JPWO2020065633A5 - - Google Patents
Download PDFInfo
- Publication number
- JPWO2020065633A5 JPWO2020065633A5 JP2021517870A JP2021517870A JPWO2020065633A5 JP WO2020065633 A5 JPWO2020065633 A5 JP WO2020065633A5 JP 2021517870 A JP2021517870 A JP 2021517870A JP 2021517870 A JP2021517870 A JP 2021517870A JP WO2020065633 A5 JPWO2020065633 A5 JP WO2020065633A5
- Authority
- JP
- Japan
- Prior art keywords
- user
- users
- key
- transaction
- group
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 claims 19
- 230000004044 response Effects 0.000 claims 8
- 238000004590 computer program Methods 0.000 claims 6
- 238000011084 recovery Methods 0.000 claims 4
- 230000005540 biological transmission Effects 0.000 claims 1
Claims (22)
前記1次ユーザの前記ユーザ・デバイスで、ユーザの前記グループ中のさらなるユーザに関係する管理デバイスからのメッセージに基づいて、前記トランザクション鍵をランダムに生成するステップであって、前記トランザクション鍵が、現在のトランザクションのパーミッションを処理することに関連し、前記メッセージが、少なくとも、前記さらなるユーザの公開鍵を含む、生成するステップと、
前記1次ユーザの前記ユーザ・デバイスで、前記トランザクション鍵を複数のサブ鍵に分割するステップであって、サブ鍵の数が、ユーザの前記数と同じである、分割するステップと、
前記1次ユーザの前記ユーザ・デバイスで、前記複数のサブ鍵の各々を、所与のサブ鍵に関連するユーザの前記グループ中の前記ユーザのうちの対応するユーザの公開鍵で暗号化するステップと、
前記複数の暗号化されたサブ鍵を、前記1次ユーザの前記ユーザ・デバイスから前記管理デバイスに送るステップと
を含む、鍵管理の方法。 obtaining, at a user device of a primary user for splitting transaction keys, a number of users in a group of users for managing said transaction keys and a first predetermined value, said obtaining, wherein a first predetermined value indicates a minimum number of users in said group of users for recovering said transaction key;
randomly generating, at the user device of the primary user, the transaction key based on messages from management devices related to further users in the group of users, wherein the transaction key is currently wherein the message includes at least the public key of the further user;
at the user device of the primary user , dividing the transaction key into a plurality of subkeys, wherein the number of subkeys is the same as the number of users;
at the user device of the primary user, encrypting each of the plurality of subkeys with the public key of the corresponding one of the users in the group of users associated with the given subkey; When,
and sending said plurality of encrypted subkeys from said user device of said primary user to said management device.
前記管理デバイスの証明、
前記さらなるユーザの前記公開鍵を検証するための署名情報、
前記さらなるユーザの識別情報、
前記さらなるユーザのマージされたデータのハッシュ値の署名情報、及び
前記メッセージの有効期間
のうちの少なくとも1つを示す、請求項1に記載の方法。 said message from said managed device relating to said further user comprising:
certification of said managed device;
signature information for verifying said public key of said further user;
identity of said further user;
2. The method of claim 1, indicating at least one of: signature information of a hash value of the merged data of said further user; and a validity period of said message.
前記管理デバイスの前記証明が有効であると決定したことに応答して、前記さらなるユーザの前記公開鍵の前記署名情報に基づいて、前記さらなるユーザの前記公開鍵が有効であるかどうかを決定するステップと、
前記さらなるユーザの前記公開鍵が有効であることに応答して、分割多項式を構築するための複数の乱数をランダムに生成するステップであって、乱数の数が、前記第1の所定の値と同じであり、前記分割多項式を構築するための前記複数の乱数が、前記トランザクション鍵を含む、生成するステップと
を含む、請求項3に記載の方法。 The step of randomly generating a transaction key includes:
Determining whether the public key of the additional user is valid based on the signature information of the public key of the additional user in response to determining that the certification of the managed device is valid. a step;
Randomly generating a plurality of random numbers for constructing a splitting polynomial in response to the public key of the further user being valid, the number of random numbers being equal to the first predetermined value; 4. The method of claim 3, wherein the plurality of random numbers for constructing the splitting polynomial are the same and include the transaction key.
ユーザの前記グループ中のユーザの前記数と、前記分割多項式を構築するための前記複数の乱数とに基づいて、前記複数のサブ鍵を決定するステップであって、前記複数のサブ鍵の各々が、第1のサブ鍵データと第2のサブ鍵データとを備える、決定するステップ
を含む、請求項4に記載の方法。 Dividing the transaction key into the plurality of subkeys comprises:
determining the plurality of subkeys based on the number of users in the group of users and the plurality of random numbers for constructing the splitting polynomial, wherein each of the plurality of subkeys is , comprising the first sub-key data and the second sub-key data.
前記サブ鍵に対応する前記ユーザの前記公開鍵と、前記さらなるユーザに関係する前記メッセージの有効期間とに基づいて、前記サブ鍵を暗号化するステップ
をさらに含む、請求項1に記載の方法。 The encrypting step comprises:
2. The method of claim 1, further comprising encrypting said subkey based on said public key of said user corresponding to said subkey and a validity period of said message relating to said further user.
ユーザが、ユーザの前記グループを編成するための編成1次ユーザとして決定されたことに応答して、前記管理デバイスに、ユーザの前記グループに関するグループ情報と、前記編成1次ユーザの前記ユーザ・デバイスの公開鍵と、前記編成1次ユーザの前記ユーザ・デバイスの秘密鍵で署名された前記署名データとを送るステップであって、前記グループ情報が、少なくとも、ユーザの前記グループ中のユーザの前記数と、前記第1の所定の値とを含む、送るステップと
をさらに含む、請求項1に記載の方法。 responsive to determining that the signature data from the management device is valid, signing the signature data based on a preset private key at the user device, wherein the signature data is at least , including a random number signed by the managed device;
responsive to a user being determined as an organizing primary user for organizing the group of users, providing to the managing device group information about the group of users and the user device of the organizing primary user; and the signature data signed with the private key of the user device of the organized primary user, wherein the group information is at least the number of users in the group of users and the first predetermined value.
ユーザの前記グループからのユーザが、トランザクション鍵を復元するための復元ユーザとして決定されたことに応答して、前記復元ユーザのユーザ・デバイスにおいて、前記トランザクション鍵を復元するための管理デバイスからの復元メッセージを取得するステップであって、前記復元メッセージが、少なくとも、ユーザの前記グループ中の確認ユーザの数と、前記復元ユーザの識別情報とを示し、前記確認ユーザが、現在のトランザクションを承認する、取得するステップと、
確認ユーザの前記数が、第1の所定の値よりも大きいか又はそれに等しいと決定したことに応答して、前記管理デバイスから取得された前記確認ユーザのサブ鍵に基づいて前記トランザクション鍵を決定するステップであって、前記確認ユーザの前記サブ鍵が、事前に前記トランザクション鍵を分割することによって生成された、決定するステップと、
前記決定されたトランザクション鍵に基づいて、前記現在のトランザクションについてのトランザクション要求に署名するステップと
を含む、方法。 A method of key management between groups of users, comprising:
Restoring from a managed device to restore the transaction key at a user device of the restoring user in response to a user from the group of users being determined as a restoring user for restoring the transaction key. obtaining a message, wherein the restored message indicates at least the number of confirming users in the group of users and the identifying information of the restoring users, the confirming users approving the current transaction; a step of obtaining;
Determining the transaction key based on the subkeys of the confirming users obtained from the management device in response to determining that the number of confirming users is greater than or equal to a first predetermined value. determining that the subkeys of the verifying user were generated by previously dividing the transaction key;
and signing a transaction request for the current transaction based on the determined transaction key.
前記現在のトランザクションに関連する現在のトランザクション乱数、
前記復元ユーザの公開鍵で署名された、前記確認ユーザの前記サブ鍵及び前記現在のトランザクション乱数、
前記確認ユーザの署名情報、
前記管理デバイスの証明、並びに
前記復元メッセージのハッシュ値の署名情報
のうちの少なくとも1つをさらに示す、請求項9に記載の方法。 The restoration message is
a current transaction random number associated with said current transaction;
said subkey of said verifying user and said current transaction random number signed with said restoring user's public key;
signature information of said verifying user;
10. The method of claim 9, further indicating at least one of: a certificate of the managed device; and signature information of a hash value of the restored message.
管理デバイスにおいて、前記編成1次ユーザのユーザ・デバイスからユーザの前記グループに関するグループ情報を取得するステップであって、前記グループ情報が、少なくとも、ユーザの前記グループ中のユーザの数と、第1の所定の値とを示し、前記第1の所定の値が、トランザクション鍵を復元するためのユーザの最小数を示し、ユーザの前記グループが、前記トランザクション鍵を管理するために使用される、取得するステップと、
前記トランザクション鍵を分割するための前記1次ユーザのユーザ・デバイスにメッセージを送るステップであって、前記メッセージが、前記トランザクション鍵を分割するための前記1次ユーザ以外のユーザの前記グループ中の前記ユーザのうちの第1のユーザに関係し、前記メッセージが、少なくとも、前記ユーザのうちの前記第1のユーザの公開鍵を示す、送るステップと、
前記トランザクション鍵を分割するための前記1次ユーザからの複数のサブ鍵を取得するステップであって、サブ鍵の数が、ユーザの前記グループ中のユーザの前記数と同じであり、前記複数のサブ鍵が、前記トランザクション鍵をランダムに生成することと、次いで、前記トランザクション鍵を分割することとによって、前記トランザクション鍵を分割するための前記1次ユーザによって生成され、前記複数のサブ鍵が、それぞれのユーザの公開鍵で暗号化される、取得するステップと、
前記それぞれのユーザに送るために前記複数のサブ鍵をキャッシュするステップと
を含む、方法。 A method of key management involving a group of users, wherein said group of users includes an organizing primary user for creating said group of users and a primary user for dividing transaction keys. teeth,
obtaining, at a management device, group information about the group of users from user devices of the organized primary users, wherein the group information comprises at least a number of users in the group of users; a predetermined value, wherein the first predetermined value indicates a minimum number of users for recovering a transaction key, and the group of users is used to manage the transaction key; a step;
sending a message to a user device of said primary user for splitting said transaction key, said message being said in said group of users other than said primary user for splitting said transaction key. sending, wherein said message relates to a first of said users and wherein said message indicates at least a public key of said first of said users;
obtaining a plurality of subkeys from the primary user for splitting the transaction key, wherein the number of subkeys is the same as the number of users in the group of users, and the plurality of a subkey is generated by the primary user for splitting the transaction key by randomly generating the transaction key and then splitting the transaction key, the plurality of subkeys comprising: obtaining, encrypted with the respective user's public key;
and C. caching said plurality of subkeys for transmission to said respective users.
前記編成1次ユーザと前記トランザクション鍵を分割するための前記1次ユーザとのうちの少なくとも1つ、及び
前記トランザクション鍵を復元するための復元ユーザ
のうちの少なくとも1つを指定するか又はランダムに決定するステップ
をさらに含む、請求項14に記載の方法。 In said group of users,
at least one of the organized primary user and the primary user for splitting the transaction key, and at least one of a recovery user for recovering the transaction key, either designated or randomly 15. The method of claim 14, further comprising determining.
ユーザの前記グループ中の各確認ユーザのサブ鍵を取得するステップであって、前記確認ユーザが、前記現在のトランザクションを承認し、前記確認ユーザの前記サブ鍵が、前記復元ユーザの公開鍵で署名される、取得するステップと、
前記現在のトランザクションについての条件が満たされると決定したことに応答して、前記復元ユーザに、前記トランザクション鍵を復元するための復元メッセージを送るステップと
をさらに含む、請求項15に記載の方法。 responsive to receiving a request for a current transaction, sending transaction information to users of the group of users for determining whether the current transaction is approved; indicates at least the transaction content of the current transaction and the identity of the restoring user;
obtaining a subkey of each verifying user in said group of users, wherein said verifying user approves said current transaction and said subkey of said verifying user is signed with said restoring user's public key. a step of obtaining
16. The method of claim 15, further comprising sending a recovery message to the recovery user to recover the transaction key in response to determining that a condition for the current transaction is met.
前記ユーザ・デバイスからの署名データに基づいて、前記ユーザ・デバイスが有効であるかどうかを決定するステップであって、前記署名データは、前記管理デバイスが有効であると決定したことに応答して、前記ユーザ・デバイスにおいてプリセットされた秘密鍵に基づいて、前記ユーザ・デバイスによって前記乱数に署名することによって生成される、決定するステップと、
ユーザの前記グループ中の各ユーザのユーザ・デバイスが有効であると決定したことに応答して、ユーザの前記グループが有効であると決定するステップと
をさらに含む、請求項14に記載の方法。 sending signature data of said managed device to said user devices in response to registration requests from user devices of users in said group of users, said signature data being at least signed by said managed device; sending the random number;
determining whether the user device is valid based on signature data from the user device, the signature data being received in response to determining that the managed device is valid; , generated by signing the random number by the user device based on a private key preset in the user device;
15. The method of claim 14, further comprising determining that the group of users is valid in response to determining that a user device of each user in the group of users is valid.
1つ又は複数のコンピュータ・プログラムを記憶するように構成されたメモリと、
前記メモリに結合され、前記デバイスに請求項1から13までのいずれか一項に記載の方法を実施させるために前記1つ又は複数のコンピュータ・プログラムを実行するように構成された、処理ユニットと
を備える、ユーザ・デバイス。 A user device for key management,
a memory configured to store one or more computer programs;
a processing unit coupled to the memory and configured to execute the one or more computer programs to cause the device to perform the method of any one of claims 1 to 13; A user device comprising:
1つ又は複数のコンピュータ・プログラムを記憶するように構成されたメモリと、
前記メモリに結合され、前記デバイスに請求項14から18までのいずれか一項に記載の方法を実施させるために前記1つ又は複数のコンピュータ・プログラムを実行するように構成された、処理ユニットと
を備える、管理デバイス。 A management device for key management,
a memory configured to store one or more computer programs;
a processing unit coupled to the memory and configured to execute the one or more computer programs to cause the device to perform the method of any one of claims 14 to 18; A managed device, comprising:
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811161190.XA CN109194465B (en) | 2018-09-30 | 2018-09-30 | Method for managing keys, user equipment, management device and storage medium |
CN201811161190.X | 2018-09-30 | ||
PCT/IB2019/058292 WO2020065633A1 (en) | 2018-09-30 | 2019-09-30 | Method, user device, management device, storage medium and computer program product for key management |
Publications (3)
Publication Number | Publication Date |
---|---|
JP2022501971A JP2022501971A (en) | 2022-01-06 |
JPWO2020065633A5 true JPWO2020065633A5 (en) | 2022-10-07 |
JP7454564B2 JP7454564B2 (en) | 2024-03-22 |
Family
ID=64946482
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2021517870A Active JP7454564B2 (en) | 2018-09-30 | 2019-09-30 | Methods, user devices, management devices, storage media and computer program products for key management |
Country Status (6)
Country | Link |
---|---|
US (1) | US11930103B2 (en) |
EP (1) | EP3841702B1 (en) |
JP (1) | JP7454564B2 (en) |
CN (1) | CN109194465B (en) |
SG (1) | SG11202102740VA (en) |
WO (1) | WO2020065633A1 (en) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109818754B (en) * | 2019-02-28 | 2022-07-05 | 矩阵元技术(深圳)有限公司 | Method and equipment for generating keys for multiple clients and single server by client |
CN109818753B (en) * | 2019-02-28 | 2022-03-08 | 矩阵元技术(深圳)有限公司 | Method and equipment for generating key for multiple clients and multiple servers by one client |
CN110009346A (en) * | 2019-03-11 | 2019-07-12 | 巍乾全球技术有限责任公司 | For splitting and restoring method, program product, storage medium and the system of key |
US11606361B2 (en) * | 2019-07-19 | 2023-03-14 | Ricoh Company, Ltd. | Cloud system, information processing system, and user registration method |
CN110399745A (en) * | 2019-08-16 | 2019-11-01 | 微位(深圳)网络科技有限公司 | The management method and device, storage medium and computer equipment of key |
CN111641604B (en) * | 2020-05-16 | 2022-04-15 | 中信银行股份有限公司 | Signing method based on online banking certificate and signing system based on online banking certificate |
CN111726230B (en) * | 2020-05-22 | 2023-04-18 | 支付宝(杭州)信息技术有限公司 | Data storage method, data recovery method, device and equipment |
CN112463454B (en) * | 2020-12-04 | 2021-11-05 | 北京深思数盾科技股份有限公司 | Data recovery method, server, terminal device and storage medium |
CN112671789B (en) * | 2020-12-29 | 2022-09-27 | 杭州趣链科技有限公司 | Data transmission optimization method, device and system based on Chinese remainder theorem |
CN112926074B (en) * | 2021-03-26 | 2022-08-23 | 成都卫士通信息产业股份有限公司 | SM9 key thresholding generation method, device, equipment and storage medium |
CN117349895B (en) * | 2023-12-05 | 2024-03-01 | 北京极致车网科技有限公司 | Block chain-based automobile financial digital archive management method and device |
Family Cites Families (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1192834A (en) | 1995-06-05 | 1998-09-09 | 塞特科有限公司 | Multi-step digital signature method and system |
JP2000039841A (en) | 1998-07-24 | 2000-02-08 | Nippon Telegr & Teleph Corp <Ntt> | Secret key dispersion method and program recording medium |
AU6278299A (en) | 1998-10-01 | 2000-04-17 | University Of Maryland | Distributed shared key generation and management using fractional keys |
JP2004363724A (en) * | 2003-06-02 | 2004-12-24 | Toshiba Corp | Reception management apparatus, broadcast receiver, information distributor, and information distribution method and program |
US20070016791A1 (en) * | 2005-07-14 | 2007-01-18 | Smita Bodepudi | Issuing a command and multiple user credentials to a remote system |
CN100550726C (en) | 2005-10-19 | 2009-10-14 | 华为技术有限公司 | A kind of distribution type dynamic secret key management method |
JP4798796B2 (en) | 2006-09-11 | 2011-10-19 | Kddi株式会社 | Data protection method, client device, and program for providing confidentiality and restoration of data |
JP2008103936A (en) | 2006-10-18 | 2008-05-01 | Toshiba Corp | Secret information management device, and secret information management system |
JP5103095B2 (en) | 2007-08-28 | 2012-12-19 | Kddi株式会社 | Key generation device, terminal device, storage server, and computer program |
US8855318B1 (en) * | 2008-04-02 | 2014-10-07 | Cisco Technology, Inc. | Master key generation and distribution for storage area network devices |
CN101420300B (en) * | 2008-05-28 | 2013-05-29 | 北京易恒信认证科技有限公司 | Double factor combined public key generating and authenticating method |
US8520854B2 (en) | 2008-08-28 | 2013-08-27 | Red Hat, Inc. | Sharing a secret using polynomials over polynomials |
US7995765B2 (en) | 2008-08-28 | 2011-08-09 | Red Hat, Inc. | Sharing a secret using hyperplanes over GF(q) |
CN101425902A (en) * | 2008-11-12 | 2009-05-06 | 电子科技大学 | Threshold digital signature method and system having forward security |
CN101753298A (en) * | 2008-12-09 | 2010-06-23 | 姚锡根 | Dynamically inputting hashing sequence DIHS |
CN101546407B (en) * | 2009-02-11 | 2012-04-25 | 广州杰赛科技股份有限公司 | Electronic commerce system and management method thereof based on digital certificate |
US8713329B2 (en) | 2009-02-26 | 2014-04-29 | Red Hat, Inc. | Authenticated secret sharing |
US9100186B2 (en) * | 2011-03-07 | 2015-08-04 | Security First Corp. | Secure file sharing method and system |
CN102170356B (en) * | 2011-05-10 | 2013-12-04 | 北京联合智华微电子科技有限公司 | Authentication system realizing method supporting exclusive control of digital signature key |
CN103856477B (en) * | 2012-12-06 | 2018-01-02 | 阿里巴巴集团控股有限公司 | A kind of credible accounting system and corresponding authentication method and equipment |
US10796302B2 (en) | 2014-04-23 | 2020-10-06 | Minkasu, Inc. | Securely storing and using sensitive information for making payments using a wallet application |
WO2016068941A1 (en) * | 2014-10-30 | 2016-05-06 | Hewlett Packard Enterprise Development Lp | Secure transactions in a memory fabric |
US9413735B1 (en) | 2015-01-20 | 2016-08-09 | Ca, Inc. | Managing distribution and retrieval of security key fragments among proxy storage devices |
US10644885B2 (en) | 2015-07-14 | 2020-05-05 | Fmr Llc | Firmware extension for secure cryptocurrency key backup, restore, and transaction signing platform apparatuses, methods and systems |
CN107086908B (en) * | 2016-02-15 | 2021-07-06 | 阿里巴巴集团控股有限公司 | Quantum key distribution method and device |
GB2561729A (en) | 2016-02-23 | 2018-10-24 | Nchain Holdings Ltd | Secure multiparty loss resistant storage and transfer of cryptographic keys for blockchain based systems in conjunction with a wallet management system |
CN106027245B (en) * | 2016-07-22 | 2019-05-07 | 中国工商银行股份有限公司 | Key sharing method and device |
WO2018027059A1 (en) * | 2016-08-03 | 2018-02-08 | KryptCo, Inc. | Systems and methods for delegated cryptography |
DE102016115193A1 (en) * | 2016-08-16 | 2018-02-22 | Fujitsu Technology Solutions Intellectual Property Gmbh | Method for secure data storage in a computer network |
CN107959566A (en) * | 2016-10-14 | 2018-04-24 | 阿里巴巴集团控股有限公司 | Quantal data key agreement system and quantal data cryptographic key negotiation method |
WO2019143850A1 (en) * | 2018-01-17 | 2019-07-25 | Medici Ventures, Inc. | Multi-approval system using m of n keys to generate a transaction address |
CN110084068B (en) * | 2018-01-26 | 2023-09-29 | 阿里巴巴集团控股有限公司 | Block chain system and data processing method for block chain system |
US20200013052A1 (en) * | 2018-07-05 | 2020-01-09 | Esmart Tech, Inc. | Offline cryptocurrency wallet with secure key management |
-
2018
- 2018-09-30 CN CN201811161190.XA patent/CN109194465B/en active Active
-
2019
- 2019-09-30 WO PCT/IB2019/058292 patent/WO2020065633A1/en unknown
- 2019-09-30 EP EP19782745.4A patent/EP3841702B1/en active Active
- 2019-09-30 SG SG11202102740VA patent/SG11202102740VA/en unknown
- 2019-09-30 US US17/250,837 patent/US11930103B2/en active Active
- 2019-09-30 JP JP2021517870A patent/JP7454564B2/en active Active
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10979231B2 (en) | Cross-chain authentication method, system, server, and computer-readable storage medium | |
CN111130757B (en) | Multi-cloud CP-ABE access control method based on block chain | |
CN110213042B (en) | Cloud data deduplication method based on certificate-free proxy re-encryption | |
US10439804B2 (en) | Data encrypting system with encryption service module and supporting infrastructure for transparently providing encryption services to encryption service consumer processes across encryption service state changes | |
Wang et al. | Enabling public verifiability and data dynamics for storage security in cloud computing | |
US8196186B2 (en) | Security architecture for peer-to-peer storage system | |
US8627424B1 (en) | Device bound OTP generation | |
WO2021047012A1 (en) | Token-based identity verification method and related device | |
US20110276490A1 (en) | Security service level agreements with publicly verifiable proofs of compliance | |
US9749130B2 (en) | Distributing keys for decrypting client data | |
CN108173648B (en) | Digital security processing method, device and storage medium based on private key escrow | |
CN109379343B (en) | Heterogeneous consensus method of block chains and terminal | |
WO2010091565A1 (en) | Random encryption method in need of using exhaustive method decryption | |
CN107920052B (en) | Encryption method and intelligent device | |
CN108199847B (en) | Digital security processing method, computer device, and storage medium | |
Thangavel et al. | Enabling ternary hash tree based integrity verification for secure cloud data storage | |
WO2021042851A1 (en) | Data signature method and device for use in blockchain, computer apparatus, and storage medium | |
CN111327629B (en) | Identity verification method, client and server | |
CN110233850B (en) | Registration method, application server, user side and system based on alliance chain | |
JPWO2020065633A5 (en) | ||
CN111639357A (en) | Encryption network disk system and authentication method and device thereof | |
CN112035574A (en) | Private data distributed storage method based on block chain technology | |
Fan et al. | Enhancing cloud storage security against a new replay attack with an efficient public auditing scheme | |
CN112463454B (en) | Data recovery method, server, terminal device and storage medium | |
CN110784318B (en) | Group key updating method, device, electronic equipment, storage medium and communication system |