CN111147245A - Algorithm for encrypting by using national password in block chain - Google Patents
Algorithm for encrypting by using national password in block chain Download PDFInfo
- Publication number
- CN111147245A CN111147245A CN202010016609.3A CN202010016609A CN111147245A CN 111147245 A CN111147245 A CN 111147245A CN 202010016609 A CN202010016609 A CN 202010016609A CN 111147245 A CN111147245 A CN 111147245A
- Authority
- CN
- China
- Prior art keywords
- algorithm
- transaction
- public key
- encryption
- signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000000977 initiatory effect Effects 0.000 claims abstract description 11
- 238000012795 verification Methods 0.000 claims abstract description 6
- 238000012545 processing Methods 0.000 claims description 6
- 230000004927 fusion Effects 0.000 abstract description 2
- 238000000034 method Methods 0.000 description 5
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Power Engineering (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention relates to the technical field of block chain encryption, in particular to an algorithm for encrypting by using a national password in a block chain, which is mainly used in two use scenes of account number generation and transaction signature and verification, wherein the encryption algorithm is applied to the account number generation, which is usually a public key in a generated public and private key pair or a Hash value calculated according to the public key, and the application of the encryption algorithm to the transaction signature and verification is transaction serialization, the Hash value of a serialization result is calculated by using the Hash algorithm, then, the transaction Hash is signed by using a private key of an account number initiating a transaction, and a block chain link point verifies the signature by using the public key to determine the legality of the transaction, and the two algorithms which are required to be used in the two use scenes are as follows: the invention discloses an asymmetric encryption algorithm SM2, in particular to a secure Hash algorithm SM3 for calculating a Hash value, which meets the requirements of applying a block chain technology in a commercial environment of China, supports the commercial encryption security standard of China, ensures that the security of transactions conforms to the national encryption standard, simultaneously ensures the correct fusion with other encryption algorithms on a chain, realizes multiple security standards of one chain, and ensures the openness of the chain.
Description
Technical Field
The invention relates to the technical field of block chain encryption, in particular to an algorithm for encrypting by using a national password in a block chain.
Background
Encryption algorithms are a cornerstone of information security and maintenance of trust in blockchains. The application and development of block chain technology, digital encryption technology is the key. Once the encryption method is broken, the data security of the blockchain will be challenged, the non-tamper-ability of the blockchain and the digital assets will no longer exist.
The national cryptographic algorithm is short for the national commercial cryptographic algorithm. Since 2012, the national cryptology administration successively published cryptographic algorithm standards such as SM2/SM3/SM4 and application specifications thereof in the form of cipher industry standard of the people's republic of China. Where "SM" stands for "secret of trade", i.e. a cryptographic technique for commercial use that does not involve national secrets. The SM2 is a public key cryptographic algorithm standard based on elliptic curve cryptography, comprises digital signature, key exchange and public key encryption, and is used for replacing international algorithms such as RSA/Diffie-Hellman/ECDSA/ECDH and the like; SM3 is cipher hash algorithm, which is used to replace MD5/SHA-1/SHA-256 international algorithms; by deploying the cryptographic algorithm, security risks brought by weak passwords and wrong implementation and expenses brought by deploying PKI/CA can be reduced.
Asymmetric key pairs have two features: one is that after information is encrypted with one of the keys (public or private), only the other corresponding key can be unlocked. And secondly, the public key can be disclosed to other people, the private key is kept secret, and other people cannot calculate the corresponding private key through the public key.
The encryption algorithm adopted in the current block chain technology is mainly a foreign commercial asymmetric encryption algorithm. There are the following problems here:
(1) some of the specific steps involved in some of the commercial designs are primarily responsible for the brute force departments of the united states. There are uncertain security factors and legal risks inside.
(2) The national secret is formulated and developed by the national secret bureau, and the principle and the implementation details are relatively clear to developers and enterprises in China. The technology is autonomous and controllable.
(3) At present, the national security is mainly for domestic products, and products related to national security may need to be used in a targeted manner.
Disclosure of Invention
In order to meet the requirement of applying a block chain technology in a commercial environment of China and support the commercial encryption safety standard of China, the invention provides a method for applying an algorithm to a block chain based on the national encryption standard of China, which ensures that the security of transactions conforms to the national encryption standard, simultaneously ensures the correct fusion with other encryption algorithms on the chain, realizes multiple safety standards of one chain and ensures the openness of the chain.
An algorithm for encrypting in a blockchain using a national password, comprising the steps of:
(1) the user inputs a password, and the system calculates a 128 Bits Hash value according to the password to be used as a Seed for subsequently generating a public key and a private key, which is called Seed;
(2) calculating a Hash value of 256Bits as a private key according to Seed, and calculating to generate a public key according to an SM2 encryption algorithm;
(3) calculating a Hash value of 160 Bits by using a RIPEMD160 Hash algorithm according to the public key, and generating a final account according to a Base58 code with a checksum;
(5) the user uses the key of the account number which is just generated to perform Base58 decoding, determines the type of the encryption algorithm, and calculates a public/private key pair according to the corresponding algorithm;
(6) constructing a transaction by a user, wherein the transaction comprises the account information and the corresponding public key, and serializing the constructed transaction according to a determined format to obtain a transaction byte sequence S;
(7) if the encryption algorithm is SM2, calculating a Hash value of 256Bits according to the public key and the transaction byte sequence S by using an SM3 algorithm, and marking the Hash value as H1;
(8) signing H1 by using an SM2 algorithm through a private key to obtain a signature value, and recording the signature value into a transaction request to be submitted to a node for execution;
(9) a user initiates a transaction request, after receiving the transaction request, a node acquires the information of an initiating account number of the transaction and a public key of a verification signature, calculates the account number according to the public key, and checks whether the account number is matched with the initiating account number, if not, the transaction is returned to fail, otherwise, the following processing is continued;
(10) determining the type of the encryption algorithm according to the public key, and if the type of the encryption algorithm is SM2, calculating a Hash value H2 of 256Bits by using an SM3 algorithm through the public key and a transaction serialized byte sequence;
(11) and acquiring transaction signature information from the transaction, verifying the signature by using an SM2 algorithm through a public key and H2, if the signature is matched with the signature, passing the authentication of the account number initiating the transaction, continuing the subsequent processing, and otherwise, returning to fail.
Further, Seed may also be formed directly by the system or the user generating a 128 Bits random number.
Further, before a final account is generated according to the public key, an encryption algorithm type byte is defined for the public key, the first byte of the SM2 algorithm is fixed to be 0x02 or 0x03, in order to avoid adding extra space and consider compatible secp256k1 algorithm, the first byte of the public key generated before is modified to be 0x22 or 0x23 for distinguishing, and the public key is supported to be capable of self-describing the adopted algorithm type;
further, the addition of a type prefix of at least one byte to the Seed header allows the Seed to know which encryption algorithm supported in the system to use to compute the public and private keys, while we encode it with a checksum Base58 for easier user recording.
Drawings
Fig. 1 is a schematic flow chart of generating a blockchain account address based on SM 2;
fig. 2 is a schematic diagram of the relationship between the private key, the public key and the account address.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the embodiments of the present specification, the technical solutions in the embodiments of the present specification will be described in detail below, and it is obvious that the described embodiments are only a part of the embodiments of the present specification, and not all embodiments, and other embodiments obtained by those skilled in the art based on the embodiments in the present specification should fall within the protection scope.
The technical solutions provided by the embodiments in the present specification are described in detail below, and it should be noted that the following embodiments can be understood by referring to each other since the technical ideas based on the following embodiments are similar.
Example 1:
to more effectively illustrate how we use the cryptographic algorithm, we need to first illustrate the main usage scenario of the cryptographic algorithm in the blockchain: generating an account number, signing and verifying a transaction;
(1) generating an account number: in the blockchain, the account number is anonymous, and the account number is usually a public key in a generated public and private key pair or a Hash value calculated according to the public key;
(2) transaction signing and verification: serializing the transaction, calculating a Hash value of a serialized result by utilizing a Hash algorithm, then signing the transaction Hash by using a private key of an account initiating the transaction, and verifying the signature by utilizing a public key by using block chain nodes to determine the validity of the transaction;
from the above description, we determine that for the national cryptographic standard, two algorithms need to be used: one is an asymmetric cryptographic algorithm SM2, and the other is a secure Hash algorithm SM3 for calculating Hash values, and the specific use method is as follows:
1. the user inputs a password, the system calculates a 128-bit Hash value according to the password, the Hash value is used as a Seed for subsequently generating a public key and a private key, the Seed is called Seed, and the Seed can also be formed by directly generating a 128-bit random number by the system or the user;
2. calculating a Hash value of 256Bits as a private key according to Seed, and calculating to generate a public key according to an elliptic curve formula (SM2 is an elliptic curve encryption algorithm), wherein the length of the public key is 33 bytes;
3. the process of computing the public and private keys from Seed is an idempotent computation, so we return to the user not actually the private key, but the coded result of the Seed, which is shorter and easier to input and record, we call the user key, in order to know which encryption algorithm supported in the system to use the Seed to compute the public and private keys, we add a prefix of type of at least one byte to the header, and at the same time, in order to make it easier for the user to record the Seed, we encode it with Base58 with checksum;
4. in order to support that the public key can self-describe the type of algorithm it takes, we define a cryptographic algorithm type byte for the public key, and consider that the first byte of the SM2 algorithm is fixed to 0x02 or 0x03, in order to avoid adding extra space, and consider that the secp256k1 algorithm is compatible, we modify the first byte of the original public key generated before to 0x22 or 0x23 for differentiation;
5. calculating a Hash value of 160 Bits by using a RIPEMD160 Hash algorithm according to the modified public key, and generating a final account according to Base58 codes with checksums;
6. the user uses the key of the account number which is just generated to perform Base58 decoding, determines the type of the encryption algorithm, and calculates a public/private key pair according to the corresponding algorithm;
7. constructing a transaction by a user, wherein the transaction comprises the account information and the corresponding public key, and serializing the constructed transaction according to a determined format to obtain a transaction byte sequence S;
8. if the encryption algorithm is SM2, calculating a Hash value of 256Bits according to the public key and the transaction byte sequence S by using an SM3 algorithm, and marking the Hash value as H1;
9. signing H1 by using an SM2 algorithm through a private key to obtain a signature value, and recording the signature value into a transaction request to be submitted to a node for execution;
10. a user initiates a transaction request, after receiving the transaction request, a node acquires the information of an initiating account number of the transaction and a public key of a verification signature, calculates the account number according to the public key, and checks whether the account number is matched with the initiating account number, if not, the transaction is returned to fail, otherwise, the following processing is continued;
11. determining the type of the encryption algorithm according to the public key, and if the type of the encryption algorithm is SM2, calculating a Hash value H2 of 256Bits by using an SM3 algorithm through the public key and a transaction serialized byte sequence;
12. and acquiring transaction signature information from the transaction, verifying the signature by using an SM2 algorithm through a public key and H2, if the signature is matched with the signature, passing the authentication of the account number initiating the transaction, continuing the subsequent processing, and otherwise, returning to fail.
The above embodiments are merely technical ideas and features of the present invention, and thus should not limit the scope of the present invention, and all equivalent changes or modifications made according to the spirit of the present invention should be covered within the scope of the present invention.
Claims (4)
1. An algorithm for encrypting in a blockchain using a national password, comprising the steps of:
(1) the user inputs a password, and the system calculates a 128 Bits Hash value according to the password to be used as a Seed for subsequently generating a public key and a private key, which is called Seed;
(2) calculating a Hash value of 256Bits as a private key according to Seed, and calculating to generate a public key according to an SM2 encryption algorithm;
(3) calculating a Hash value of 160 Bits by using a RIPEMD160 Hash algorithm according to the public key, and generating a final account according to a Base58 code with a checksum;
(5) the user uses the key of the account number which is just generated to perform Base58 decoding, determines the type of the encryption algorithm, and calculates a public/private key pair according to the corresponding algorithm;
(6) constructing a transaction by a user, wherein the transaction comprises the account information and the corresponding public key, and serializing the constructed transaction according to a determined format to obtain a transaction byte sequence S;
(7) if the encryption algorithm is SM2, calculating a Hash value of 256Bits according to the public key and the transaction byte sequence S by using an SM3 algorithm, and marking the Hash value as H1;
(8) signing H1 by using an SM2 algorithm through a private key to obtain a signature value, and recording the signature value into a transaction request to be submitted to a node for execution;
(9) a user initiates a transaction request, after receiving the transaction request, a node acquires the information of an initiating account number of the transaction and a public key of a verification signature, calculates the account number according to the public key, and checks whether the account number is matched with the initiating account number, if not, the transaction is returned to fail, otherwise, the following processing is continued;
(10) determining the type of the encryption algorithm according to the public key, and if the type of the encryption algorithm is SM2, calculating a Hash value H2 of 256Bits by using an SM3 algorithm through the public key and a transaction serialized byte sequence;
(11) and acquiring transaction signature information from the transaction, verifying the signature by using an SM2 algorithm through a public key and H2, if the signature is matched with the signature, passing the authentication of the account number initiating the transaction, continuing the subsequent processing, and otherwise, returning to fail.
2. An algorithm for encryption using national cryptograms in a blockchain according to claim 1,
seed may also be formed directly by the system or by the user generating a 128 Bits random number.
3. An algorithm for encryption using national cryptograms in a blockchain according to claim 1,
before a final account is generated according to a public key, an encryption algorithm type byte is defined for the public key, the first byte of an SM2 algorithm is fixed to be 0x02 or 0x03, in order to avoid adding extra space and consider compatible secp256k1 algorithm, the first byte of the previously generated public key is modified to be 0x22 or 0x23 for distinguishing, and the public key is supported to be capable of self-describing the adopted algorithm type.
4. An algorithm for encryption using national cryptograms in a blockchain according to claim 1,
the addition of a type prefix of at least one byte to the Seed header enables the Seed to know which encryption algorithm supported in the system to use to compute the public and private keys, while we encode it with a Base58 with a checksum for easier user recording of the Seed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010016609.3A CN111147245A (en) | 2020-01-08 | 2020-01-08 | Algorithm for encrypting by using national password in block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010016609.3A CN111147245A (en) | 2020-01-08 | 2020-01-08 | Algorithm for encrypting by using national password in block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111147245A true CN111147245A (en) | 2020-05-12 |
Family
ID=70523922
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010016609.3A Pending CN111147245A (en) | 2020-01-08 | 2020-01-08 | Algorithm for encrypting by using national password in block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111147245A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111339209B (en) * | 2020-05-19 | 2020-08-28 | 鹏城实验室 | Information management method and information management system based on block chain |
CN112737779A (en) * | 2020-12-30 | 2021-04-30 | 深圳市宝能投资集团有限公司 | Service method and device for cipher machine, cipher machine and storage medium |
CN112907247A (en) * | 2021-03-18 | 2021-06-04 | 上海能链众合科技有限公司 | Block chain authorization calculation control method |
CN112926983A (en) * | 2021-04-13 | 2021-06-08 | 无锡井通网络科技有限公司 | Block chain-based deposit certificate transaction encryption system and method |
CN113364776A (en) * | 2021-06-04 | 2021-09-07 | 北银金融科技有限责任公司 | Method and system for verifying block link point usage cryptographic algorithm communication |
CN113536335A (en) * | 2021-06-11 | 2021-10-22 | 上海胡桃网络科技有限公司 | Payment system state cryptographic algorithm dynamic updating method |
CN113904854A (en) * | 2021-10-13 | 2022-01-07 | 筹远(上海)信息科技有限公司 | Block chain data encryption method and device based on quotient secret algorithm |
CN114154988A (en) * | 2021-12-03 | 2022-03-08 | 福建师范大学 | An anonymous key agreement method based on domestic blockchain |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007121631A1 (en) * | 2006-04-24 | 2007-11-01 | Beijing E-Hengxin Authentication Science & Technology Co. Ltd. | System and method of electronic bank safety certification based on cpk |
CN106130738A (en) * | 2016-08-25 | 2016-11-16 | 杭州天谷信息科技有限公司 | A kind of block catenary system supporting the close algorithm of state |
CN107222312A (en) * | 2017-06-20 | 2017-09-29 | 无锡井通网络科技有限公司 | Assets digitizing solution based on block chain technology |
CN109150549A (en) * | 2018-10-26 | 2019-01-04 | 北京中宇万通科技股份有限公司 | A method of based on domestic cryptographic algorithms' implementation block chain cryptosecurity service |
CN110070362A (en) * | 2019-05-05 | 2019-07-30 | 北京共识数信科技有限公司 | A kind of financial industry block chain transaction system using national secret algorithm |
CN110247757A (en) * | 2019-04-19 | 2019-09-17 | 中国工商银行股份有限公司 | Block chain processing method based on national secret algorithm, apparatus and system |
CN110378151A (en) * | 2019-06-19 | 2019-10-25 | 广东工业大学 | A kind of score management method of education block chain that supporting national secret algorithm |
-
2020
- 2020-01-08 CN CN202010016609.3A patent/CN111147245A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007121631A1 (en) * | 2006-04-24 | 2007-11-01 | Beijing E-Hengxin Authentication Science & Technology Co. Ltd. | System and method of electronic bank safety certification based on cpk |
CN106130738A (en) * | 2016-08-25 | 2016-11-16 | 杭州天谷信息科技有限公司 | A kind of block catenary system supporting the close algorithm of state |
CN107222312A (en) * | 2017-06-20 | 2017-09-29 | 无锡井通网络科技有限公司 | Assets digitizing solution based on block chain technology |
CN109150549A (en) * | 2018-10-26 | 2019-01-04 | 北京中宇万通科技股份有限公司 | A method of based on domestic cryptographic algorithms' implementation block chain cryptosecurity service |
CN110247757A (en) * | 2019-04-19 | 2019-09-17 | 中国工商银行股份有限公司 | Block chain processing method based on national secret algorithm, apparatus and system |
CN110070362A (en) * | 2019-05-05 | 2019-07-30 | 北京共识数信科技有限公司 | A kind of financial industry block chain transaction system using national secret algorithm |
CN110378151A (en) * | 2019-06-19 | 2019-10-25 | 广东工业大学 | A kind of score management method of education block chain that supporting national secret algorithm |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111339209B (en) * | 2020-05-19 | 2020-08-28 | 鹏城实验室 | Information management method and information management system based on block chain |
CN112737779A (en) * | 2020-12-30 | 2021-04-30 | 深圳市宝能投资集团有限公司 | Service method and device for cipher machine, cipher machine and storage medium |
CN112907247A (en) * | 2021-03-18 | 2021-06-04 | 上海能链众合科技有限公司 | Block chain authorization calculation control method |
CN112907247B (en) * | 2021-03-18 | 2024-01-26 | 上海零数众合信息科技有限公司 | Block chain authorization calculation control method |
CN112926983A (en) * | 2021-04-13 | 2021-06-08 | 无锡井通网络科技有限公司 | Block chain-based deposit certificate transaction encryption system and method |
CN113364776A (en) * | 2021-06-04 | 2021-09-07 | 北银金融科技有限责任公司 | Method and system for verifying block link point usage cryptographic algorithm communication |
CN113536335A (en) * | 2021-06-11 | 2021-10-22 | 上海胡桃网络科技有限公司 | Payment system state cryptographic algorithm dynamic updating method |
CN113904854A (en) * | 2021-10-13 | 2022-01-07 | 筹远(上海)信息科技有限公司 | Block chain data encryption method and device based on quotient secret algorithm |
CN113904854B (en) * | 2021-10-13 | 2024-01-02 | 筹远(上海)信息科技有限公司 | Block chain data encryption method and device based on quotient algorithm |
CN114154988A (en) * | 2021-12-03 | 2022-03-08 | 福建师范大学 | An anonymous key agreement method based on domestic blockchain |
CN114154988B (en) * | 2021-12-03 | 2024-09-24 | 福建师范大学 | Anonymous key negotiation method based on domestic blockchain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111628868B (en) | Digital signature generation method and device, computer equipment and storage medium | |
CN111147245A (en) | Algorithm for encrypting by using national password in block chain | |
CN109495249B (en) | Data storage method of block chain system, node and block chain system | |
US20210367753A1 (en) | Trusted measurement and control network authentication method based on double cryptographic values and chaotic encryption | |
CN109818744B (en) | Shared secret key generation method and device, computer equipment and storage medium | |
CN107395368B (en) | Digital signature method, decapsulation method and decryption method in media-free environment | |
US7007164B1 (en) | Method and array for authenticating a first instance and a second instance | |
US9705683B2 (en) | Verifiable implicit certificates | |
CN115225268A (en) | Using elliptic curve cryptography for personal device security to share secrets | |
CN110959163A (en) | Computer-implemented system and method for enabling secure storage of large blockchains on multiple storage nodes | |
JP2013539295A (en) | Authenticated encryption of digital signatures with message recovery | |
CN108833117B (en) | Private key storage and reading method and device and hardware equipment | |
CN114598533B (en) | A blockchain side chain cross-chain identity trusted authentication and data encryption transmission method | |
JP2025000864A (en) | Computer-implemented system and method for sharing a common secret | |
EP4208982B1 (en) | Method for electronic signing and authenticaton strongly linked to the authenticator factors possession and knowledge | |
KR101253683B1 (en) | Digital Signing System and Method Using Chained Hash | |
CN107566360A (en) | A kind of generation method of data authentication code | |
CN116318654A (en) | SM2 algorithm collaborative signature system, method and equipment integrating quantum key distribution | |
US20150006900A1 (en) | Signature protocol | |
US20240259196A1 (en) | Timestamp generation method and apparatus, and electronic device and storage medium | |
CN114745180A (en) | Access authentication method, apparatus and computer equipment | |
CN103748830A (en) | Information processing device, signature-provision method, signature-verification method, program, and recording medium | |
CN110266478B (en) | Information processing method and electronic equipment | |
CN115865520B (en) | Authentication and access control method with privacy protection in mobile cloud service environment | |
WO2025025326A1 (en) | Data transmission method for nuclear power physical protection communication, device, and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200512 |
|
RJ01 | Rejection of invention patent application after publication |