CN113609499B - Electronic notarization document signing method and system based on decentralization multiparty security calculation and multiple signatures - Google Patents
Electronic notarization document signing method and system based on decentralization multiparty security calculation and multiple signatures Download PDFInfo
- Publication number
- CN113609499B CN113609499B CN202110857911.6A CN202110857911A CN113609499B CN 113609499 B CN113609499 B CN 113609499B CN 202110857911 A CN202110857911 A CN 202110857911A CN 113609499 B CN113609499 B CN 113609499B
- Authority
- CN
- China
- Prior art keywords
- signature
- user
- notarization
- public
- sigma
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000004364 calculation method Methods 0.000 title claims abstract description 14
- 238000004891 communication Methods 0.000 claims abstract 2
- 238000012795 verification Methods 0.000 claims description 90
- 230000001815 facial effect Effects 0.000 claims description 22
- 230000002776 aggregation Effects 0.000 claims description 9
- 238000004220 aggregation Methods 0.000 claims description 9
- 230000015572 biosynthetic process Effects 0.000 claims description 7
- 238000013507 mapping Methods 0.000 claims description 7
- 238000003786 synthesis reaction Methods 0.000 claims description 7
- 230000004044 response Effects 0.000 claims description 6
- 230000009471 action Effects 0.000 abstract description 2
- 230000008520 organization Effects 0.000 abstract description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005242 forging Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Data Mining & Analysis (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a signing method and a system of an electronic notarization document based on decentralization multiparty security calculation and multiple signatures, wherein the method is characterized in that communication is carried out among a notarization service end node IDS, a user client node and a business service end node BS, and the notarization service end node IDS is configured in a trusted third party notarization organization; the method and the system break the authority centralization of the centralized server and eliminate the fake making capability of the server; the node quantity calculated by adopting multiple parties can be flexibly configured according to the needs, so that the needs of clients are better met; based on the trusted third party notarization as one of the operation participation nodes, the authenticity of the signature behavior can be directly visualized; by constructing an on-line reliable electronic signature system with decentralization, the trust cost is reduced, a user can safely sign an on-line remote electronic file without unconditionally entrusting trust to the system, and the signing action can be directly proved.
Description
Technical Field
The invention relates to the field of electronic signature service for electronic files, in particular to a reliable electronic signature function realized through online network service, and specifically relates to an electronic notarization document signing method and system based on decentralization multiparty secure calculation and multiple signatures.
Background
Online electronic signing services of electronic documents have been increasingly in demand for applications in electronic commerce environments; in order to adapt to the requirement of digital business production on electronic signature service, more and more electronic signature services (electronic contract services) of SaaS platforms are continuously appeared, but because the network platform type service mostly adopts a centralized technical architecture, a central server of the platform completely controls all elements of the electronic signature, so that the technical platform can have the capability of forging the signature, the trust cost of a user when selecting the platform service is greatly improved, and the promotion of the online electronic file signing service is hindered.
Disclosure of Invention
Aiming at the problems that the network platform type service mostly adopts a centralized technical architecture and the security is not high, the invention provides an electronic notarization document signing method and system based on decentralization multiparty secure computation and multiple signatures, which is characterized in that the decentralization design is based, the decentralization authority of a server is greatly weakened, the false making capability of the server on the electronic signature is stopped in the cryptography principle, the non-repudiation of the electronic signature is ensured, and the complete trusted proof of the electronic document electronic signature process is realized
The technical scheme of the invention is as follows:
the invention provides an electronic notarization document signing method based on decentralization multiparty security calculation and multiple signatures, which comprises the steps of communicating among notarization service end nodes IDS, user client end nodes and business service end nodes BS; the method comprises the following steps:
s1, initializing a system: the system security parameter level is configured to generate a common parameter Setup (1 l )→(e,p,G 1 ,G 2 ,G t ,g 1 ,g 2 ,H 0 ,H 1 ,H 2 ) The method comprises the steps of carrying out a first treatment on the surface of the Wherein: (e, p, G) 1 ,G 2 ,G t ) Bilinear group of prime order p, g 1 ,g 2 G is respectively 1 ,G 2 Is the generator of (1), H 0 ,H 1 ,H 2 Are all hash functions, wherein H 0 :{0,1} * →G 1 ,H 1 :{0,1} * →Z p ,H 2 :{0,1} * →Z p ;
S2, a key generation step:
2.1, the public and private key generation algorithm is called by the public and private server node IDS to generate an IDS public and private key pair (sk) ny ,pk ny );
2.2, the service server node BS calls a public-private key generation algorithm to generate a public-private key pair (sk) of the BS bs ,pk bs );
2.3, the user inputs the pin code through the client, and calls the public and private key generation algorithm to generate the public and private key pair (sk) of the user u ,pk u );
2.4, invoking a public key aggregation algorithm by the notarization server node IDS to generate a complete public key apk after all nodes are aggregated;
s3, user identity authentication:
3.1, user U inputs identity information id through client u And uses the client camera to collect the facial recognition characteristic f of the user U u ;
3.2, the client calls a hash function to calculate the hash value M of the user idu The method comprises the steps of carrying out a first treatment on the surface of the Obtaining signature value sigma of user by adopting signature algorithm idu The method comprises the steps of carrying out a first treatment on the surface of the Id of user identity information u Signature value sigma idu Facial recognition feature f u Sending to a notarization server node;
3.3, the notarization server node IDS uses the user identity information id u Facial recognition feature f u Comparing with a public security citizen identity information database, wherein the comparison is not passed, the identity authentication fails, and the task is terminated; the comparison pass is 3.4;
3.4, the notarization server node IDS is according to the user identity information id u Invoking a hash function to calculate the hash value M of the user idu Based on the public key pk of user, signature verification algorithm is adopted u And hash value M idu For signature value sigma idu Checking the signature, and if the signature verification fails, terminating the task; if the verification signature is successful, the identity authentication is completed;
s4, signature step: user id u Signing the electronic file M by the notarization server node IDS and the business server node BS respectively, wherein the steps are as follows;
4.1, the user calculates the hash value H of the electronic file M through the client node 0 (M) according to the user private key sk u And an electronic file hash value H 0 (M) signing the electronic document to produce a user signature value sigma u Sigma is calculated as u M is sent to a service server node;
4.2, the service server calculates the electronic file MHash value H 0 (M) and according to the user public key pk u And H 0 (M) invoking a signature verification algorithm to sign the user value sigma u Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, continuing 4.3;
4.3, the business server side uses the private key sk of the business server side bs And an electronic file hash value H 0 (M) invoking a signature algorithm to calculate a service node signature value sigma bs The method comprises the steps of carrying out a first treatment on the surface of the Will sigma u 、σ bs M is sent to a notarization server;
4.4, the notarization server calculates the hash value H of the electronic file M 0 (M) according to the user public key pk u And H 0 (M) invoking a signature verification algorithm to sign the user value sigma u Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, the task continues 4.5;
4.5, the notarization server side uses the public key pk of the business server side bs And an electronic file hash value H 0 (M) invoking a signature verification algorithm to sign the service node value sigma bs Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, the task continues 4.6;
4.6, the notarization server side uses the private key sk of the notarization server side ny And an electronic file hash value H 0 (M) invoking a signature algorithm to generate a notarized node signature value σ ny ;
4.7, the notarization server side is based on the user signature value sigma u Notarized node signature value sigma ny And service node signature value sigma bs Invoking a signature synthesis algorithm to generate an integrated aggregate signature value sigma of all nodes;
s5, verification:
the notarization server calculates bilinear mapping function value e (sigma, g) of elliptic curve 2 ) And e (H) 0 (M), apk), comparisonIf the equation is not satisfied, the signature is failed, and if the equation is satisfied, the user U is informed that the file M is completed through multi-node cooperationIs a valid signature of (c).
Further, the security parameter level is l, and l is 1024 bits.
Further, identity information id u Including name and identification card number.
Further, the number of the service end nodes BS is one or more.
Further, the notarization service end node IDS is configured in a trusted third party notarization institution.
An electronic notarization document signing system based on decentralization multiparty security computation and multiple signatures, the system comprising;
and a system initialization module: the system security parameter level is configured to generate a common parameter Setup (1 l )→(e,p,G 1 ,G 2 ,G t ,g 1 ,g 2 ,H 0 ,H 1 ,H 2 ) The method comprises the steps of carrying out a first treatment on the surface of the Wherein: (e, p, G) 1 ,G 2 ,G t ) Bilinear group of prime order p, g 1 ,g 2 G is respectively 1 ,G 2 Is the generator of (1), H 0 ,H 1 ,H 2 Are all hash functions, wherein H 0 :{0,1} * →G 1 ,H 1 :{0,1} * →Z p ,H 2 :{0,1} * →Z p ;
A key generation module:
the public and private key generation algorithm is called by the public and private server node IDS to generate an IDS public and private key pair (sk) ny ,pk ny );
The service server node BS invokes the public-private key generation algorithm to generate a public-private key pair (sk) of the BS bs ,pk bs );
The client receives the pin code input by the user, and invokes the public-private key generation algorithm to generate a public-private key pair (sk) of the user u ,pk u );
The public certificate server node IDS calls a public key aggregation algorithm to generate a complete public key apk after all nodes are aggregated;
and a user identity authentication module:
client terminal receivingIdentity information id input by user U u And uses the client camera to collect the facial recognition characteristic f of the user U u ;
Client side calls hash function to calculate hash value M of user idu The method comprises the steps of carrying out a first treatment on the surface of the Obtaining signature value sigma of user by adopting signature algorithm idu The method comprises the steps of carrying out a first treatment on the surface of the Id of user identity information u Signature value sigma idu Facial recognition feature f u Sending to a notarization server node;
the notarization server node IDS uses the user identity information id u Facial recognition feature f u Comparing with a public security citizen identity information database, wherein the comparison is not passed, the identity authentication fails, and the task is terminated; the comparison is passed according to the user identity information id u Invoking a hash function to calculate the hash value M of the user idu Based on the public key pk of user, signature verification algorithm is adopted u And hash value M idu For signature value sigma idu Checking the signature, and if the signature verification fails, terminating the task; if the verification signature is successful, the identity authentication is completed;
signature module: user id u Signing the electronic file M by the notarization server node IDS and the business server node BS respectively;
the user client calculates the hash value H of the electronic file M 0 (M) according to the user private key sk u And an electronic file hash value H 0 (M) signing the electronic document to produce a user signature value sigma u Sigma is calculated as u M is sent to a service server node;
the business server calculates the hash value H of the electronic file M 0 (M) and according to the user public key pk u And H 0 (M) invoking a signature verification algorithm to sign the user value sigma u Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, the private key sk of the service server is used for verifying the signature bs And an electronic file hash value H 0 (M) invoking a signature algorithm to calculate a service node signature value sigma bs The method comprises the steps of carrying out a first treatment on the surface of the Will sigma u 、σ bs M is sent to a notarization server;
the notarization server calculates the hash value H of the electronic file M 0 (M) according to the user public key pk u And H 0 (M) invoking a signature verification algorithm to sign the user value sigma u Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, the notarization server side is based on the public key pk of the business server side bs And an electronic file hash value H 0 (M) invoking a signature verification algorithm to sign the service node value sigma bs Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, the notarization server side is based on the private key sk of the notarization server side ny And an electronic file hash value H 0 (M) invoking a signature algorithm to generate a notarized node signature value σ ny The method comprises the steps of carrying out a first treatment on the surface of the The notarization server side is based on the user signature value sigma u Notarized node signature value sigma ny And service node signature value sigma bs Invoking a signature synthesis algorithm to generate an integrated aggregate signature value sigma of all nodes;
and (3) a verification module: the notarization server calculates bilinear mapping function value e (sigma, g) of elliptic curve 2 ) And e (H) 0 (M), apk), comparisonIf the equation is not satisfied, it indicates that the signature fails, and if the equation is satisfied, it indicates that the user U completes the valid signature of the file M through multi-node cooperation.
A business server based on a decentralization multiparty security computing and multi-signature system,
the service server is configured with system parameters;
in response to the key generation task, the service server node BS invokes a public-private key generation algorithm to generate a public-private key pair (sk) of the BS bs ,pk bs ) And send to the notarization server node IDS;
the service server node BS responds to the signature task, and the service server receives the electronic file M and the user signature value σ sent by the user client u The method comprises the steps of carrying out a first treatment on the surface of the Calculating a hash value H of an electronic file M 0 (M) and according to the user public key pk u And H 0 (M) invoking a signature verification algorithm to sign the user value sigma u Performing verification if the verification signThe name fails, and the task is terminated; if the verification signature is successful, the private key sk of the service server is used for verifying the signature bs And an electronic file hash value H 0 (M) invoking a signature algorithm to calculate a service node signature value sigma bs The method comprises the steps of carrying out a first treatment on the surface of the Will sigma u 、σ bs And M is sent to the notarization server.
A user client based on a decentralised multiparty secure computing and multi-sign system,
the user client is configured with system parameters;
the client responds to the key generation task, receives the pin code input by the user, and invokes the public-private key generation algorithm to generate a public-private key pair (sk) of the user u ,pk u ) And send to the notarization server node IDS;
the client responds to the user identity authentication task and receives identity information id input by the user U u And uses the client camera to collect the facial recognition characteristic f of the user U u The method comprises the steps of carrying out a first treatment on the surface of the Invoking a hash function to calculate the hash value M of the user idu The method comprises the steps of carrying out a first treatment on the surface of the Obtaining signature value sigma of user by adopting signature algorithm idu The method comprises the steps of carrying out a first treatment on the surface of the Id of user identity information u Signature value sigma idu Facial recognition feature f u Sending to a notarization server node;
the client responds to the signature task, and the user client calculates a hash value H of the electronic file M 0 (M) according to the user private key sk u And an electronic file hash value H 0 (M) signing the electronic document to produce a user signature value sigma u Sigma is calculated as u M is sent to the service end node.
A notarization server based on a decentralization multiparty security computing and multi-signature system,
the notarization server is configured with system parameters;
in response to the key generation task, the public and private key generation algorithm is called by the public and private server node IDS to generate an IDS public and private key pair (sk ny ,pk ny ) The method comprises the steps of carrying out a first treatment on the surface of the Public-private key pair (sk) of receiving service server node BS bs ,pk bs ) And the public-private key pair (sk) of the user u ,pk u ) After all nodes are aggregated by calling a public key aggregation algorithmA complete public key apk of (a);
the notarization server node IDS responds to the user identity authentication task and receives the user identity information id sent by the client u Signature value sigma idu Facial recognition feature f u The method comprises the steps of carrying out a first treatment on the surface of the Id of user identity information u Facial recognition feature f u Comparing with a public security citizen identity information database, wherein the comparison is not passed, the identity authentication fails, and the task is terminated; the comparison is passed according to the user identity information id u Invoking a hash function to calculate the hash value M of the user idu Based on the public key pk of user, signature verification algorithm is adopted u And hash value M idu For signature value sigma idu Checking the signature, and if the signature verification fails, terminating the task; if the verification signature is successful, the identity authentication is completed;
the notarization server node IDS responds to the signature task, and receives the user signature value sigma sent by the business server node BS u Service node signature value sigma bs And the electronic file M, and the notarization server calculates a hash value H of the electronic file M 0 (M) according to the user public key pk u And H 0 (M) invoking a signature verification algorithm to sign the user value sigma u Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, the notarization server side is based on the public key pk of the business server side bs And an electronic file hash value H 0 (M) invoking a signature verification algorithm to sign the service node value sigma bs Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, the notarization server side is based on the private key sk of the notarization server side ny And an electronic file hash value H 0 (M) invoking a signature algorithm to generate a notarized node signature value σ ny The method comprises the steps of carrying out a first treatment on the surface of the The notarization server side is based on the user signature value sigma u Notarized node signature value sigma ny And service node signature value sigma bs Invoking a signature synthesis algorithm to generate an integrated aggregate signature value sigma of all nodes;
in response to the verification task, the notarization server calculates a bilinear mapping function value e (sigma, g) of the elliptic curve 2 ) And e (H) 0 (M), apk), comparisonIf the equation is not satisfied, it indicates that the signature fails, and if the equation is satisfied, it indicates that the user U completes the valid signature of the file M through multi-node cooperation.
The invention has the beneficial effects that:
the multiparty safe calculation method of the invention is a decentralization operation mode. In the multiparty security calculation model based on multiple signatures, one complete signature can be completed only by jointly participating in calculation by any configured multiple calculation nodes, each calculation node is respectively provided with different entities for control and management, and no node has the centralized right, so that the possibility of false centering is avoided; because the user (i.e. the signer needing to carry out the electronic signature) is one of the necessary nodes in all the nodes, if the participation of the user is absent, the user cannot complete the complete signature once, otherwise, if the complete signature once is completed, the user is necessarily signed, thereby realizing non-repudiation of the electronic signature of the user and ensuring the reliability of the signature.
The method of the invention can take the trusted third party notarization as one of nodes of multiparty security calculation, participate in node operation, realize notarization participation of each user signature, thereby providing a foundation for proving the authenticity of the user electronic signature by taking a notarization institution as a proving person, and better meeting the actual demand of the electronic signature service in social production.
Additional features and advantages of the invention will be set forth in the detailed description which follows.
Drawings
The foregoing and other objects, features and advantages of the invention will be apparent from the following more particular descriptions of exemplary embodiments of the invention as illustrated in the accompanying drawings wherein like reference numbers generally represent like parts throughout the exemplary embodiments of the invention.
Fig. 1 shows a schematic diagram of the system architecture of the present invention.
Detailed Description
Preferred embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While the preferred embodiments of the present invention are shown in the drawings, it should be understood that the present invention may be embodied in various forms and should not be limited to the embodiments set forth herein.
The invention is composed of notarization service end nodes IDS, business service end nodes BS and user client end nodes, wherein, the notarization service end nodes IDS are controlled by a trusted third party notarization organization, the user client end nodes are controlled by users, and the business service end nodes BS can be 1 or more. The notarization service end node, the business service end node and the user client end node are preset with the same algorithm and parameters, and the method is as follows:
1. description of the algorithm
1.1 System initialization Algorithm Setup (1 l ) And (3) PP, generating common parameters required by the system.
1.2, set H 0 ,H 1 ,H 2 Three hash functions.
1.3 public private Key Generation Algorithm, KG (1 l ) - (sk, pk) for generating the private key as well as the public key.
1.4 public Key aggregation Algorithm Agg (pk 1 ,pk 2 ,…,pk n ) Ap, for generating an aggregated public key.
1.5 signature Algorithm Sign (PP, sk) i ,M)→σ i For generating a signature of the i-th signer.
1.6 signature Synthesis Algorithm Agg-Sign (PP, σ) 1 ,σ 2 ,…,σ n ) -sigma for generating an aggregate signature.
1.7, signature verification algorithm Verify (PP, σ, M, apk) →true/false for signature verification of validity of signature σ.
1.8, e are bilinear mapping functions of elliptic curves.
2. System initialization
System call Setup (1) l )→(e,p,G 1 ,G 2 ,G t ,g 1 ,g 2 ,H 0 ,H 1 ,H 2 ) Wherein (e, p, G) 1 ,G 2 ,G t ) Bilinear group of prime order p, g 1 ,g 2 G is respectively 1 ,G 2 Is the generator of (1), H 0 ,H 1 ,H 2 Is three hash functions, wherein H 0 :{0,1} * →G 1 ,H 1 :{0,1} * →Z p ,H 2 :(0,1} * →Z p ;
3. Key generation stage
3.1, notarization service end node IDS calls KG (1 l )→(sk ny ,pk ny ) Generating a public-private key pair of an IDS, wherein
3.2, service Server node BS invokes KG (1) l )→(sk bs ,pk bs ) Generating a public-private key pair of a BS, wherein
3.3, the user side inputs pin through the client side to call KG (1) l )→(sk u ,pk u ) Generating a public-private key pair of a user, wherein sk u =x u =H 2 (pin),
3.4, notarization service end node IDS calls Agg (pk) u ,pk ny ,pk bs ) Generating a complete public key apk after aggregation of all nodes;
4. user identity authentication
4.1, user U uses client node to input related identity information id u (name, identification card) and uses the client camera to collect facial recognition features f of the user U u ;
4.2 client invocation H 0 (id u )→M idu Call Sign (PP,sk u ,M idu )→σ idu Will be id u 、σ idu 、f u Sending to a notarization server node;
4.3, the notarization server node IDS uses the user identity information id u Facial recognition feature f u Comparing with a public security citizen identity information database, wherein the comparison is not passed, the identity authentication fails, and the task is terminated; the comparison pass is 4.4;
4.4 notarization Server node calls H 0 (id u )→M idu Calling Verify (PP, sigma idu ,M idu ,pk u ) Checking the signature by true/false, if the result is false, indicating that the signature verification fails, and terminating the task; if true, the verification signature is successful, and the identity authentication is completed;
5. signing
The user, the business service end node and the notarization service end node sign the electronic file M, and the steps are as follows;
5.1, user calls Sign (PP, sk) through client node u ,H 0 (M))→σ u Generating user signature value sigma u Whereina u =H 1 (pk u ,pk ny ,pk bs ,pk u ),x u =sk u Sigma is calculated as u M is sent to a service server node;
5.2, business service side calls Verify (PP, sigma) u ,H 0 (M),pk u ) Verifying the user signature by true/false, if the result is false, indicating that the verification of the signature fails, and terminating the task; if the result is true, the verification signature is successful, and the process continues to 5.3;
5.3, service Server calls Sign (PP, sk) bs ,H 0 (M))→σ bs Generating a service node signature value sigma bs Whereina bs =H 1 (pk bs ,pk u ,pk ny ,pk bs ),x bs =sk bs (II), (III), (V), (; will sigma u 、σ bs M is sent to a notarization server;
5.4 notarization Server calls Verify (PP, sigma) u ,H 0 (M),pk u ) Verifying the user signature by true/false, if the result is false, indicating that the verification of the signature fails, and terminating the task; if the result is true, the verification signature is successful, and the task continues to 5.5;
5.5 notarization Server calls Verify (PP, sigma) bs ,H 0 (M),pk bs ) Verifying the signature of the service server by true/false, if the result is false, indicating that the verification of the signature fails, and terminating the task; if the result is true, the verification signature is successful, and the task continues to 5.6;
5.6, notarization Server calls Sign (PP, sk) ny ,H 0 (M))→σ ny Generating notarized node signature value sigma ny Wherein, the method comprises the steps of, wherein,a ny =H 1 (pk ny ,pk u ,pk ny ,pk bs ),x ny =sk ny ;
5.7, notarization side calls Agg-Sign (PP, sigma) u ,σ ny ,σ bs ) Generating an aggregate signature value sigma for all nodes, wherein
6. Verification
Calculating the function e (sigma, g 2 ) And function e (H 0 Values of (M), apk), comparisonIf the equation is not satisfied, it indicates that the signature fails, and if the equation is satisfied, it indicates that the user U completes the valid signature of the file M through multi-node cooperation.
The method and the system break the authority centralization of the centralized server and eliminate the fake making capability of the server; the node quantity calculated by adopting multiple parties can be flexibly configured according to the needs, so that the needs of clients are better met; based on the trusted third party notarization as one of the operation participation nodes, the authenticity of the signature behavior can be directly visualized; by constructing an on-line reliable electronic signature system with decentralization, the trust cost is reduced, a user can safely sign an on-line remote electronic file without unconditionally entrusting trust to the system, and the signing action can be directly proved.
The foregoing description of embodiments of the invention has been presented for purposes of illustration and description, and is not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the various embodiments described.
Claims (9)
1. An electronic notarization document signing method based on decentralization multiparty security calculation and multiple signatures, which is characterized in that communication is carried out among a notarization service end node IDS, a user client node and a business service end node BS; characterized in that the method comprises the following steps:
s1, initializing a system: the system security parameter level is configured to generate a common parameter Setup (1 l )→(e,p,G 1 ,G 2 ,G t ,g 1 ,g 2 ,H 0 ,H 1 ,H 2 ) The method comprises the steps of carrying out a first treatment on the surface of the Wherein: (e, p, G) 1 ,G 2 ,G t ) Bilinear group of prime order p, g 1 ,g 2 G is respectively 1 ,G 2 Is the generator of (1), H 0 ,H 1 ,H 2 Are all hash functions, wherein H 0 :{0,1} * →G 1 ,H 1 :{0,1} * →Z p ,H 2 :{0,1} * →Z p ;
S2, a key generation step:
2.1 notarization service end sectionThe point IDS invokes the public-private key generation algorithm to generate an IDS public-private key pair (sk ny ,pk ny );
2.2, the service server node BS calls a public-private key generation algorithm to generate a public-private key pair (sk) of the BS bs ,pk bs );
2.3, the user inputs the pin code through the client, and calls the public and private key generation algorithm to generate the public and private key pair (sk) of the user u ,pk u );
2.4, invoking a public key aggregation algorithm by the notarization server node IDS to generate a complete public key apk after all nodes are aggregated;
s3, user identity authentication:
3.1, user U inputs identity information id through client u And uses the client camera to collect the facial recognition characteristic f of the user U u ;
3.2, the client calls a hash function to calculate the hash value M of the user idu The method comprises the steps of carrying out a first treatment on the surface of the Obtaining signature value sigma of user by adopting signature algorithm idu The method comprises the steps of carrying out a first treatment on the surface of the Id of user identity information u Signature value sigma idu Facial recognition feature f u Sending to a notarization server node;
3.3, the notarization server node IDS uses the user identity information id u Facial recognition feature f u Comparing with a public security citizen identity information database, wherein the comparison is not passed, the identity authentication fails, and the task is terminated; the comparison pass is 3.4;
3.4, the notarization server node IDS is according to the user identity information id u Invoking a hash function to calculate the hash value M of the user idu Based on the public key pk of user, signature verification algorithm is adopted u And hash value M idu For signature value sigma idu Checking the signature, and if the signature verification fails, terminating the task; if the verification signature is successful, the identity authentication is completed;
s4, signature step: user id u Signing the electronic file M by the notarization server node IDS and the business server node BS respectively, wherein the steps are as follows;
4.1, the user calculates the hash value H of the electronic file M through the client node 0 (M) according to the user private key sk u And an electronic file hash value H 0 (M) signing the electronic document to produce a user signature value sigma u Sigma is calculated as u M is sent to a service server node;
4.2, the service server calculates the hash value H of the electronic file M 0 (M) and according to the user public key pk u And H 0 (M) invoking a signature verification algorithm to sign the user value sigma u Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, continuing 4.3;
4.3, the business server side uses the private key sk of the business server side bs And an electronic file hash value H 0 (M) invoking a signature algorithm to calculate a service node signature value sigma bs The method comprises the steps of carrying out a first treatment on the surface of the Will sigma u 、σ bs M is sent to a notarization server;
4.4, the notarization server calculates the hash value H of the electronic file M 0 (M) according to the user public key pk u And H 0 (M) invoking a signature verification algorithm to sign the user value sigma u Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, the task continues 4.5;
4.5, the notarization server side uses the public key pk of the business server side bs And an electronic file hash value H 0 (M) invoking a signature verification algorithm to sign the service node value sigma bs Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, the task continues 4.6;
4.6, the notarization server side uses the private key sk of the notarization server side ny And an electronic file hash value H 0 (M) invoking a signature algorithm to generate a notarized node signature value σ ny ;
4.7, the notarization server side is based on the user signature value sigma u Notarized node signature value sigma ny And service node signature value sigma bs Invoking a signature synthesis algorithm to generate an integrated aggregate signature value sigma of all nodes; s5, verification:
the notarization server calculates bilinear mapping function value e (sigma, g) of elliptic curve 2 ) And e (H) 0 (M), apk), comparisonIf the equation is not satisfied, it indicates that the signature fails, and if the equation is satisfied, it indicates that the user U completes the valid signature of the file M through multi-node cooperation.
2. The method for signing an electronic document based on decentralized multi-party security computation and multi-signature as defined in claim 1, wherein the security parameter level is l and l is 1024 bits.
3. The method for signing an electronic notarized document based on decentralized multiparty security computation and multiple signatures as recited in claim 1, wherein the identity information id u Including name and identification card number.
4. The method for signing an electronic document based on decentralized multi-party security computation and multi-signature as recited in claim 1, wherein said service end node BS is one or more.
5. The method for signing an electronic notarized document based on decentralized multi-party security computation and multi-signature as defined in claim 1, wherein said notarization server node IDS is configured in a trusted third party notarization authority.
6. An electronic notarization document signing system based on decentralization multiparty security calculation and multiple signatures, which is characterized in that: the system includes;
and a system initialization module: the system security parameter level is configured to generate a common parameter Setup (1 l )→(e,p,G 1 ,G 2 ,G t ,g 1 ,g 2 ,H 0 ,H 1 ,H 2 ) The method comprises the steps of carrying out a first treatment on the surface of the Wherein: (e, p, G) 1 ,G 2 ,G t ) Bilinear group of prime order p, g 1 ,g 2 G is respectively 1 ,G 2 Is the generator of (1), H 0 ,H 1 ,H 2 Are all hash functions, wherein H 0 :{0,1} * →G 1 ,H 1 :{0,1} * →Z p ,H 2 :{0,1} * →Z p ;
A key generation module:
the public and private key generation algorithm is called by the public and private server node IDS to generate an IDS public and private key pair (sk) ny ,pk ny );
The service server node BS invokes the public-private key generation algorithm to generate a public-private key pair (sk) of the BS bs ,pk bs );
The client receives the pin code input by the user, and invokes the public-private key generation algorithm to generate a public-private key pair (sk) of the user u ,pk u );
The public certificate server node IDS calls a public key aggregation algorithm to generate a complete public key apk after all nodes are aggregated;
and a user identity authentication module:
the client receives the identity information id input by the user U u And uses the client camera to collect the facial recognition characteristic f of the user U u ;
Client side calls hash function to calculate hash value M of user idu The method comprises the steps of carrying out a first treatment on the surface of the Obtaining signature value sigma of user by adopting signature algorithm idu The method comprises the steps of carrying out a first treatment on the surface of the Id of user identity information u Signature value sigma idu Facial recognition feature f u Sending to a notarization server node;
the notarization server node IDS uses the user identity information id u Facial recognition feature f u Comparing with a public security citizen identity information database, wherein the comparison is not passed, the identity authentication fails, and the task is terminated; the comparison is passed according to the user identity information id u Invoking a hash function to calculate the hash value M of the user idu Based on the public key pk of user, signature verification algorithm is adopted u And hash value M idu For signature value sigma idu Checking the signature, and if the signature verification fails, terminating the task; if the verification signature is successful, the identity authentication is completed;
signature module: user id u Signing the electronic file M by the notarization server node IDS and the business server node BS respectively;
the user client calculates the hash value H of the electronic file M 0 (M) according to the user private key sk u And an electronic file hash value H 0 (M) signing the electronic document to produce a user signature value sigma u Sigma is calculated as u M is sent to a service server node;
the business server calculates the hash value H of the electronic file M 0 (M) and according to the user public key pk u And H 0 (M) invoking a signature verification algorithm to sign the user value sigma u Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, the private key sk of the service server is used for verifying the signature bs And an electronic file hash value H 0 (M) invoking a signature algorithm to calculate a service node signature value sigma bs The method comprises the steps of carrying out a first treatment on the surface of the Will sigma u 、σ bs M is sent to a notarization server;
the notarization server calculates the hash value H of the electronic file M 0 (M) according to the user public key pk u And H 0 (M) invoking a signature verification algorithm to sign the user value sigma u Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, the notarization server side is based on the public key pk of the business server side bs And an electronic file hash value H 0 (M) invoking a signature verification algorithm to sign the service node value sigma bs Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, the notarization server side is based on the private key sk of the notarization server side ny And an electronic file hash value H 0 (M) invoking a signature algorithm to generate a notarized node signature value σ ny The method comprises the steps of carrying out a first treatment on the surface of the The notarization server side is based on the user signature value sigma u Notarized node signature value sigma ny And service node signature value sigma bs Invoking a signature synthesis algorithm to generate an integrated aggregate signature value sigma of all nodes;
and (3) a verification module: the notarization server calculates bilinear mapping function value e (sigma, g) of elliptic curve 2 ) And e (H) 0 (M), apk), comparisonIf the equation is not satisfied, it indicates that the signature failed, ifAnd if the equation is true, the user U completes the effective signature of the file M through multi-node cooperation.
7. A business server for use in an electronic document signing method based on decentralized multi-party security computation and multi-signature as claimed in any one of claims 1 to 5, wherein:
the service server is configured with system parameters;
in response to the key generation task, the service server node BS invokes a public-private key generation algorithm to generate a public-private key pair (sk) of the BS bs ,pk bs ) And send to the notarization server node IDS;
the service server node BS responds to the signature task, and the service server receives the electronic file M and the user signature value σ sent by the user client u The method comprises the steps of carrying out a first treatment on the surface of the Calculating a hash value H of an electronic file M 0 (M) and according to the user public key pk u And H 0 (M) invoking a signature verification algorithm to sign the user value sigma u Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, the private key sk of the service server is used for verifying the signature bs And an electronic file hash value H 0 (M) invoking a signature algorithm to calculate a service node signature value sigma bs The method comprises the steps of carrying out a first treatment on the surface of the Will sigma u 、σ bs And M is sent to the notarization server.
8. A user client for use in an electronic document signing method based on a decentralised multiparty security computation and multiple signatures as claimed in any one of claims 1 to 5, wherein:
the user client is configured with system parameters;
the client responds to the key generation task, receives the pin code input by the user, and invokes the public-private key generation algorithm to generate a public-private key pair (sk) of the user u ,pk u ) And send to the notarization server node IDS;
the client responds to the user identity authentication task and receives identity information id input by the user U u And uses the client camera to collect the facial recognition characteristic f of the user U u The method comprises the steps of carrying out a first treatment on the surface of the Invoking a hashFunction calculation of hash value M of user idu The method comprises the steps of carrying out a first treatment on the surface of the Obtaining signature value sigma of user by adopting signature algorithm idu The method comprises the steps of carrying out a first treatment on the surface of the Id of user identity information u Signature value sigma idu Facial recognition feature f u Sending to a notarization server node;
the client responds to the signature task, and the user client calculates a hash value H of the electronic file M 0 (M) according to the user private key sk u And an electronic file hash value H 0 (M) signing the electronic document to produce a user signature value sigma u Sigma is calculated as u M is sent to the service end node.
9. A notarization server for use in an electronic notarization document signing method based on a decentralization multiparty security computation and multiple signatures as claimed in any one of claims 1-5, wherein:
the notarization server is configured with system parameters;
in response to the key generation task, the public and private key generation algorithm is called by the public and private server node IDS to generate an IDS public and private key pair (sk ny ,pk ny ) The method comprises the steps of carrying out a first treatment on the surface of the Public-private key pair (sk) of receiving service server node BS bs ,pk bs ) And the public-private key pair (sk) of the user u ,pk u ) Calling a public key aggregation algorithm to generate a complete public key apk after aggregation of all nodes;
the notarization server node IDS responds to the user identity authentication task and receives the user identity information id sent by the client u Signature value sigma idu Facial recognition feature f u The method comprises the steps of carrying out a first treatment on the surface of the Id of user identity information u Facial recognition feature f u Comparing with a public security citizen identity information database, wherein the comparison is not passed, the identity authentication fails, and the task is terminated; the comparison is passed according to the user identity information id u Invoking a hash function to calculate the hash value M of the user idu Based on the public key pk of user, signature verification algorithm is adopted u And hash value M idu For signature value sigma idu Checking the signature, and if the signature verification fails, terminating the task; if the verification signature is successful, the identity authentication is completed;
notarization server node IDS responds to the signature task, and the notarization server node IDS receives a user signature value sigma sent by the business server node BS u Service node signature value sigma bs And the electronic file M, and the notarization server calculates a hash value H of the electronic file M 0 (M) according to the user public key pk u And H 0 (M) invoking a signature verification algorithm to sign the user value sigma u Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, the notarization server side is based on the public key pk of the business server side bs And an electronic file hash value H 0 (M) invoking a signature verification algorithm to sign the service node value sigma bs Verifying, if the verification signature fails, terminating the task; if the verification signature is successful, the notarization server side is based on the private key sk of the notarization server side ny And an electronic file hash value H 0 (M) invoking a signature algorithm to generate a notarized node signature value σ ny The method comprises the steps of carrying out a first treatment on the surface of the The notarization server side is based on the user signature value sigma u Notarized node signature value sigma ny And service node signature value sigma bs Invoking a signature synthesis algorithm to generate an integrated aggregate signature value sigma of all nodes;
in response to the verification task, the notarization server calculates a bilinear mapping function value e (sigma, g) of the elliptic curve 2 ) And e (H) 0 (M), apk), comparisonIf the equation is not satisfied, it indicates that the signature fails, and if the equation is satisfied, it indicates that the user U completes the valid signature of the file M through multi-node cooperation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110857911.6A CN113609499B (en) | 2021-07-28 | 2021-07-28 | Electronic notarization document signing method and system based on decentralization multiparty security calculation and multiple signatures |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110857911.6A CN113609499B (en) | 2021-07-28 | 2021-07-28 | Electronic notarization document signing method and system based on decentralization multiparty security calculation and multiple signatures |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113609499A CN113609499A (en) | 2021-11-05 |
CN113609499B true CN113609499B (en) | 2024-03-01 |
Family
ID=78305805
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110857911.6A Active CN113609499B (en) | 2021-07-28 | 2021-07-28 | Electronic notarization document signing method and system based on decentralization multiparty security calculation and multiple signatures |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113609499B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114785518B (en) * | 2022-04-11 | 2024-06-11 | 江苏慧世联网络科技有限公司 | Decentralizing electronic notarization signature method, system and node |
CN117692152B (en) * | 2024-02-04 | 2024-05-31 | 杭州天谷信息科技有限公司 | Signature verification network-based signature method, signature verification method and certificate issuing method |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107707360A (en) * | 2017-11-10 | 2018-02-16 | 西安电子科技大学 | Isomerization polymerization label decryption method under environment of internet of things |
CN110097362A (en) * | 2019-04-11 | 2019-08-06 | 南京信息工程大学 | The method of block chain size is compressed based on the orderly aggregate signature of Designated-Verifier |
CN110098932A (en) * | 2019-05-16 | 2019-08-06 | 江苏慧世联网络科技有限公司 | A kind of electronic document signature method based on safe electronic notarization technology |
CN110912711A (en) * | 2019-12-11 | 2020-03-24 | 江苏慧世联网络科技有限公司 | Cross-internal and external network domain electronic document signing method based on electronic notarization technology |
CN111245625A (en) * | 2020-01-20 | 2020-06-05 | 陕西师范大学 | Digital signature method without certificate aggregation |
CN111817857A (en) * | 2020-07-03 | 2020-10-23 | 江苏慧世联网络科技有限公司 | Electronic document signing method based on electronic notarization and SM2 collaborative signature and server adopted by same |
CN111898968A (en) * | 2020-06-22 | 2020-11-06 | 国家电网有限公司 | Intranet electronic document signing method and system based on electronic notarization system |
CN112446052A (en) * | 2021-01-29 | 2021-03-05 | 东方微电科技(武汉)有限公司 | Aggregated signature method and system suitable for secret-related information system |
-
2021
- 2021-07-28 CN CN202110857911.6A patent/CN113609499B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107707360A (en) * | 2017-11-10 | 2018-02-16 | 西安电子科技大学 | Isomerization polymerization label decryption method under environment of internet of things |
CN110097362A (en) * | 2019-04-11 | 2019-08-06 | 南京信息工程大学 | The method of block chain size is compressed based on the orderly aggregate signature of Designated-Verifier |
CN110098932A (en) * | 2019-05-16 | 2019-08-06 | 江苏慧世联网络科技有限公司 | A kind of electronic document signature method based on safe electronic notarization technology |
CN110912711A (en) * | 2019-12-11 | 2020-03-24 | 江苏慧世联网络科技有限公司 | Cross-internal and external network domain electronic document signing method based on electronic notarization technology |
CN111245625A (en) * | 2020-01-20 | 2020-06-05 | 陕西师范大学 | Digital signature method without certificate aggregation |
CN111898968A (en) * | 2020-06-22 | 2020-11-06 | 国家电网有限公司 | Intranet electronic document signing method and system based on electronic notarization system |
CN111817857A (en) * | 2020-07-03 | 2020-10-23 | 江苏慧世联网络科技有限公司 | Electronic document signing method based on electronic notarization and SM2 collaborative signature and server adopted by same |
CN112446052A (en) * | 2021-01-29 | 2021-03-05 | 东方微电科技(武汉)有限公司 | Aggregated signature method and system suitable for secret-related information system |
Also Published As
Publication number | Publication date |
---|---|
CN113609499A (en) | 2021-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5907830B2 (en) | Signature generation verification system and signature verification apparatus | |
KR0146437B1 (en) | Identification scheme, digital signature giving message recovery scheme, digital signature with appendix schemie, key exchange scheme,.. | |
CN108989050B (en) | Certificateless digital signature method | |
US7533270B2 (en) | Signature schemes using bilinear mappings | |
Xiao et al. | Secure and efficient multi-signature schemes for fabric: An enterprise blockchain platform | |
CN111934877B (en) | SM2 collaborative threshold signature method, storage medium and electronic device | |
CN113609499B (en) | Electronic notarization document signing method and system based on decentralization multiparty security calculation and multiple signatures | |
CN113360943A (en) | Block chain private data protection method and device | |
CN115174104A (en) | Attribute-based online/offline signature method and system based on secret SM9 | |
WO2022089865A1 (en) | Identifying denial-of-service attacks | |
CN110851859B (en) | Authentication method of distributed authority node block chain system with (n, t) threshold | |
CN111626737A (en) | Efficient cross-chain authentication method capable of adding identity attributes | |
CN111917550A (en) | Certificateless cluster signature bilinear-free authentication method and system | |
CN112989436B (en) | Multi-signature method based on block chain platform | |
CN112184245B (en) | Transaction identity confirmation method and device for cross-region block chain | |
CN112434281A (en) | Multi-factor identity authentication method oriented to alliance chain | |
CN109978518B (en) | Implicit certificate distribution method and system | |
JP2003513480A (en) | A method for proving the authenticity of an entity and / or the integrity of a message | |
CN112383403A (en) | Heterogeneous ring signature method | |
CN116827559A (en) | Efficient verifiable time signature method and system based on BLS | |
CN116662950A (en) | Identity authentication method and device based on blockchain | |
CN116318736A (en) | Two-level threshold signature method and device for hierarchical management | |
Beresneva et al. | Special digital signature schemes based on GOST R 34.10-2012 | |
CN115795557A (en) | Electronic notarization text bookmark deployment method and system based on decentralized threshold multi-party signature | |
CN108737103B (en) | SM2 algorithm signature method applied to CS framework |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |