[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Zhang et al., 2022 - Google Patents

Multi-party electronic contract signing protocol based on blockchain

Zhang et al., 2022

View PDF
Document ID
16185798435681164652
Author
Zhang T
Wang Y
Ding Y
Wu Q
Liang H
Wang H
Publication year
Publication venue
IEICE TRANSACTIONS on Information and Systems

External Links

Snippet

With the development of Internet technology, the demand for signing electronic contracts has been greatly increased. The electronic contract generated by the participants in an online way enjoys the same legal effect as paper contract. The fairness is the key issue in jointly …
Continue reading at www.jstage.jst.go.jp (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/16Arrangements for providing special services to substations contains provisionally no documents
    • H04L12/18Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast
    • H04L12/1813Arrangements for providing special services to substations contains provisionally no documents for broadcast or conference, e.g. multicast for computer conferences, e.g. chat rooms
    • H04L12/1822Conducting the conference, e.g. admission, detection, selection or grouping of participants, correlating users to one or more conference sessions, prioritising transmission
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3265Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate chains, trees or paths; Hierarchical trust model
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/76Proxy, i.e. using intermediary entity to perform cryptographic operations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Similar Documents

Publication Publication Date Title
Wang et al. Blockchain based data integrity verification for large-scale IoT data
CN112491846B (en) Cross-chain block chain communication method and device
US11979493B2 (en) Methods and systems to establish trusted peer-to-peer communications between nodes in a blockchain network
JP2023109981A (en) Computer-implemented system and method for authorizing blockchain transaction with low-entropy password
JP7190481B2 (en) Computer-Implemented Systems and Methods Enabling Secure Storage of Large Blockchains Across Multiple Storage Nodes
Li et al. Synchronized provable data possession based on blockchain for digital twin
WO2023115850A1 (en) Consortium blockchain consensus identity authentication method
Zhang et al. Multi-party electronic contract signing protocol based on blockchain
CN114710275B (en) Cross-domain authentication and key negotiation method based on blockchain in Internet of things environment
Ji et al. Flexible identity-based remote data integrity checking for cloud storage with privacy preserving property
CN111010285B (en) SM2 two-party collaborative signature method and medium suitable for lightweight client
CN113676333A (en) Method for generating SM2 blind signature through cooperation of two parties
CN111566680A (en) Block chain with message credentials
CN115174091A (en) Homomorphic encryption privacy protection method for distributed digital identity
Mu et al. An identity privacy scheme for blockchain‐based on edge computing
Vishwakarma et al. Crossledger: A pioneer cross-chain asset transfer protocol
Fan et al. An Anonymous Authentication Scheme with Low Overhead for Cross-Domain IoT
Rowland et al. Optimized Communication in Sharded Blockchain Networks
Dai et al. Blockchain for IoT Scenarios: Lightweight Three-Tier Architecture with GH-PBFT Consensus
Palomar et al. A protocol for secure content distribution in pure p2p networks
Nazarov et al. Algorithms for data reliability based on a cryptographic distributed database (blockchain)
Rajasree et al. An abuse-free optimistic signature exchange protocol using block cipher
WO2023208809A1 (en) Non-native blockchain signatures
CN116996227A (en) Internet of things equipment identity authentication system and method based on certificate-free signature
Das et al. Wireless Sensor Network with Blockchain Technology Using Elliptic Curve Discrete Logarithm Problem and Its Applications