-chain reputation scoring unit includes: and obtaining a credit voting value according to the product of the credit coefficient and the ticket number, and determining a node server with the highest credit voting value as a leading node.
Optionally, the credit evaluation rule includes a digital signature invalidation proportion, a log consistency proportion, a digital signature speed and a outage probability, wherein a credit coefficient ratio corresponding to the digital signature invalidation proportion and the log consistency proportion is higher than a credit coefficient ratio corresponding to the digital signature speed and the outage probability.
Optionally, the credit evaluation rule is expressed by the following formula:
F=A*Inv+B*Uni+C*Speed+D*Downtime,
wherein F is a credit coefficient, inv is a digital signature invalidation proportion, uni is a log consistency proportion, speed is a digital signature Speed, downtime is a outage probability, A, B, C, D is a proportionality constant, wherein A is 30-50%, B is 30-50%, C is 5-15%, and D is 5-15%.
Optionally, the credit evaluation rule is expressed by the following formula:
F=40%*Inv+40%*Uni+10%*Speed+10%*Downtime。
as another aspect of an embodiment of the present disclosure, there is provided a digital signature interactive verification system including:
the identity identification information receiving module is used for acquiring the identity identification information of the user sent by the signature proxy server;
the public and private key matching module is used for acquiring a public and private key file uniquely corresponding to the identity identification information according to the identity identification information, wherein the public and private key file is prestored by a main node server and a plurality of other node servers according to the identity information of a user;
the asymmetric encryption module performs asymmetric encryption on the identity identification information according to a public and private key file to obtain ciphertext data and a digital signature corresponding to the ciphertext data;
the log queue updating module writes the digital signature into a log queue in the master node server;
the log queue insertion module is used for sending and executing the heartbeat of the leader node if the determined leader node is the master node server, and the master node server is used for inserting the log queue into the tail of the log queue of the leader node and synchronizing the log queue to a plurality of other node servers; if the heartbeat of the leader node is monitored, converting the master node server into a following node, and sending a request for inserting the log queue into the tail of the log queue of the leader node, so that the leader node is synchronized to a plurality of other node servers, and executing S70 after the log queue is synchronized to the plurality of other node servers;
The leader node election module initiates an election process if the master node server is not the leader node and the heartbeat of the leader node is not monitored within the time of overtime of election, converts the master node server into a candidate state and throws a vote, then sends a RequestVoteRPC message to request other node servers to participate in voting, receives voting messages of the other node servers and counts the votes of each node server, determines the leader node according to the votes and the credit coefficient corresponding to each node server in the on-chain credit scoring unit, and then executes step S50; the on-chain credit scoring unit is arranged on each node server and shares a unified credit evaluation rule, and credit coefficients of each node server are calculated by using the credit evaluation rule based on historical behaviors of each node server;
the consensus result receiving module receives consensus results initiated by a plurality of other node servers, wherein the consensus results are that the plurality of other node servers judge whether the digital signature in the log queue is consistent with the user identity information in the public and private key files of the other node servers; if it is in agreement with the present one, the consensus result is consensus; if the two types of the data are inconsistent, the consensus result is that the consensus is not achieved;
The signature feedback module is used for transmitting the digital signature and the ciphertext data back to the signature proxy server if the received consensus results of the plurality of other node servers are consensus; if the received consensus result of the plurality of other node servers does not reach consensus, the signature verification failure information is returned to the signature proxy server.
Optionally, the leader node election module further comprises a credit evaluation module, wherein the credit evaluation module is used for obtaining a credit voting value according to the product of the credit coefficient and the ticket number, and a node server with the highest credit voting value is determined to be the leader node; wherein the credit factor depends on one or more of the following parameters:
digital signature invalidation ratio: the number of the digital signature invalid proportion initiated by the node server discovered in the signature tracing process is the number, the fewer the digital signature invalid proportion is, the higher the credit coefficient is;
log consistency ratio: counting the log consistency in each node server, wherein the log consistency is the proportion consistent with other node servers, and the higher the log consistency proportion is, the higher the credit coefficient is;
digital signature speed: the faster the node server completes the digital signature, the higher the credit coefficient;
Outage probability: the lower the probability of a node server becoming disconnected or down, the higher the credit factor.
The method and the system can combine intelligent contracts in a blockchain to define credit evaluation rules in a credit system, introduce the validity and log consistency in signature tracing of a digital signature, and reflect the system running speed and efficiency of a node server, and the probability of network disconnection and downtime, so that a leader node determined during digital signature interactive verification is good in the credit system, the probability of failure or disconnection of the leader node is reduced, and the occurrence of reelect is further reduced; meanwhile, a credit evaluation rule and ticket number combination mechanism is introduced, so that the problem that the number of node servers must adopt odd nodes can be avoided, the occurrence of brain fracture can be prevented, and the waste of calculation resources is avoided.
Drawings
FIG. 1 is a flow chart of a digital signature interactive verification method in embodiment 1;
fig. 2 is a block diagram of a digital signature interactive verification system in embodiment 2.
Detailed Description
Various exemplary embodiments, features and aspects of the disclosure will be described in detail below with reference to the drawings. In the drawings, like reference numbers indicate identical or functionally similar elements. Although various aspects of the embodiments are illustrated in the accompanying drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
The term "and/or" is herein merely an association relationship describing an associated object, meaning that there may be three relationships, e.g., a and/or B, may represent: a exists alone, A and B exist together, and B exists alone. In addition, the term "at least one" herein means any one of a plurality or any combination of at least two of a plurality, for example, including at least one of A, B, C, and may mean including any one or more elements selected from the group consisting of A, B and C.
Furthermore, numerous specific details are set forth in the following detailed description in order to provide a better understanding of the present disclosure. It will be understood by those skilled in the art that the present disclosure may be practiced without some of these specific details. In some instances, methods, means, elements, and circuits well known to those skilled in the art have not been described in detail in order not to obscure the present disclosure.
It will be appreciated that the above-mentioned method embodiments of the present disclosure may be combined with each other to form a combined embodiment without departing from the principle logic, and are limited to the description of the present disclosure.
In addition, the disclosure further provides a digital signature interactive verification method, a system, a device and a medium, and the above can be used for implementing any one of the digital signature interactive verification methods provided in the disclosure, and the corresponding technical scheme, description and corresponding description referring to the method section are not repeated.
The digital signature interactive verification method may be implemented by a computer or other digital signature based interactive verification system, for example, the method may be performed by a terminal device or a server or other processing device, where the terminal device may be a User Equipment (UE), a mobile device, a User terminal, a cellular phone, a cordless phone, a personal digital assistant (Personal Digital Assistant, PDA), a handheld device, a computing device, a vehicle-mounted device, a wearable device, etc. In some possible implementations, the digital signature interactive verification method may be implemented by way of a processor invoking computer readable instructions stored in a memory.
Example 1
As an aspect of the embodiments of the present disclosure, a digital signature interactive verification method, as shown in fig. 1, includes the steps of:
s10, acquiring the identity identification information of the user sent by the signature proxy server;
S20, acquiring a public and private key file uniquely corresponding to the identity identification information according to the identity identification information, wherein the public and private key file is prestored by a main node server and a plurality of other node servers according to the identity information of a user;
s30, carrying out asymmetric encryption on the identity identification information according to a public and private key file to obtain ciphertext data and a digital signature corresponding to the ciphertext data;
s40, writing the digital signature into a log queue in the master node server;
s50, if the determined leader node is a master node server, sending and executing heartbeats of the leader node, and inserting the log queue into the tail of the log queue of the leader node by the master node server and synchronizing the log queue to a plurality of other node servers; if the heartbeat of the leader node is monitored, converting the master node server into a following node, and sending a request for inserting the log queue into the tail of the log queue of the leader node, so that the leader node is synchronized to a plurality of other node servers, and executing S70 after the log queue is synchronized to the plurality of other node servers;
s60, if the master node server is not the leader node and the heartbeat of the leader node is not monitored within the time of overtime of election, initiating an election process, converting the master node server into a candidate state and casting a vote, then sending a RequestVoteRPC message to request other node servers to participate in voting, receiving voting messages of the other node servers and counting the number of votes of each node server, determining the leader node according to the number of votes and credit coefficients corresponding to each node server in a chain credit scoring unit, and then executing the step S50; the on-chain credit scoring unit is arranged on each node server and shares a unified credit evaluation rule, and credit coefficients of each node server are calculated by using the credit evaluation rule based on historical behaviors of each node server;
S70, receiving a consensus result initiated by a plurality of other node servers, wherein the consensus result is that the plurality of other node servers judge whether the digital signature in the log queue is consistent with the user identity information in the public and private key files of the other node servers; if it is in agreement with the present one, the consensus result is consensus; if the two types of the data are inconsistent, the consensus result is that the consensus is not achieved;
s80, if the received consensus results of the plurality of other node servers are consensus, transmitting the digital signature and the ciphertext data back to the signature proxy server; if the received consensus result of the plurality of other node servers does not reach consensus, the signature verification failure information is returned to the signature proxy server.
The embodiment of the disclosure can combine intelligent contracts in a blockchain to define credit evaluation rules in a credit system, introduce the validity and log consistency in signature tracing of a digital signature, and reflect the signature speed and outage and downtime probability of the system running speed and efficiency of a node server, so that a determined leader node is good in the credit system during digital signature interactive verification, thereby reducing the probability of failure or disconnection of the leader node and further reducing the occurrence of reelect conditions; meanwhile, a credit evaluation rule and ticket number combination mechanism is introduced, so that the problem that the number of node servers must adopt odd nodes can be avoided, the occurrence of brain fracture can be prevented, and the waste of calculation resources is avoided. The following describes the above steps in detail:
S10, acquiring the identity identification information of the user sent by the signature proxy server.
Wherein, the user initiates a signature request to the signature proxy server, and the request content comprises the data of the request signature, namely the identification information of the user. The identity identification information of the users is uniformly generated by a signature system in the signature proxy server through submitting information, and each user identity is unique and non-repudiated.
S20, acquiring a public and private key file uniquely corresponding to the identity identification information according to the identity identification information, wherein the public and private key file is prestored by a main node server and a plurality of other node servers according to the identity information of a user;
the signature proxy server has the functions of user identity registration and identification, identity verification and identity routing. The data is sent and routed through the network route, and the data of the user can be delivered to the node server corresponding to the identity of the user through the matching of the identity route and the network route. Thereby ensuring the integrity and security of the data transfer.
S30, carrying out asymmetric encryption on the identity identification information according to a public and private key file to obtain ciphertext data and a digital signature corresponding to the ciphertext data;
The node server acquires a public and private key file which is embedded in the node server in advance according to the identity identification information, the node server performs access identity authentication based on a PKI certificate system, and the public and private key file is embedded and stored in the node server of a user. The user can independently use the public and private keys and the node server to encrypt data, sign the identity of the data, and ensure the safety and the uniqueness.
By providing an encryption algorithm plug-in mode, asymmetric encryption and decryption of the data by the node server are realized. Such as encryption algorithm (SM 2/4, RSA), hash algorithm (SM 3, SHA 256), etc.
S40, writing the digital signature into a log queue in the master node server;
the digital signature is written into the log queue in the main node server, so that the digital signature can be conveniently communicated with the consensus modules in other node servers in the subsequent consensus operation, and the log of each node is ensured to be the same.
S50, if the determined leader node is a master node server, sending and executing heartbeats of the leader node, and inserting the log queue into the tail of the log queue of the leader node by the master node server and synchronizing the log queue to a plurality of other node servers; if the heartbeat of the leader node is monitored, converting the master node server into a following node, and sending a request for inserting the log queue into the tail of the log queue of the leader node, so that the leader node is synchronized to a plurality of other node servers, and executing S70 after the log queue is synchronized to the plurality of other node servers;
Any node server can only be in one of three states of a leader (leader node), a follower (node) and a candidate (candidate node) at the same time, and the leader node is responsible for managing replication logs, namely receiving requests from the node server, replicating the requests to the follower node, and telling the follower node when the log queue insertion requests can be processed. If the leader node fails or disconnects, the election is re-conducted.
In this embodiment, if no leader node is found after a certain time, the candidate state is switched to, and election is initiated. The candidate for the majority of tickets becomes the leader node. If the candidate node or the current leader node finds the updated leader, the following state is actively returned. I.e. as described in S60.
S60, if the master node server is not the leader node and the heartbeat of the leader node is not monitored within the time of overtime of election, initiating an election process, converting the master node server into a candidate state and casting a vote, then sending a RequestVote RPC message to request other node servers to participate in voting, receiving voting messages of the other node servers and counting the number of votes of each node server, determining the leader node according to the number of votes and credit coefficients corresponding to each node server in a chain credit scoring unit, and then executing the step S50; the on-chain credit scoring unit is arranged on each node server and shares a unified credit evaluation rule, and credit coefficients of each node server are calculated by using the credit evaluation rule based on historical behaviors of each node server;
As a preferred embodiment, the credit rating rules include one or more of the following:
digital signature invalidation ratio: the number of the digital signature invalid proportion initiated by the node server discovered in the signature tracing process is the number, the fewer the digital signature invalid proportion is, the higher the credit coefficient is;
log consistency ratio: counting the log consistency in each node server, wherein the log consistency is the proportion consistent with other node servers, and the higher the log consistency proportion is, the higher the credit coefficient is;
digital signature speed: the faster the node server completes the digital signature, the higher the credit coefficient;
outage probability: the lower the probability of a node server becoming disconnected or down, the higher the credit factor.
Preferably, determining the leader node according to the ticket number and the credit coefficient corresponding to each node server in the on-chain reputation scoring unit includes: and obtaining a credit voting value according to the product of the credit coefficient and the ticket number, and determining a node server with the highest credit voting value as a leading node. Therefore, the leader node determined during digital signature interactive verification is enabled to perform well in a credit system, so that the probability of faults or disconnection of the leader node is reduced, the occurrence of reelect conditions is further reduced, the problem that the number of node servers is required to adopt odd nodes due to the fact that a credit evaluation rule and a ticket number combining mechanism are introduced, the occurrence of brain fracture conditions can be prevented, and the waste of calculation resources is also avoided.
Preferably, the credit evaluation rule includes a digital signature invalidation proportion, a log consistency proportion, a digital signature speed and a outage probability, wherein the credit coefficient ratio corresponding to the digital signature invalidation proportion and the log consistency proportion is higher than the credit coefficient ratio corresponding to the digital signature speed and the outage probability. Since the application field of digital signatures is generally industries with high security requirements, such as banks, insurance and the like, and the security guarantee is to be optimized to the system performance, the security performance evaluation indexes, such as the invalid proportion of the digital signatures and the consistency proportion of the logs, are required to be weighted higher than the digital signature speed and the outage probability.
Preferably, the credit evaluation rule is expressed by the following formula:
F=A*Inv+B*Uni+C*Speed+D*Downtime,
wherein F is a credit coefficient, inv is a digital signature invalidation proportion, uni is a log consistency proportion, speed is a digital signature Speed, downtime is a outage probability, A, B, C, D is a proportionality constant, wherein A is 30-50%, B is 30-50%, C is 5-15%, and D is 5-15%. The following table shows:
credit factor ratio | Preference value | |
Digital signature invalidation scale | 30-50% | 40% |
Journal consistency ratio | 30-50% | 40% |
Digital signature speed | 5-15% | 10% |
Probability of network outage | 5-15% | 10% |
The numerical values and the preferred values in the table are verified preferred ranges or specific values, and of course, the values can be taken as other ratios, the example is not strictly limited, and as a preferred implementation, the credit evaluation rule is expressed by the following formula:
F=40%*Inv+40%*Uni+10%*Speed+10%*Downtime。
according to the embodiment, by combining intelligent contracts in a blockchain, credit evaluation rules in a credit system are regulated, validity and log consistency in signature tracing of a digital signature are introduced, signature speed reflecting system running speed and efficiency of a node server and outage and downtime probability are further realized, and therefore a leader node determined during digital signature interactive verification is good in the credit system, fault or disconnection probability of the leader node is reduced, and further occurrence of reelect conditions is reduced.
S70, receiving a consensus result initiated by a plurality of other node servers, wherein the consensus result is that the plurality of other node servers judge whether the digital signature in the log queue is consistent with the user identity information in the public and private key files of the other node servers; if it is in agreement with the present one, the consensus result is consensus; if the two types of the data are inconsistent, the consensus result is that the consensus is not achieved;
S80, if the received consensus results of the plurality of other node servers are consensus, transmitting the digital signature and the ciphertext data back to the signature proxy server; if the received consensus result of the plurality of other node servers does not reach consensus, the signature verification failure information is returned to the signature proxy server.
The validity of the digital signature can be confirmed when the consensus results are consensus according to the requirements on the security performance, but misjudgment is easy to be caused in the process, and the achievement proportion of the consensus results can be reasonably adjusted according to the situation.
Example 2
As another aspect of the embodiments of the present disclosure, there is also provided a digital signature interactive verification system 100, as shown in fig. 2, including:
the identity identification information receiving module 1 acquires the identity identification information of the user sent by the signature proxy server;
the public and private key matching module 2 is used for acquiring a public and private key file uniquely corresponding to the identity identification information according to the identity identification information, wherein the public and private key file is prestored by a main node server and a plurality of other node servers according to the identity information of a user;
the asymmetric encryption module 3 performs asymmetric encryption on the identity identification information according to a public and private key file to obtain ciphertext data and a digital signature corresponding to the ciphertext data;
The log queue updating module 4 writes the digital signature into a log queue in the master node server;
the log queue inserting module 5 is used for sending and executing the heartbeat of the leader node if the determined leader node is the master node server, and the master node server is used for inserting the log queue into the tail of the log queue of the leader node and synchronizing the log queue to a plurality of other node servers; if the heartbeat of the leader node is monitored, converting the master node server into a following node, and sending a request for inserting the log queue into the tail of the log queue of the leader node, so that the leader node is synchronized to a plurality of other node servers, and executing S70 after the log queue is synchronized to the plurality of other node servers;
the leader node election module 6, if the master node server is not the leader node and the heartbeat of the leader node is not monitored within the time of the election timeout, initiating an election process, converting the master node server into a candidate state and casting a vote, then sending a RequestVote RPC message to request other node servers to participate in voting, receiving the voting messages of the other node servers and counting the votes of each node server, determining the leader node according to the votes and the credit coefficient corresponding to each node server in the on-chain credit scoring unit, and then executing step S50; the on-chain credit scoring unit is arranged on each node server and shares a unified credit evaluation rule, and credit coefficients of each node server are calculated by using the credit evaluation rule based on historical behaviors of each node server;
The consensus result receiving module 7 receives consensus results initiated by a plurality of other node servers, wherein the consensus results are that the plurality of other node servers judge whether the digital signature in the log queue is consistent with the identity information of the user in the public and private key files of the other node servers; if it is in agreement with the present one, the consensus result is consensus; if the two types of the data are inconsistent, the consensus result is that the consensus is not achieved;
the signature feedback module 8 is used for transmitting the digital signature and the ciphertext data back to the signature proxy server if the received consensus results of the plurality of other node servers are consensus; if the received consensus result of the plurality of other node servers does not reach consensus, the signature verification failure information is returned to the signature proxy server.
The embodiment of the disclosure can combine intelligent contracts in a blockchain to define credit evaluation rules in a credit system, introduce the validity and log consistency in signature tracing of a digital signature, and reflect the signature speed and outage and downtime probability of the system running speed and efficiency of a node server, so that a determined leader node is good in the credit system during digital signature interactive verification, thereby reducing the probability of failure or disconnection of the leader node and further reducing the occurrence of reelect conditions; meanwhile, a credit evaluation rule and ticket number combination mechanism is introduced, so that the problem that the number of node servers must adopt odd nodes can be avoided, the occurrence of brain fracture can be prevented, and the waste of calculation resources is avoided. The following describes the above steps in detail:
In the identification information receiving module 1, a user initiates a signature request to a signature proxy server, and the requested content includes data of the requested signature, that is, identification information of the user. The identity identification information of the users is uniformly generated by a signature system in the signature proxy server through submitting information, and each user identity is unique and non-repudiated.
In the matching public and private key module 2, the signature proxy server has the functions of user identity registration and identification, identity verification and identity routing. The data is sent and routed through the network route, and the data of the user can be delivered to the node server corresponding to the identity of the user through the matching of the identity route and the network route. Thereby ensuring the integrity and security of the data transfer.
In the asymmetric encryption module 3, the node server obtains a public and private key file embedded in advance by the node server according to the identity identification information, the node server performs access identity authentication based on a PKI certificate system, and the public and private key file is embedded and stored on the node server of the user. The user can independently use the public and private keys and the node server to encrypt data, sign the identity of the data, and ensure the safety and the uniqueness.
By providing an encryption algorithm plug-in mode, asymmetric encryption and decryption of the data by the node server are realized. Such as encryption algorithm (SM 2/4, RSA), hash algorithm (SM 3, SHA 256), etc.
In the log queue updating module 4, the digital signature is written into the log queue in the master node server, so that the digital signature can be conveniently communicated with the consensus modules in other node servers in the subsequent consensus operation, and the log of each node is ensured to be the same.
In the log queue insertion module 5, any node server can only be in one of three states of a leader (leader node), a follower (node) and a candidate (candidate node) at the same time, and the leader node is responsible for managing the replication log, that is, receiving a request from the node server, replicating the request to the follower node, and telling the follower node when the log queue insertion requests can be processed. If the leader node fails or disconnects, the election is re-conducted.
In this embodiment, if no leader node is found after a certain time, the candidate state is switched to, and election is initiated. The candidate for the majority of tickets becomes the leader node. If the candidate node or the current leader node finds the updated leader, the following state is actively returned.
As a preferred embodiment, the credit rating rules include one or more of the following:
digital signature invalidation ratio: the number of the digital signature invalid proportion initiated by the node server discovered in the signature tracing process is the number, the fewer the digital signature invalid proportion is, the higher the credit coefficient is;
log consistency ratio: counting the log consistency in each node server, wherein the log consistency is the proportion consistent with other node servers, and the higher the log consistency proportion is, the higher the credit coefficient is;
digital signature speed: the faster the node server completes the digital signature, the higher the credit coefficient;
outage probability: the lower the probability of a node server becoming disconnected or down, the higher the credit factor.
Preferably, determining the leader node according to the ticket number and the credit coefficient corresponding to each node server in the on-chain reputation scoring unit includes: and obtaining a credit voting value according to the product of the credit coefficient and the ticket number, and determining a node server with the highest credit voting value as a leading node. Therefore, the leader node determined during digital signature interactive verification is enabled to perform well in a credit system, so that the probability of faults or disconnection of the leader node is reduced, the occurrence of reelect conditions is further reduced, the problem that the number of node servers is required to adopt odd nodes due to the fact that a credit evaluation rule and a ticket number combining mechanism are introduced, the occurrence of brain fracture conditions can be prevented, and the waste of calculation resources is also avoided.
Preferably, the credit evaluation rule includes a digital signature invalidation proportion, a log consistency proportion, a digital signature speed and a outage probability, wherein the credit coefficient ratio corresponding to the digital signature invalidation proportion and the log consistency proportion is higher than the credit coefficient ratio corresponding to the digital signature speed and the outage probability. Since the application field of digital signatures is generally industries with high security requirements, such as banks, insurance and the like, and the security guarantee is to be optimized to the system performance, the security performance evaluation indexes, such as the invalid proportion of the digital signatures and the consistency proportion of the logs, are required to be weighted higher than the digital signature speed and the outage probability.
Preferably, the credit evaluation rule is expressed by the following formula:
F=A*Inv+B*Uni+C*Speed+D*Downtime,
wherein F is a credit coefficient, inv is a digital signature invalidation proportion, uni is a log consistency proportion, speed is a digital signature Speed, downtime is a outage probability, A, B, C, D is a proportionality constant, wherein A is 30-50%, B is 30-50%, C is 5-15%, and D is 5-15%. The following table shows:
credit factor ratio | Preference value | |
Digital signature invalidation scale | 30-50% | 40% |
Journal consistency ratio | 30-50% | 40% |
Digital signature speed | 5-15% | 10% |
Probability of network outage | 5-15% | 10% |
The numerical values and the preferred values in the table are verified preferred ranges or specific values, and of course, the values can be taken as other ratios, the example is not strictly limited, and as a preferred implementation, the credit evaluation rule is expressed by the following formula:
F=40%*Inv+40%*Uni+10%*Speed+10%*Downtime。
according to the embodiment, by combining intelligent contracts in a blockchain, credit evaluation rules in a credit system are regulated, validity and log consistency in signature tracing of a digital signature are introduced, signature speed reflecting system running speed and efficiency of a node server and outage and downtime probability are further realized, and therefore a leader node determined during digital signature interactive verification is good in the credit system, fault or disconnection probability of the leader node is reduced, and further occurrence of reelect conditions is reduced.
The validity of the digital signature can be confirmed when the consensus results are consensus according to the requirements on the security performance, but misjudgment is easy to be caused in the process, and the achievement proportion of the consensus results can be reasonably adjusted according to the situation.
Example 3
The present embodiment provides an electronic device including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the digital signature interactive verification method in embodiment 1 when executing the computer program.
Embodiment 3 of the present disclosure is merely an example, and should not be construed as limiting the functionality and scope of use of the embodiments of the present disclosure.
The electronic device may be in the form of a general purpose computing device, which may be a server device, for example. Components of an electronic device may include, but are not limited to: at least one processor, at least one memory, a bus connecting different system components, including the memory and the processor.
The buses include a data bus, an address bus, and a control bus.
The memory may include volatile memory such as Random Access Memory (RAM) and/or cache memory, and may further include Read Only Memory (ROM).
The memory may also include program means having a set (at least one) of program modules including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
The processor executes various functional applications and data processing by running computer programs stored in the memory.
The electronic device may also communicate with one or more external devices (e.g., keyboard, pointing device, etc.). Such communication may be through an input/output (I/O) interface. And, the electronic device may also communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through a network adapter. The network adapter communicates with other modules of the electronic device via a bus. It should be appreciated that other hardware and/or software modules may be used in connection with an electronic device, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID (disk array) systems, tape drives, data backup storage systems, and the like.
It should be noted that although several units/modules or sub-units/modules of an electronic device are mentioned in the above detailed description, such a division is merely exemplary and not mandatory. Indeed, the features and functionality of two or more units/modules described above may be embodied in one unit/module in accordance with embodiments of the present application. Conversely, the features and functions of one unit/module described above may be further divided into ones that are embodied by a plurality of units/modules.
Example 4
A computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of the digital signature interactive verification method in embodiment 1.
More specifically, among others, readable storage media may be employed including, but not limited to: portable disk, hard disk, random access memory, read only memory, erasable programmable read only memory, optical storage device, magnetic storage device, or any suitable combination of the foregoing.
In a possible implementation, the disclosure may also be implemented in the form of a program product comprising program code for causing a terminal device to carry out the steps of implementing the digital signature interactive verification method as described in embodiment 1, when said program product is run on the terminal device.
Wherein the program code for carrying out the present disclosure may be written in any combination of one or more programming languages, which program code may execute entirely on the user device, partly on the user device, as a stand-alone software package, partly on the user device, partly on the remote device or entirely on the remote device.
Although embodiments of the present disclosure have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the disclosure, the scope of which is defined in the appended claims and their equivalents.
Claims (10)
1. The digital signature interactive verification method is applied to a main node server, wherein the node server comprises the main node server and a plurality of other node servers, and is characterized by comprising the following steps of:
s10, acquiring the identity identification information of the user sent by the signature proxy server;
s20, acquiring a public and private key file uniquely corresponding to the identity identification information according to the identity identification information, wherein the public and private key file is prestored by a main node server and a plurality of other node servers according to the identity information of a user;
S30, carrying out asymmetric encryption on the identity identification information according to a public and private key file to obtain ciphertext data and a digital signature corresponding to the ciphertext data;
s40, writing the digital signature into a log queue in the master node server;
s50, if the determined leader node is a master node server, sending and executing heartbeats of the leader node, and inserting the log queue into the tail of the log queue of the leader node by the master node server and synchronizing the log queue to a plurality of other node servers; if the heartbeat of the leader node is monitored, converting the master node server into a following node, and sending a request for inserting the log queue into the tail of the log queue of the leader node, so that the leader node is synchronized to a plurality of other node servers, and executing S70 after the log queue is synchronized to the plurality of other node servers;
s60, if the master node server is not the leader node and the heartbeat of the leader node is not monitored within the time of overtime of election, initiating an election process, converting the master node server into a candidate state and casting a vote, then sending a RequestVote RPC message to request other node servers to participate in voting, receiving voting messages of the other node servers and counting the number of votes of each node server, determining the leader node according to the number of votes and credit coefficients corresponding to each node server in a chain credit scoring unit, and then executing the step S50; the on-chain credit scoring unit is arranged on each node server and shares a unified credit evaluation rule, and credit coefficients of each node server are calculated by using the credit evaluation rule based on historical behaviors of each node server;
S70, receiving a consensus result initiated by a plurality of other node servers, wherein the consensus result is that the plurality of other node servers judge whether the digital signature in the log queue is consistent with the user identity information in the public and private key files of the other node servers; if it is in agreement with the present one, the consensus result is consensus; if the two types of the data are inconsistent, the consensus result is that the consensus is not achieved;
s80, if the received consensus results of the plurality of other node servers are consensus, transmitting the digital signature and the ciphertext data back to the signature proxy server; if the received consensus result of the plurality of other node servers does not reach consensus, the signature verification failure information is returned to the signature proxy server.
2. The digital signature interactive verification method as claimed in claim 1, wherein the credit evaluation rule includes one or more of the following:
digital signature invalidation ratio: the number of the digital signature invalid proportion initiated by the node server discovered in the signature tracing process is the number, the fewer the digital signature invalid proportion is, the higher the credit coefficient is;
log consistency ratio: counting the log consistency in each node server, wherein the log consistency is the proportion consistent with other node servers, and the higher the log consistency proportion is, the higher the credit coefficient is;
Digital signature speed: the faster the node server completes the digital signature, the higher the credit coefficient;
outage probability: the lower the probability of a node server becoming disconnected or down, the higher the credit factor.
3. The digital signature interactive verification method of claim 2, wherein determining a leader node based on the ticket number and a credit factor corresponding to each node server in the on-chain reputation scoring unit comprises: and obtaining a credit voting value according to the product of the credit coefficient and the ticket number, and determining a node server with the highest credit voting value as a leading node.
4. The digital signature interactive verification method according to claim 2, wherein the credit evaluation rule includes a digital signature invalidation ratio, a log consistency ratio, a digital signature speed and a outage probability, wherein a credit coefficient ratio corresponding to the digital signature invalidation ratio and the log consistency ratio is higher than a credit coefficient ratio corresponding to the digital signature speed and the outage probability.
5. A digital signature interactive verification method as claimed in any one of claims 2 to 4, wherein said credit rating rules are expressed by the following formula:
F=A*Inv+B*Uni+C*Speed+D*Downtime,
wherein F is a credit coefficient, inv is a digital signature invalidation proportion, uni is a log consistency proportion, speed is a digital signature Speed, downtime is a outage probability, A, B, C, D is a proportionality constant, wherein A is 30-50%, B is 30-50%, C is 5-15%, and D is 5-15%.
6. The digital signature interactive verification method as claimed in claim 5, wherein the credit evaluation rule is expressed by the following formula:
F=40%*Inv+40%*Uni+10%*Speed+10%*Downtime。
7. a digital signature interactive verification system, comprising:
the identity identification information receiving module is used for acquiring the identity identification information of the user sent by the signature proxy server;
the public and private key matching module is used for acquiring a public and private key file uniquely corresponding to the identity identification information according to the identity identification information, wherein the public and private key file is prestored by a main node server and a plurality of other node servers according to the identity information of a user;
the asymmetric encryption module performs asymmetric encryption on the identity identification information according to a public and private key file to obtain ciphertext data and a digital signature corresponding to the ciphertext data;
the log queue updating module writes the digital signature into a log queue in the master node server;
the log queue insertion module is used for sending and executing the heartbeat of the leader node if the determined leader node is the master node server, and the master node server is used for inserting the log queue into the tail of the log queue of the leader node and synchronizing the log queue to a plurality of other node servers; if the heartbeat of the leader node is monitored, converting the master node server into a following node, and sending a request for inserting the log queue into the tail of the log queue of the leader node, so that the leader node is synchronized to a plurality of other node servers, and executing S70 after the log queue is synchronized to the plurality of other node servers;
The leader node election module initiates an election process if the master node server is not the leader node and the heartbeat of the leader node is not monitored within the time of overtime of election, converts the master node server into a candidate state and throws a vote, then sends a RequestVote RPC message to request other node servers to participate in voting, receives voting messages of the other node servers and counts the votes of each node server, determines the leader node according to the votes and the credit coefficient corresponding to each node server in the on-chain credit scoring unit, and then executes step S50; the on-chain credit scoring unit is arranged on each node server and shares a unified credit evaluation rule, and credit coefficients of each node server are calculated by using the credit evaluation rule based on historical behaviors of each node server;
the consensus result receiving module receives consensus results initiated by a plurality of other node servers, wherein the consensus results are that the plurality of other node servers judge whether the digital signature in the log queue is consistent with the user identity information in the public and private key files of the other node servers; if it is in agreement with the present one, the consensus result is consensus; if the two types of the data are inconsistent, the consensus result is that the consensus is not achieved;
The signature feedback module is used for transmitting the digital signature and the ciphertext data back to the signature proxy server if the received consensus results of the plurality of other node servers are consensus; if the received consensus result of the plurality of other node servers does not reach consensus, the signature verification failure information is returned to the signature proxy server.
8. The digital signature interactive verification system as claimed in claim 7, wherein said leader node election module further comprises a credit evaluation module for obtaining a credit vote value based on a product of a credit coefficient and a ticket number, the node server having the highest credit vote value being determined as the leader node; wherein the credit factor depends on one or more of the following parameters:
digital signature invalidation ratio: the number of the digital signature invalid proportion initiated by the node server discovered in the signature tracing process is the number, the fewer the digital signature invalid proportion is, the higher the credit coefficient is;
log consistency ratio: counting the log consistency in each node server, wherein the log consistency is the proportion consistent with other node servers, and the higher the log consistency proportion is, the higher the credit coefficient is;
Digital signature speed: the faster the node server completes the digital signature, the higher the credit coefficient;
outage probability: the lower the probability of a node server becoming disconnected or down, the higher the credit factor.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the digital signature interactive verification method of any one of claims 1 to 7 when the computer program is executed by the processor.
10. A computer-readable storage medium, on which a computer program is stored, characterized in that the program, when executed by a processor, implements the digital signature interactive verification method of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311135857.XA CN117220884B (en) | 2023-09-05 | 2023-09-05 | Digital signature interactive verification method, device and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311135857.XA CN117220884B (en) | 2023-09-05 | 2023-09-05 | Digital signature interactive verification method, device and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117220884A true CN117220884A (en) | 2023-12-12 |
CN117220884B CN117220884B (en) | 2024-09-13 |
Family
ID=89036330
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311135857.XA Active CN117220884B (en) | 2023-09-05 | 2023-09-05 | Digital signature interactive verification method, device and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117220884B (en) |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160077936A1 (en) * | 2014-09-12 | 2016-03-17 | Facebook, Inc. | Failover mechanism in a distributed computing system |
WO2017109140A1 (en) * | 2015-12-22 | 2017-06-29 | Bigchaindb Gmbh | Decentralized, tamper-resistant, asset-oriented database system and method of recording a transaction |
CN107395353A (en) * | 2017-04-24 | 2017-11-24 | 阿里巴巴集团控股有限公司 | A kind of block chain common recognition method and device |
CN108848125A (en) * | 2018-05-22 | 2018-11-20 | 北京京东尚科信息技术有限公司 | The method and apparatus and storage medium of common recognition service are provided in block chain |
CN110430064A (en) * | 2017-03-30 | 2019-11-08 | 腾讯科技(深圳)有限公司 | Block catenary system, message treatment method and storage medium |
CN110569675A (en) * | 2019-09-18 | 2019-12-13 | 上海海事大学 | Multi-Agent transaction information protection method based on block chain technology |
CN111028902A (en) * | 2019-12-09 | 2020-04-17 | 天津开心生活科技有限公司 | Request processing method, device, equipment and medium based on node switching |
CN111062716A (en) * | 2019-11-29 | 2020-04-24 | 支付宝(杭州)信息技术有限公司 | Method and device for generating block chain signature data and block chain transaction initiating system |
CN111082943A (en) * | 2019-12-06 | 2020-04-28 | 西安电子科技大学 | Efficient block chain consensus method |
CN111241114A (en) * | 2020-01-07 | 2020-06-05 | 中国科学院信息工程研究所 | Intelligent service transaction block chain credit management method and system combining transaction and consensus |
CN111355810A (en) * | 2020-03-17 | 2020-06-30 | 重庆邮电大学 | Improved PBFT consensus method based on credit and voting mechanism |
CN111526186A (en) * | 2020-04-10 | 2020-08-11 | 河海大学 | Distributed server cluster configuration method based on Raft |
CN111953490A (en) * | 2020-08-31 | 2020-11-17 | 上海雷龙信息科技有限公司 | Digital signature method and system based on block chain technology |
US20200402073A1 (en) * | 2018-02-27 | 2020-12-24 | South China University Of Technology | Verifiable post-quantum electronic voting system and implementation method therefor |
CN112788137A (en) * | 2021-01-06 | 2021-05-11 | 平衡机器科技(深圳)有限公司 | Alliance chain consensus method based on RAFT algorithm |
CN114625489A (en) * | 2022-03-24 | 2022-06-14 | 阿里巴巴(中国)有限公司 | Access request response method and device and distributed system |
US20230033216A1 (en) * | 2020-06-22 | 2023-02-02 | Hangzhou Qulian Technology Co., Ltd. | Pipeline-friendly signature and verification method, device, and storage medium |
CN115834512A (en) * | 2022-11-14 | 2023-03-21 | 石河子大学 | Data sharing method, system, electronic equipment and storage medium |
US20230155843A1 (en) * | 2021-04-29 | 2023-05-18 | Swempire Co., Ltd. | Method and device for providing blockchain did-based certificate distribution service |
CN117097733A (en) * | 2023-05-05 | 2023-11-21 | 武汉理工大学 | RW-PBFT consensus algorithm based on reward and punishment strategy |
-
2023
- 2023-09-05 CN CN202311135857.XA patent/CN117220884B/en active Active
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160077936A1 (en) * | 2014-09-12 | 2016-03-17 | Facebook, Inc. | Failover mechanism in a distributed computing system |
WO2017109140A1 (en) * | 2015-12-22 | 2017-06-29 | Bigchaindb Gmbh | Decentralized, tamper-resistant, asset-oriented database system and method of recording a transaction |
CN110430064A (en) * | 2017-03-30 | 2019-11-08 | 腾讯科技(深圳)有限公司 | Block catenary system, message treatment method and storage medium |
CN107395353A (en) * | 2017-04-24 | 2017-11-24 | 阿里巴巴集团控股有限公司 | A kind of block chain common recognition method and device |
US20200402073A1 (en) * | 2018-02-27 | 2020-12-24 | South China University Of Technology | Verifiable post-quantum electronic voting system and implementation method therefor |
CN108848125A (en) * | 2018-05-22 | 2018-11-20 | 北京京东尚科信息技术有限公司 | The method and apparatus and storage medium of common recognition service are provided in block chain |
CN110569675A (en) * | 2019-09-18 | 2019-12-13 | 上海海事大学 | Multi-Agent transaction information protection method based on block chain technology |
CN111062716A (en) * | 2019-11-29 | 2020-04-24 | 支付宝(杭州)信息技术有限公司 | Method and device for generating block chain signature data and block chain transaction initiating system |
CN111082943A (en) * | 2019-12-06 | 2020-04-28 | 西安电子科技大学 | Efficient block chain consensus method |
CN111028902A (en) * | 2019-12-09 | 2020-04-17 | 天津开心生活科技有限公司 | Request processing method, device, equipment and medium based on node switching |
CN111241114A (en) * | 2020-01-07 | 2020-06-05 | 中国科学院信息工程研究所 | Intelligent service transaction block chain credit management method and system combining transaction and consensus |
CN111355810A (en) * | 2020-03-17 | 2020-06-30 | 重庆邮电大学 | Improved PBFT consensus method based on credit and voting mechanism |
CN111526186A (en) * | 2020-04-10 | 2020-08-11 | 河海大学 | Distributed server cluster configuration method based on Raft |
US20230033216A1 (en) * | 2020-06-22 | 2023-02-02 | Hangzhou Qulian Technology Co., Ltd. | Pipeline-friendly signature and verification method, device, and storage medium |
CN111953490A (en) * | 2020-08-31 | 2020-11-17 | 上海雷龙信息科技有限公司 | Digital signature method and system based on block chain technology |
CN112788137A (en) * | 2021-01-06 | 2021-05-11 | 平衡机器科技(深圳)有限公司 | Alliance chain consensus method based on RAFT algorithm |
US20230155843A1 (en) * | 2021-04-29 | 2023-05-18 | Swempire Co., Ltd. | Method and device for providing blockchain did-based certificate distribution service |
CN114625489A (en) * | 2022-03-24 | 2022-06-14 | 阿里巴巴(中国)有限公司 | Access request response method and device and distributed system |
CN115834512A (en) * | 2022-11-14 | 2023-03-21 | 石河子大学 | Data sharing method, system, electronic equipment and storage medium |
CN117097733A (en) * | 2023-05-05 | 2023-11-21 | 武汉理工大学 | RW-PBFT consensus algorithm based on reward and punishment strategy |
Non-Patent Citations (4)
Title |
---|
丁庭琛;陈世平;: "基于信用分级的PBFT共识算法改进方案", 计算机系统应用, no. 09, 15 September 2020 (2020-09-15), pages 259 - 263 * |
陆歌皓;谢莉红;李析禹;: "区块链共识算法对比研究", 计算机科学, no. 1, 15 June 2020 (2020-06-15), pages 342 - 349 * |
高迎;谭学程;: "DPOS共识机制的改进方案", 计算机应用研究, no. 10 * |
魏笑甜: "Fabric中PBFT共识机制的分析与改进", 中国优秀硕士论文电子期刊网, 15 June 2020 (2020-06-15), pages 138 - 509 * |
Also Published As
Publication number | Publication date |
---|---|
CN117220884B (en) | 2024-09-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11451400B2 (en) | Blockchain transaction method and apparatus | |
US11226952B2 (en) | Method, apparatus and electronic device for blockchain-based asset issuance | |
CN111837115B (en) | Shared blockchain data storage | |
US11153069B2 (en) | Data authentication using a blockchain approach | |
TWI720918B (en) | Consenus of shared blockchain data storage based on error correction code | |
TWI740575B (en) | Method, system and device for prioritizing shared blockchain data storage | |
US10693646B2 (en) | Event execution using a blockchain approach | |
CN111144881A (en) | Selective access to asset transfer data | |
WO2019118447A1 (en) | Decentralized database associating public keys and communications addresses | |
JP7004423B2 (en) | Data security of storage of shared blockchain data based on error correction code | |
WO2018194736A1 (en) | Anonymity and traceability of digital property transactions on a distributed transaction consensus network | |
US20200364212A1 (en) | System and method of supporting reflection of transactions between blockchain networks | |
CN111416709B (en) | Voting method, device, equipment and storage medium based on block chain system | |
CN110084600B (en) | Processing and verifying method, device, equipment and medium for resolution transaction request | |
CN111047314A (en) | Financial data processing method and system based on block chain | |
JP7192196B2 (en) | Network transaction verification method and system based on multiple nodes, and storage medium | |
US20230232222A1 (en) | User terminal, authentication terminal, registration terminal, management system and program | |
CN109948370A (en) | A kind of method for processing business based on block chain, device and electronic equipment | |
CN110708390A (en) | Data processing method, device, apparatus and medium based on inter-node data sharing | |
CN114331397A (en) | Information processing method, device, electronic equipment and storage medium | |
CN111209542B (en) | Authority management method and device, storage medium and electronic equipment | |
CN117220884B (en) | Digital signature interactive verification method, device and medium | |
CN113592645B (en) | Data verification method and device | |
CN111510306B (en) | Offline signature method and device based on block chain | |
CN114511321A (en) | Point-to-point based data processing method, system, computing device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |