[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN111147245A - Algorithm for encrypting by using national password in block chain - Google Patents

Algorithm for encrypting by using national password in block chain Download PDF

Info

Publication number
CN111147245A
CN111147245A CN202010016609.3A CN202010016609A CN111147245A CN 111147245 A CN111147245 A CN 111147245A CN 202010016609 A CN202010016609 A CN 202010016609A CN 111147245 A CN111147245 A CN 111147245A
Authority
CN
China
Prior art keywords
algorithm
transaction
public key
encryption
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010016609.3A
Other languages
Chinese (zh)
Inventor
崔春生
周耀平
许文波
李伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Hengwei Information Technology Co ltd
Original Assignee
Jiangsu Hengwei Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Hengwei Information Technology Co ltd filed Critical Jiangsu Hengwei Information Technology Co ltd
Priority to CN202010016609.3A priority Critical patent/CN111147245A/en
Publication of CN111147245A publication Critical patent/CN111147245A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Power Engineering (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to the technical field of block chain encryption, in particular to an algorithm for encrypting by using a national password in a block chain, which is mainly used in two use scenes of account number generation and transaction signature and verification, wherein the encryption algorithm is applied to the account number generation, which is usually a public key in a generated public and private key pair or a Hash value calculated according to the public key, and the application of the encryption algorithm to the transaction signature and verification is transaction serialization, the Hash value of a serialization result is calculated by using the Hash algorithm, then, the transaction Hash is signed by using a private key of an account number initiating a transaction, and a block chain link point verifies the signature by using the public key to determine the legality of the transaction, and the two algorithms which are required to be used in the two use scenes are as follows: the invention discloses an asymmetric encryption algorithm SM2, in particular to a secure Hash algorithm SM3 for calculating a Hash value, which meets the requirements of applying a block chain technology in a commercial environment of China, supports the commercial encryption security standard of China, ensures that the security of transactions conforms to the national encryption standard, simultaneously ensures the correct fusion with other encryption algorithms on a chain, realizes multiple security standards of one chain, and ensures the openness of the chain.

Description

Algorithm for encrypting by using national password in block chain
Technical Field
The invention relates to the technical field of block chain encryption, in particular to an algorithm for encrypting by using a national password in a block chain.
Background
Encryption algorithms are a cornerstone of information security and maintenance of trust in blockchains. The application and development of block chain technology, digital encryption technology is the key. Once the encryption method is broken, the data security of the blockchain will be challenged, the non-tamper-ability of the blockchain and the digital assets will no longer exist.
The national cryptographic algorithm is short for the national commercial cryptographic algorithm. Since 2012, the national cryptology administration successively published cryptographic algorithm standards such as SM2/SM3/SM4 and application specifications thereof in the form of cipher industry standard of the people's republic of China. Where "SM" stands for "secret of trade", i.e. a cryptographic technique for commercial use that does not involve national secrets. The SM2 is a public key cryptographic algorithm standard based on elliptic curve cryptography, comprises digital signature, key exchange and public key encryption, and is used for replacing international algorithms such as RSA/Diffie-Hellman/ECDSA/ECDH and the like; SM3 is cipher hash algorithm, which is used to replace MD5/SHA-1/SHA-256 international algorithms; by deploying the cryptographic algorithm, security risks brought by weak passwords and wrong implementation and expenses brought by deploying PKI/CA can be reduced.
Asymmetric key pairs have two features: one is that after information is encrypted with one of the keys (public or private), only the other corresponding key can be unlocked. And secondly, the public key can be disclosed to other people, the private key is kept secret, and other people cannot calculate the corresponding private key through the public key.
The encryption algorithm adopted in the current block chain technology is mainly a foreign commercial asymmetric encryption algorithm. There are the following problems here:
(1) some of the specific steps involved in some of the commercial designs are primarily responsible for the brute force departments of the united states. There are uncertain security factors and legal risks inside.
(2) The national secret is formulated and developed by the national secret bureau, and the principle and the implementation details are relatively clear to developers and enterprises in China. The technology is autonomous and controllable.
(3) At present, the national security is mainly for domestic products, and products related to national security may need to be used in a targeted manner.
Disclosure of Invention
In order to meet the requirement of applying a block chain technology in a commercial environment of China and support the commercial encryption safety standard of China, the invention provides a method for applying an algorithm to a block chain based on the national encryption standard of China, which ensures that the security of transactions conforms to the national encryption standard, simultaneously ensures the correct fusion with other encryption algorithms on the chain, realizes multiple safety standards of one chain and ensures the openness of the chain.
An algorithm for encrypting in a blockchain using a national password, comprising the steps of:
(1) the user inputs a password, and the system calculates a 128 Bits Hash value according to the password to be used as a Seed for subsequently generating a public key and a private key, which is called Seed;
(2) calculating a Hash value of 256Bits as a private key according to Seed, and calculating to generate a public key according to an SM2 encryption algorithm;
(3) calculating a Hash value of 160 Bits by using a RIPEMD160 Hash algorithm according to the public key, and generating a final account according to a Base58 code with a checksum;
(5) the user uses the key of the account number which is just generated to perform Base58 decoding, determines the type of the encryption algorithm, and calculates a public/private key pair according to the corresponding algorithm;
(6) constructing a transaction by a user, wherein the transaction comprises the account information and the corresponding public key, and serializing the constructed transaction according to a determined format to obtain a transaction byte sequence S;
(7) if the encryption algorithm is SM2, calculating a Hash value of 256Bits according to the public key and the transaction byte sequence S by using an SM3 algorithm, and marking the Hash value as H1;
(8) signing H1 by using an SM2 algorithm through a private key to obtain a signature value, and recording the signature value into a transaction request to be submitted to a node for execution;
(9) a user initiates a transaction request, after receiving the transaction request, a node acquires the information of an initiating account number of the transaction and a public key of a verification signature, calculates the account number according to the public key, and checks whether the account number is matched with the initiating account number, if not, the transaction is returned to fail, otherwise, the following processing is continued;
(10) determining the type of the encryption algorithm according to the public key, and if the type of the encryption algorithm is SM2, calculating a Hash value H2 of 256Bits by using an SM3 algorithm through the public key and a transaction serialized byte sequence;
(11) and acquiring transaction signature information from the transaction, verifying the signature by using an SM2 algorithm through a public key and H2, if the signature is matched with the signature, passing the authentication of the account number initiating the transaction, continuing the subsequent processing, and otherwise, returning to fail.
Further, Seed may also be formed directly by the system or the user generating a 128 Bits random number.
Further, before a final account is generated according to the public key, an encryption algorithm type byte is defined for the public key, the first byte of the SM2 algorithm is fixed to be 0x02 or 0x03, in order to avoid adding extra space and consider compatible secp256k1 algorithm, the first byte of the public key generated before is modified to be 0x22 or 0x23 for distinguishing, and the public key is supported to be capable of self-describing the adopted algorithm type;
further, the addition of a type prefix of at least one byte to the Seed header allows the Seed to know which encryption algorithm supported in the system to use to compute the public and private keys, while we encode it with a checksum Base58 for easier user recording.
Drawings
Fig. 1 is a schematic flow chart of generating a blockchain account address based on SM 2;
fig. 2 is a schematic diagram of the relationship between the private key, the public key and the account address.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the embodiments of the present specification, the technical solutions in the embodiments of the present specification will be described in detail below, and it is obvious that the described embodiments are only a part of the embodiments of the present specification, and not all embodiments, and other embodiments obtained by those skilled in the art based on the embodiments in the present specification should fall within the protection scope.
The technical solutions provided by the embodiments in the present specification are described in detail below, and it should be noted that the following embodiments can be understood by referring to each other since the technical ideas based on the following embodiments are similar.
Example 1:
to more effectively illustrate how we use the cryptographic algorithm, we need to first illustrate the main usage scenario of the cryptographic algorithm in the blockchain: generating an account number, signing and verifying a transaction;
(1) generating an account number: in the blockchain, the account number is anonymous, and the account number is usually a public key in a generated public and private key pair or a Hash value calculated according to the public key;
(2) transaction signing and verification: serializing the transaction, calculating a Hash value of a serialized result by utilizing a Hash algorithm, then signing the transaction Hash by using a private key of an account initiating the transaction, and verifying the signature by utilizing a public key by using block chain nodes to determine the validity of the transaction;
from the above description, we determine that for the national cryptographic standard, two algorithms need to be used: one is an asymmetric cryptographic algorithm SM2, and the other is a secure Hash algorithm SM3 for calculating Hash values, and the specific use method is as follows:
1. the user inputs a password, the system calculates a 128-bit Hash value according to the password, the Hash value is used as a Seed for subsequently generating a public key and a private key, the Seed is called Seed, and the Seed can also be formed by directly generating a 128-bit random number by the system or the user;
2. calculating a Hash value of 256Bits as a private key according to Seed, and calculating to generate a public key according to an elliptic curve formula (SM2 is an elliptic curve encryption algorithm), wherein the length of the public key is 33 bytes;
3. the process of computing the public and private keys from Seed is an idempotent computation, so we return to the user not actually the private key, but the coded result of the Seed, which is shorter and easier to input and record, we call the user key, in order to know which encryption algorithm supported in the system to use the Seed to compute the public and private keys, we add a prefix of type of at least one byte to the header, and at the same time, in order to make it easier for the user to record the Seed, we encode it with Base58 with checksum;
4. in order to support that the public key can self-describe the type of algorithm it takes, we define a cryptographic algorithm type byte for the public key, and consider that the first byte of the SM2 algorithm is fixed to 0x02 or 0x03, in order to avoid adding extra space, and consider that the secp256k1 algorithm is compatible, we modify the first byte of the original public key generated before to 0x22 or 0x23 for differentiation;
5. calculating a Hash value of 160 Bits by using a RIPEMD160 Hash algorithm according to the modified public key, and generating a final account according to Base58 codes with checksums;
6. the user uses the key of the account number which is just generated to perform Base58 decoding, determines the type of the encryption algorithm, and calculates a public/private key pair according to the corresponding algorithm;
7. constructing a transaction by a user, wherein the transaction comprises the account information and the corresponding public key, and serializing the constructed transaction according to a determined format to obtain a transaction byte sequence S;
8. if the encryption algorithm is SM2, calculating a Hash value of 256Bits according to the public key and the transaction byte sequence S by using an SM3 algorithm, and marking the Hash value as H1;
9. signing H1 by using an SM2 algorithm through a private key to obtain a signature value, and recording the signature value into a transaction request to be submitted to a node for execution;
10. a user initiates a transaction request, after receiving the transaction request, a node acquires the information of an initiating account number of the transaction and a public key of a verification signature, calculates the account number according to the public key, and checks whether the account number is matched with the initiating account number, if not, the transaction is returned to fail, otherwise, the following processing is continued;
11. determining the type of the encryption algorithm according to the public key, and if the type of the encryption algorithm is SM2, calculating a Hash value H2 of 256Bits by using an SM3 algorithm through the public key and a transaction serialized byte sequence;
12. and acquiring transaction signature information from the transaction, verifying the signature by using an SM2 algorithm through a public key and H2, if the signature is matched with the signature, passing the authentication of the account number initiating the transaction, continuing the subsequent processing, and otherwise, returning to fail.
The above embodiments are merely technical ideas and features of the present invention, and thus should not limit the scope of the present invention, and all equivalent changes or modifications made according to the spirit of the present invention should be covered within the scope of the present invention.

Claims (4)

1. An algorithm for encrypting in a blockchain using a national password, comprising the steps of:
(1) the user inputs a password, and the system calculates a 128 Bits Hash value according to the password to be used as a Seed for subsequently generating a public key and a private key, which is called Seed;
(2) calculating a Hash value of 256Bits as a private key according to Seed, and calculating to generate a public key according to an SM2 encryption algorithm;
(3) calculating a Hash value of 160 Bits by using a RIPEMD160 Hash algorithm according to the public key, and generating a final account according to a Base58 code with a checksum;
(5) the user uses the key of the account number which is just generated to perform Base58 decoding, determines the type of the encryption algorithm, and calculates a public/private key pair according to the corresponding algorithm;
(6) constructing a transaction by a user, wherein the transaction comprises the account information and the corresponding public key, and serializing the constructed transaction according to a determined format to obtain a transaction byte sequence S;
(7) if the encryption algorithm is SM2, calculating a Hash value of 256Bits according to the public key and the transaction byte sequence S by using an SM3 algorithm, and marking the Hash value as H1;
(8) signing H1 by using an SM2 algorithm through a private key to obtain a signature value, and recording the signature value into a transaction request to be submitted to a node for execution;
(9) a user initiates a transaction request, after receiving the transaction request, a node acquires the information of an initiating account number of the transaction and a public key of a verification signature, calculates the account number according to the public key, and checks whether the account number is matched with the initiating account number, if not, the transaction is returned to fail, otherwise, the following processing is continued;
(10) determining the type of the encryption algorithm according to the public key, and if the type of the encryption algorithm is SM2, calculating a Hash value H2 of 256Bits by using an SM3 algorithm through the public key and a transaction serialized byte sequence;
(11) and acquiring transaction signature information from the transaction, verifying the signature by using an SM2 algorithm through a public key and H2, if the signature is matched with the signature, passing the authentication of the account number initiating the transaction, continuing the subsequent processing, and otherwise, returning to fail.
2. An algorithm for encryption using national cryptograms in a blockchain according to claim 1,
seed may also be formed directly by the system or by the user generating a 128 Bits random number.
3. An algorithm for encryption using national cryptograms in a blockchain according to claim 1,
before a final account is generated according to a public key, an encryption algorithm type byte is defined for the public key, the first byte of an SM2 algorithm is fixed to be 0x02 or 0x03, in order to avoid adding extra space and consider compatible secp256k1 algorithm, the first byte of the previously generated public key is modified to be 0x22 or 0x23 for distinguishing, and the public key is supported to be capable of self-describing the adopted algorithm type.
4. An algorithm for encryption using national cryptograms in a blockchain according to claim 1,
the addition of a type prefix of at least one byte to the Seed header enables the Seed to know which encryption algorithm supported in the system to use to compute the public and private keys, while we encode it with a Base58 with a checksum for easier user recording of the Seed.
CN202010016609.3A 2020-01-08 2020-01-08 Algorithm for encrypting by using national password in block chain Pending CN111147245A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010016609.3A CN111147245A (en) 2020-01-08 2020-01-08 Algorithm for encrypting by using national password in block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010016609.3A CN111147245A (en) 2020-01-08 2020-01-08 Algorithm for encrypting by using national password in block chain

Publications (1)

Publication Number Publication Date
CN111147245A true CN111147245A (en) 2020-05-12

Family

ID=70523922

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010016609.3A Pending CN111147245A (en) 2020-01-08 2020-01-08 Algorithm for encrypting by using national password in block chain

Country Status (1)

Country Link
CN (1) CN111147245A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111339209B (en) * 2020-05-19 2020-08-28 鹏城实验室 Information management method and information management system based on block chain
CN112737779A (en) * 2020-12-30 2021-04-30 深圳市宝能投资集团有限公司 Service method and device for cipher machine, cipher machine and storage medium
CN112907247A (en) * 2021-03-18 2021-06-04 上海能链众合科技有限公司 Block chain authorization calculation control method
CN112926983A (en) * 2021-04-13 2021-06-08 无锡井通网络科技有限公司 Block chain-based deposit certificate transaction encryption system and method
CN113364776A (en) * 2021-06-04 2021-09-07 北银金融科技有限责任公司 Method and system for verifying block link point usage cryptographic algorithm communication
CN113536335A (en) * 2021-06-11 2021-10-22 上海胡桃网络科技有限公司 Payment system state cryptographic algorithm dynamic updating method
CN113904854A (en) * 2021-10-13 2022-01-07 筹远(上海)信息科技有限公司 Block chain data encryption method and device based on quotient secret algorithm
CN114154988A (en) * 2021-12-03 2022-03-08 福建师范大学 An anonymous key agreement method based on domestic blockchain

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007121631A1 (en) * 2006-04-24 2007-11-01 Beijing E-Hengxin Authentication Science & Technology Co. Ltd. System and method of electronic bank safety certification based on cpk
CN106130738A (en) * 2016-08-25 2016-11-16 杭州天谷信息科技有限公司 A kind of block catenary system supporting the close algorithm of state
CN107222312A (en) * 2017-06-20 2017-09-29 无锡井通网络科技有限公司 Assets digitizing solution based on block chain technology
CN109150549A (en) * 2018-10-26 2019-01-04 北京中宇万通科技股份有限公司 A method of based on domestic cryptographic algorithms' implementation block chain cryptosecurity service
CN110070362A (en) * 2019-05-05 2019-07-30 北京共识数信科技有限公司 A kind of financial industry block chain transaction system using national secret algorithm
CN110247757A (en) * 2019-04-19 2019-09-17 中国工商银行股份有限公司 Block chain processing method based on national secret algorithm, apparatus and system
CN110378151A (en) * 2019-06-19 2019-10-25 广东工业大学 A kind of score management method of education block chain that supporting national secret algorithm

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007121631A1 (en) * 2006-04-24 2007-11-01 Beijing E-Hengxin Authentication Science & Technology Co. Ltd. System and method of electronic bank safety certification based on cpk
CN106130738A (en) * 2016-08-25 2016-11-16 杭州天谷信息科技有限公司 A kind of block catenary system supporting the close algorithm of state
CN107222312A (en) * 2017-06-20 2017-09-29 无锡井通网络科技有限公司 Assets digitizing solution based on block chain technology
CN109150549A (en) * 2018-10-26 2019-01-04 北京中宇万通科技股份有限公司 A method of based on domestic cryptographic algorithms' implementation block chain cryptosecurity service
CN110247757A (en) * 2019-04-19 2019-09-17 中国工商银行股份有限公司 Block chain processing method based on national secret algorithm, apparatus and system
CN110070362A (en) * 2019-05-05 2019-07-30 北京共识数信科技有限公司 A kind of financial industry block chain transaction system using national secret algorithm
CN110378151A (en) * 2019-06-19 2019-10-25 广东工业大学 A kind of score management method of education block chain that supporting national secret algorithm

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111339209B (en) * 2020-05-19 2020-08-28 鹏城实验室 Information management method and information management system based on block chain
CN112737779A (en) * 2020-12-30 2021-04-30 深圳市宝能投资集团有限公司 Service method and device for cipher machine, cipher machine and storage medium
CN112907247A (en) * 2021-03-18 2021-06-04 上海能链众合科技有限公司 Block chain authorization calculation control method
CN112907247B (en) * 2021-03-18 2024-01-26 上海零数众合信息科技有限公司 Block chain authorization calculation control method
CN112926983A (en) * 2021-04-13 2021-06-08 无锡井通网络科技有限公司 Block chain-based deposit certificate transaction encryption system and method
CN113364776A (en) * 2021-06-04 2021-09-07 北银金融科技有限责任公司 Method and system for verifying block link point usage cryptographic algorithm communication
CN113536335A (en) * 2021-06-11 2021-10-22 上海胡桃网络科技有限公司 Payment system state cryptographic algorithm dynamic updating method
CN113904854A (en) * 2021-10-13 2022-01-07 筹远(上海)信息科技有限公司 Block chain data encryption method and device based on quotient secret algorithm
CN113904854B (en) * 2021-10-13 2024-01-02 筹远(上海)信息科技有限公司 Block chain data encryption method and device based on quotient algorithm
CN114154988A (en) * 2021-12-03 2022-03-08 福建师范大学 An anonymous key agreement method based on domestic blockchain
CN114154988B (en) * 2021-12-03 2024-09-24 福建师范大学 Anonymous key negotiation method based on domestic blockchain

Similar Documents

Publication Publication Date Title
CN111628868B (en) Digital signature generation method and device, computer equipment and storage medium
CN111147245A (en) Algorithm for encrypting by using national password in block chain
CN109495249B (en) Data storage method of block chain system, node and block chain system
US20210367753A1 (en) Trusted measurement and control network authentication method based on double cryptographic values and chaotic encryption
CN109818744B (en) Shared secret key generation method and device, computer equipment and storage medium
CN107395368B (en) Digital signature method, decapsulation method and decryption method in media-free environment
US7007164B1 (en) Method and array for authenticating a first instance and a second instance
US9705683B2 (en) Verifiable implicit certificates
CN115225268A (en) Using elliptic curve cryptography for personal device security to share secrets
CN110959163A (en) Computer-implemented system and method for enabling secure storage of large blockchains on multiple storage nodes
JP2013539295A (en) Authenticated encryption of digital signatures with message recovery
CN108833117B (en) Private key storage and reading method and device and hardware equipment
CN114598533B (en) A blockchain side chain cross-chain identity trusted authentication and data encryption transmission method
JP2025000864A (en) Computer-implemented system and method for sharing a common secret
EP4208982B1 (en) Method for electronic signing and authenticaton strongly linked to the authenticator factors possession and knowledge
KR101253683B1 (en) Digital Signing System and Method Using Chained Hash
CN107566360A (en) A kind of generation method of data authentication code
CN116318654A (en) SM2 algorithm collaborative signature system, method and equipment integrating quantum key distribution
US20150006900A1 (en) Signature protocol
US20240259196A1 (en) Timestamp generation method and apparatus, and electronic device and storage medium
CN114745180A (en) Access authentication method, apparatus and computer equipment
CN103748830A (en) Information processing device, signature-provision method, signature-verification method, program, and recording medium
CN110266478B (en) Information processing method and electronic equipment
CN115865520B (en) Authentication and access control method with privacy protection in mobile cloud service environment
WO2025025326A1 (en) Data transmission method for nuclear power physical protection communication, device, and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200512

RJ01 Rejection of invention patent application after publication