CN113987594A - Block chain signature management method and device - Google Patents
Block chain signature management method and device Download PDFInfo
- Publication number
- CN113987594A CN113987594A CN202111244948.8A CN202111244948A CN113987594A CN 113987594 A CN113987594 A CN 113987594A CN 202111244948 A CN202111244948 A CN 202111244948A CN 113987594 A CN113987594 A CN 113987594A
- Authority
- CN
- China
- Prior art keywords
- task
- task execution
- execution device
- signature
- devices
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000007726 management method Methods 0.000 title claims abstract description 49
- 230000000977 initiatory effect Effects 0.000 claims abstract description 46
- 238000000034 method Methods 0.000 claims abstract description 36
- 230000002776 aggregation Effects 0.000 claims abstract description 26
- 238000004220 aggregation Methods 0.000 claims abstract description 26
- 238000012545 processing Methods 0.000 claims description 33
- 108010015046 cell aggregation factors Proteins 0.000 claims description 17
- 238000003860 storage Methods 0.000 claims description 10
- 230000008569 process Effects 0.000 claims description 9
- 238000010586 diagram Methods 0.000 description 11
- 239000003999 initiator Substances 0.000 description 11
- 238000004590 computer program Methods 0.000 description 9
- 238000004422 calculation algorithm Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 230000002452 interceptive effect Effects 0.000 description 6
- 230000004931 aggregating effect Effects 0.000 description 5
- 238000004364 calculation method Methods 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 108091028043 Nucleic acid sequence Proteins 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000001712 DNA sequencing Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 238000006116 polymerization reaction Methods 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 108020004414 DNA Proteins 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000014509 gene expression Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000000379 polymerizing effect Effects 0.000 description 1
- 108090000623 proteins and genes Proteins 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Storage Device Security (AREA)
Abstract
The application provides a block chain signature management method and a block chain signature management device, which are applied to a task management system and comprise the following steps: the system comprises a task initiating device and N task executing devices; the first task execution device obtains a first parameter, the first parameter including: the task management method comprises the following steps that subtask information of a first task execution device and a symmetric key factor of the first task execution device are obtained, and the first task execution device is any one of N task execution devices; determining a symmetric key of the first task execution device according to the first random number and the symmetric key factor of the first task execution device; encrypting the subtasks completed by the first task execution equipment according to the symmetric key of the first task execution equipment, and determining an encrypted subtask; obtaining the encrypted subtasks of the N task execution devices, splicing, and determining an aggregation task; and signing the aggregation task, and determining that the first task executes the device task signature. The method can improve the efficiency of signature and ensure the security of signature information.
Description
Technical Field
The invention relates to the field of financial technology (Fintech), in particular to a block chain signature management method and device.
Background
With the development and progress of computers, technologies such as big data, block chains, artificial intelligence and the like are applied to production and life in a large quantity, and people pay more and more attention to the safety of information. In order to ensure the safety of information, data can be encrypted through a signature.
In a block chain, a message can be signed in multiple ways to realize encryption processing of the message, and related technologies provide an asymmetric encryption algorithm, wherein a public key and a private key are selected on an elliptic curve taking G as a base point, and the signature algorithm has high efficiency and is only suitable for one signing party. For example, when multiple participants are required for a task (e.g., voting, auction, gene sequencing, etc.), multiple participants are required to sign the same message, and each participant signs serially, i.e., starting with the second participant, each participant signs the signature of the previous participant again, and the signature is verified in the reverse order, one by one, to verify whether the signature of each participant passes. The mutual waiting time of serial signatures is long, data is enlarged due to the fact that the signatures are signed once, the signature speed is correspondingly slowed down, and the overall performance of a network is affected.
Disclosure of Invention
The application provides a block chain signature management method and device, which are used for improving signature efficiency.
In a first aspect, the present application provides a block chain signature management method, which is applied to a task management system, where the task management system includes: the system comprises a task initiating device and N task executing devices; n is a positive integer, N is greater than or equal to 2, comprising:
the first task execution device obtains a first parameter, the first parameter including: subtask information of the first task execution device, a symmetric key factor of the first task execution device; the first task execution device is any one of the N task execution devices; determining a symmetric key of the first task execution device according to the first random number and the symmetric key factor of the first task execution device; encrypting the subtasks completed by the first task execution equipment according to the symmetric key of the first task execution equipment, and determining an encrypted subtask; acquiring encryption subtasks of N task execution devices, splicing, and determining an aggregation task; and signing the aggregation task, and determining that the first task executes the device task signature.
It should be noted that the block chain signature management method may be applied to a task management system, where the task management system includes a task initiating device and a plurality of task executing devices, and the task executing devices may initiate task information, such as: tasks such as election and auction can be executed by the task execution device, and after all task execution devices in the task management system complete the tasks, task execution results can be published, such as: results of elections, auctions, etc. are published, and the application is not specifically limited herein as to the type of task.
According to the method, after each task execution device obtains subtask information and a symmetric key factor, a symmetric key is determined according to a first random number generated by each task execution device and the symmetric key factor from the task initiating device, the completed subtasks are encrypted based on the symmetric key, the encrypted subtasks are determined, the task execution devices obtain the encrypted subtasks of other task execution devices and perform splicing processing, an aggregation task is determined, the aggregation task is signed to obtain a signature task, the signature processing is performed on the tasks through the method instead of serial signature, the signature efficiency can be improved, and the interactive information among the task execution devices is the encrypted subtasks, and the safety of the interactive information can be guaranteed.
In an optional manner, before the first task execution device obtains the first parameter, the first task execution device further verifies whether the task initiation device has the task information according to the block chain account information of the task initiation device and the public key of the task initiation device; if the task information exists, performing signature processing on the task information through a private key of the first task execution device to obtain signature data, and storing the signature data in a block chain account of the first task execution device; broadcasting a public key of the first task execution device.
It should be noted that the task execution device also needs to verify the identity of the task initiator before executing the subtask to ensure that the task initiator really issues the task information, and after determining that the task initiator definitely issues the task information, the task execution device signs the task information, i.e. claims the task, and broadcasts the public key information in the block chain, so that the task execution device and other task execution devices know that the task execution device can execute the task. This way the security of the execution device can be guaranteed.
In an optional manner, the first task execution device obtains the encrypted subtasks of the N task execution devices and then performs a splicing process, and before determining the aggregated task, the first task execution device also obtains the public key of the task execution device other than the first task execution device; and after the encryption processing is respectively carried out on the subtasks of the first task execution device by adopting the public keys of the task execution devices except the first task execution device, the subtasks are distributed to the corresponding task execution devices.
It should be noted that, the first task execution device encrypts the subtasks that have been executed by the first task execution device using the public key information of the other task execution devices, and distributes the encrypted subtasks to the other task execution devices, so that any task execution device can obtain the subtask information that has been executed by all the task execution devices, and can decrypt the subtasks of the other task execution devices by using the respective private key, so as to obtain all the execution result information.
In an alternative, the first task execution device further generates an intermediate factor according to the second random number, and stores the intermediate factor in the block chain.
By generating the intermediate factor and storing the intermediate factor in the block chain, the encryption subtask of the first task execution device is decrypted, and the data processing efficiency is improved.
In an optional manner, the first task execution device may aggregate public keys of the N task execution devices, and determine an aggregated public key; determining an aggregation factor, wherein the aggregation factor is determined according to the third random numbers of the N task execution devices; and signing the aggregation task according to the aggregation public key, the third random number of the first task execution device and the aggregation factor, and determining the task signature of the first task execution device.
In the application, after the task is aggregated, the aggregated task is signed by aggregating the public key, the aggregation factor and the third random number, so that the safety of the task can be ensured.
In an optional manner, the first task execution device may further obtain an intermediate factor and a fourth random number, where the fourth random number is used to generate a symmetric key factor of the task execution devices other than the first task execution device; determining a symmetric key of the task execution equipment except the first task execution equipment according to the intermediate factor and the fourth random number; and decrypting the encrypted subtasks of the task execution devices except the first task execution device by using the symmetric keys of the task execution devices except the first task execution device to obtain decrypted subtask results.
In the application, the encrypted subtask is decrypted based on the intermediate factor and the fourth random number, and the task result is determined, so that the data processing efficiency can be improved.
In an alternative, the symmetric key factor of the first task execution device is determined by a modulo operation.
Determining the symmetric key factor by modulo arithmetic may improve the security of data processing.
In a second aspect, the present application provides a block chain signature management apparatus, which is applied to a task management system, where the task management system includes: the system comprises a task initiating device and N task executing devices; n is a positive integer, N is greater than or equal to 2, comprising:
an obtaining unit, configured to obtain a first parameter, where the first parameter includes: subtask information of the first task execution device, a symmetric key factor of the first task execution device; the first task execution device is any one of the N task execution devices; a determining unit, configured to determine a symmetric key of the first task execution device according to the first random number and a symmetric key factor of the first task execution device; the encryption unit is used for encrypting the subtasks completed by the first task execution equipment according to the symmetric key of the first task execution equipment and determining the encrypted subtasks; the splicing unit is used for obtaining the encrypted subtasks of the N task execution devices and then splicing the encrypted subtasks to determine an aggregation task; and the signature unit is used for signing the aggregation task and determining that the first task executes the equipment task signature.
In an optional manner, the block chain signature management apparatus further includes: the verification unit is used for verifying whether the task initiating device has the task information or not according to the block chain account information of the task initiating device and the public key of the task initiating device; if the task information exists, performing signature processing on the task information through a private key of the first task execution device to obtain signature data, and storing the signature data in a block chain account of the first task execution device; broadcasting a public key of the first task execution device.
In an optional manner, the block chain signature management apparatus further includes: a distribution unit configured to acquire a public key of a task execution device other than the first task execution device; and after the encryption processing is respectively carried out on the subtasks of the first task execution device by adopting the public keys of the task execution devices except the first task execution device, the subtasks are distributed to the corresponding task execution devices.
In an optional manner, the block chain signature management apparatus further includes: and the generating unit is used for generating an intermediate factor according to the second random number and storing the intermediate factor in the block chain.
In an optional manner, the signature unit is specifically configured to aggregate public keys of the N task execution devices, and determine an aggregated public key; determining an aggregation factor, wherein the aggregation factor is determined according to the third random numbers of the N task execution devices; and signing the aggregation task according to the aggregation public key, the third random number of the first task execution device and the aggregation factor, and determining the task signature of the first task execution device.
In an optional manner, the block chain signature management apparatus further includes: a decryption unit, configured to obtain the intermediate factor and a fourth random number, where the fourth random number is used to generate a symmetric key factor of the task execution device other than the first task execution device; determining a symmetric key of the task execution equipment except the first task execution equipment according to the intermediate factor and the fourth random number; and decrypting the encrypted subtasks of the task execution devices except the first task execution device by using the symmetric keys of the task execution devices except the first task execution device to obtain decrypted subtask results.
In an alternative, the symmetric key factor of the first task execution device is determined by a modulo operation.
In a third aspect, the present application provides a computing device comprising: a memory and a processor; a memory for storing program instructions; a processor for calling the program instructions stored in the memory and executing the method of the first aspect according to the obtained program.
In a fourth aspect, the present application provides a computer storage medium storing computer-executable instructions for performing the method of the first aspect.
For technical effects that can be achieved by the second aspect to the fourth aspect, please refer to a description of the technical effects that can be achieved by a corresponding possible design scheme in the first aspect, and the description of the technical effects is not repeated herein.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic architecture diagram of a task management system according to an embodiment of the present application;
fig. 2 is a schematic flowchart illustrating a block chain signature management method according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a block chain signature management apparatus according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of a computing device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention.
It should be noted that the terms "first," "second," and the like in this application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein are capable of operation in sequences other than those illustrated or otherwise described herein. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
As described in the background art, when tasks of multiple participants can be encrypted by using an asymmetric encryption algorithm, serial signatures are required, and this method is slow in signature speed, large in signed data volume, and slow in data processing efficiency. In addition, the related art also proposes to perform signature by using an aggregate signature algorithm, each party of a plurality of signature parties has a pair of public and private keys and a random number, each signature party uses its own private key to perform signature on a message and the random number, the public keys of the signature parties need to be aggregated to generate an aggregate public key when the signature is verified, the random numbers are aggregated to form an aggregate random number, and meanwhile, the signature information of the signature parties is aggregated and then verified.
The block chain signature management process is described in detail below. In the following embodiments of the present application, "and/or" describes an association relationship of associated objects, indicating that three relationships may exist, for example, a and/or B may indicate: a exists alone, A and B exist simultaneously, and B exists alone, wherein A and B can be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a-b, a-c, b-c, or a-b-c, wherein a, b, c may be single or multiple. The singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, such as "one or more", unless the context clearly indicates otherwise. And, unless stated to the contrary, the embodiments of the present application refer to the ordinal numbers "first", "second", etc., for distinguishing a plurality of objects, and do not limit the sequence, timing, priority, or importance of the plurality of objects. For example, the first task execution device and the second task execution device are only for distinguishing different task execution devices, and do not indicate a difference in priority, degree of importance, or the like between the two task execution devices.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
To better illustrate the concepts of the present application, the terms used in the present application are now explained as follows:
public and private key pair: the task initiating device and the task executing device in the task management system use the own elliptic curve public and private keys to sign the message and verify the signature of the other party.
Block chains: the blockchain is publicly transparent, all devices can read all data stored on the blockchain, and can verify which device writes.
Symmetric encryption: the encryption key and the decryption key of the symmetric encryption algorithm are the same. The symmetric key is a random number generated by the task initiating device and the task executing device respectively, and then an intermediate factor is obtained through calculation according to a modular operation rule. The two parties exchange the intermediate factors and respectively calculate to obtain the password. Revealing the intermediate factor does not reveal the key. And each task execution device transmits the signature information to the task initiating device by adopting the symmetric signature encryption message, so that the task of the task execution device is ensured not to be revealed to competitors. And the subtasks can be aggregated, and whether the total task is completed or not can be verified.
Aggregating signatures: each signing party of the aggregation signature algorithm has a public and private key and a random number. Each signer signs the same message and the random number and then broadcasts signature information, the random number and the public key. The verifier aggregates the signature information, the random number and the public key. If the aggregated signature information can be verified using the aggregated public key and random number, it can be proven that all signers signed the message.
The block chain signature management method mentioned in this application may be applied to a task management system that requires multiple participants to execute, where the task management system may include, as shown in fig. 1, 1 task initiating device and N (N is a positive integer, N is greater than or equal to 2) task executing devices, where the task initiating device may initiate tasks such as: voting, election, auction, virus DNA sequencing and the like, wherein after the N task execution devices execute the tasks, the task results can be determined. For example, the task initiated by the task initiating device is a vote, and there are 3 task executing devices participating in the vote, so that the task result can be determined after all 3 task executing devices complete the vote. In practical application, a timer can be set, when the timing is over, the task execution device does not vote, the task execution device is considered to abandon the right, and 3 task execution devices are not required to complete voting and determine the task result. In the method, each task execution device can decrypt the task result by itself without broadcasting by the task initiation device, and the reliability of task execution can be ensured by the method.
Fig. 2 is a block chain signature management method according to an embodiment of the present application, where the method may be executed by any one task execution device among N task execution devices, and a first task execution device is taken as an example to be described, and the method may be executed as follows:
It should be noted that the symmetric key factor in the first parameter is calculated by the task initiating device, and the first parameter may include a large prime number and the like for calculating the symmetric encryption key in addition to the above information, and the application is not limited in detail herein. The symmetric key factor may be determined by modulo arithmetic, e.g., the task initiator device may generate a random number r for each task performer, respectivelyx1,rx2,rx3And calculating a symmetric key factor a1,a2,a3. Wherein r isx1,rx2,rx3For other task-executing devices to compute a symmetric key during the authentication phase, a1,a2,a3Respectively used when 3 task execution devices calculate and obtain the symmetric key. Can calculateRefer to the following equation 1:
in an optional embodiment, before the first task execution device acquires the first parameter, it is further required to verify whether the task initiation device really has the task information, and the first task execution device may verify whether the task initiation device has the task information according to the blockchain account information of the task initiation device and the public key of the task initiation device; if the task information exists, performing signature processing on the task information through a private key of the first task execution device to obtain signature data, and storing the signature data in a block chain account of the first task execution device; broadcasting a public key of the first task execution device. It should be noted that the task execution device also needs to verify the identity of the task initiator before executing the subtask to ensure that the task initiator really issues the task information, and when determining that the task initiator determines to issue the task information, the task execution device performs signature processing on the task information, that is, claims the task, and broadcasts the public key information in the block chain, so that the task execution device and other task execution devices know that the task execution device can execute the task. The mode can ensure the safety of the task execution equipment. For example:
task initiating device x has public and private key pair SxAnd PxWherein P isx=G·Sx. Task initiating device x owns account address a in the blockchain systemx. Wherein A isx=hash(Px). The task initiating device has a task T, and i (i > 1) task executing devices y are needed to assist completion. Private key S for use by a task initiating devicexSigning, and mixing the signature data and public key PxUpLink to own Account AxAnd broadcasting, and waiting for the task execution equipment to verify. There are potentially several task-executing devices that verify the signature of the task-initiating device, compare the hash (P)x) And AxWhether the two are consistent or not, only the slave P is required due to the unidirectionality and strong collision resistance of the hash functionxA can be obtained by carrying out Hash calculationxThus, therefore, it isIf so, the task initiating device is proved to have the task. Suppose that there are 3 task execution devices y1,y2,y3(the same principle applies when i > 3). Each claimant has a private key SyiAnd a public key PyiAnd P isyi=G·Syi. All the 3 task execution devices sign the task T by using the private key of the 3 task execution devices, and store the signed data into the block chain account A of the 3 task execution devicesyiAnd sends its own public key PyiBroadcast, meaning that it is willing to claim the task. Other task performing devices and task initiating devices verify the acknowledgement.
The task initiating device x can select large prime numbers g and p for calculating the symmetric encryption key, divide the task into 3 parts of subtasks according to the number of the task executing devices, and use T respectively1,T2,T3Indicating, e.g. task T as voting, T1,T2,T3Are all voting elections; the task T is DNA sequencing, the sequence length of the DNA is Y, the DNA sequence can be divided into three sections, the length of each section can be Y/3, and T1Can be used for measuring DNA sequence with length of 0-Y/3, T2Can be used for measuring DNA sequence with length of Y/3-2Y/3, T3The DNA sequence of 2Y/3-Y length can be measured, which is only exemplified here, and how to divide the task into subtasks is not limited in detail. The task initiating device will separately generate { g, p, a under the blockchain1,T1},{g,p,a2,T2},{g,p,a3,T3That is, the first parameter is sent to 3 task execution devices.
Continuing with the above example, a is respectively obtained by 3 task execution devices1,a2,a3And a first random number ryiCalculatingGet respective symmetric encryption KeyiThe calculation can be referred to the following equation 2:
key is respectively obtained by 3 task execution devices1,Key2,Key3And is used for encrypting the subtask result completed by the user. Key is respectively used by 3 task execution devices1,Key2,Key3The subtask results completed by the user are encrypted as a symmetric encryption key to respectively obtain Ts1,Ts2,Ts3。
And step 204, obtaining the encrypted subtasks of the N task execution devices, splicing, and determining an aggregation task.
In an optional embodiment, the first task execution device obtains the encrypted subtasks of the N task execution devices and then performs the splicing process, and before determining the aggregated task, may also obtain the public key of the task execution devices other than the first task execution device; and after the encryption processing is respectively carried out on the subtasks of the first task execution device by adopting the public keys of the task execution devices except the first task execution device, the subtasks are distributed to the corresponding task execution devices.
For example, each task execution device encrypts its task result T with the public keys of the other 2 task execution devicessiSending the data to other corresponding task execution devices, and decrypting the data by the task execution device with the private key after the data is received by the task execution device to obtain TsiAnd finishing the result exchange of the encryption task. At this time, all of the 3 task execution devices have Ts1,Ts2,Ts3. 3 task execution devices are all ordered, spliced and aggregated TsiTo obtain an aggregated task Ts={Ts1||…||Tsi}。
It should be noted that the first task execution device encrypts the subtasks that have been executed by the first task execution device using the public key information of the other task execution devices, and distributes the encrypted subtasks to the other task execution devices, so that any task execution device can obtain the subtask information that has been executed by all the task execution devices. In addition, each task execution device can decrypt the subtasks of other task execution devices through the respective private key so as to obtain all execution result information, the data processing efficiency can be improved, and the subtasks executed by each task execution device are encrypted and then interacted, so that the information interaction safety can be ensured.
In an optional embodiment, the first task execution device aggregates public keys of the N task execution devices, and determines an aggregated public key; determining an aggregation factor, wherein the aggregation factor is determined according to the third random numbers of the N task execution devices; and signing the aggregation task according to the aggregation public key, the third random number of the first task execution device and the aggregation factor, and determining the task signature of the first task execution device.
For example, the task execution device generates the third random number kyiAnd calculate jyi=G·kyiAnd j isyiAnd storing the third random number on the block chain for other task execution devices to use when aggregating the third random number. All 3 task execution devices get j from the blockchainy1,jy2,jy3And polymerized to give Jy=jy1+jy2+jy3. The 3 task execution devices all aggregate the public keys of all the task execution devices to obtain an aggregated public key, and the calculation is performed according to a formula 3:
Py=Py1+Py2+Py3equation 3
The 3 task execution devices respectively perform the aggregation task TsSigning to obtain signy1,signy2,signy3The signature process can refer to equation 4:
signyi=kyi+hash(Py,Jy,Ts)·Syii is 1,2,3 formula 4
Then sign is respectively carried outy1,signy2,signy3Stored on the block chain. PyPolymerization obtained for polymerizationPublic key, JyAs a result of polymerization, TsIs an aggregated task. All 3 task execution devices acquire sign from the block chainy1,signy2,signy3And polymerizing them to obtain signy=signy1+signy2+signy3Polymeric random number JyAnd aggregate signature signyCan be verified by the task initiating device.
According to the method and the device, after each task execution device obtains subtask information and a symmetric key factor, a symmetric key is determined according to a first random number and the symmetric key factor, the completed subtask is encrypted based on the symmetric key, an encrypted subtask is determined, the task execution devices obtain encrypted subtasks of other task execution devices and perform splicing processing, and an aggregation task is determined. The aggregation task is signed to obtain a signature task, the task is signed in the mode instead of serial signature, the signature efficiency can be improved, and the safety of interactive information can be guaranteed because the interactive information among the task execution devices is an encryption subtask.
In an alternative embodiment, the first task execution device may generate an intermediate factor from the second random number and store the intermediate factor in the blockchain. For example, each task execution device generates a second random number ryiAnd with ryiSeparately calculated as factorsThe 3 task execution devices respectively obtain b1,b2,b3I.e. intermediate factor, and b1,b2,b3Stored on the block chain. r isyiFor use by a task execution device in computing a symmetric key, biFor use by other task execution devices in computing the symmetric key in the authentication phase.
The first task execution device may obtain the intermediate factor and a fourth random number, the fourth random number being used to generate a symmetric key factor for the task execution devices other than the first task execution device; determining a symmetric key of the task execution equipment except the first task execution equipment according to the intermediate factor and the fourth random number; and decrypting the encrypted subtasks of the task execution devices except the first task execution device by using the symmetric keys of the task execution devices except the first task execution device to obtain decrypted subtask results.
Continuing with the example above, the task initiator reads j of 3 task executors from the blockchainy1,jy2,jy3And 3 signature sign of task execution devicey1,signy2,signy3And polymerized to give Jy=jy1+jy2+jy3,signy=signy1+signy2+signy3. The task initiating device aggregates the public keys of the 3 task executing devicesy=Py1+Py2+Py3。
Task initiating device utilizing JyAnd PyVerifying the signature of the task execution equipment, if the signature passes, indicating that all the task execution equipment approves the encrypted subtask result, if the signature does not pass, failing the task, re-verifying the task, and aggregating the signature processing, namely the execution process. The verification process can be referred to equation 5:
signy·G=Jy+hash(Py,Jy,Ts)·Pyequation 5
After the verification is passed, the task initiating equipment sends the random number rx1,rx2,rx3And the encryption key is stored on the block chain and used for calculating the symmetric encryption key by the task execution device. All 3 task execution devices obtain random number r from block chainx1,rx2,rx3And b1,b2,b3. And then calculating a symmetric key for obtaining the encryption subtask result of other task execution equipment. The calculation process can refer to equation 6:
key capable of being used by 3 task execution devices1,Key2,Key3Decryption of Ts1,Ts2,Ts3Obtaining a plaintext task result T1,T2,T3. Any task execution device sends a task result T1,T2,T3And sending the data to the task initiating equipment to complete the task.
Based on the same concept, an embodiment of the present application provides a block chain signature management apparatus, as shown in fig. 3, including: an acquisition unit 31, a determination unit 32, an encryption unit 33, a concatenation unit 34, and a signature unit 35.
An obtaining unit 31, configured to obtain a first parameter, where the first parameter includes: subtask information of the first task execution device, a symmetric key factor of the first task execution device; the first task execution device is any one of the N task execution devices; a determining unit 32, configured to determine a symmetric key of the first task execution device according to the first random number and the symmetric key factor of the first task execution device; an encryption unit 33 configured to encrypt the subtask completed by the first task execution apparatus according to the symmetric key of the first task execution apparatus, and determine an encrypted subtask; the splicing unit 34 is configured to perform splicing processing after acquiring the encrypted subtasks of the N task execution devices, and determine an aggregation task; and the signature unit 35 is configured to sign the aggregated task and determine that the first task executes the device task signature.
It should be noted that the block chain signature management apparatus may be applied to a task management system, where the task management system includes a task initiating device and a plurality of task executing devices, and the task executing devices may initiate task information, such as: tasks such as election and auction can be executed by the task execution device, and after all task execution devices in the task management system complete the tasks, task execution results can be published, such as: results of elections, auctions, etc. are published, and the application is not specifically limited herein as to the type of task.
According to the method, after each task execution device obtains subtask information and a symmetric key factor, a symmetric key is determined according to a first random number generated by each task execution device and the symmetric key factor from the task initiating device, the completed subtasks are encrypted based on the symmetric key, the encrypted subtasks are determined, the task execution devices obtain the encrypted subtasks of other task execution devices and perform splicing processing, an aggregation task is determined, the aggregation task is signed to obtain a signature task, the signature processing is performed on the tasks through the method instead of serial signature, the signature efficiency can be improved, and the interactive information among the task execution devices is the encrypted subtasks, and the safety of the interactive information can be guaranteed.
In an optional manner, the block chain signature management apparatus further includes: the verification unit is used for verifying whether the task initiating device has the task information or not according to the block chain account information of the task initiating device and the public key of the task initiating device; if the task information exists, performing signature processing on the task information through a private key of the first task execution device to obtain signature data, and storing the signature data in a block chain account of the first task execution device; broadcasting a public key of the first task execution device.
It should be noted that the task execution device also needs to verify the identity of the task initiator before executing the subtask to ensure that the task initiator really issues the task information, and after determining that the task initiator definitely issues the task information, the task execution device signs the task information, i.e. claims the task, and broadcasts the public key information in the block chain, so that the task execution device and other task execution devices know that the task execution device can execute the task. The mode can ensure the safety of the task execution equipment.
In an optional manner, the block chain signature management apparatus further includes: a distribution unit configured to acquire a public key of a task execution device other than the first task execution device; and after the encryption processing is respectively carried out on the subtasks of the first task execution device by adopting the public keys of the task execution devices except the first task execution device, the subtasks are distributed to the corresponding task execution devices.
It should be noted that, the first task execution device encrypts the subtasks that have been executed by the first task execution device using the public key information of the other task execution devices, and distributes the encrypted subtasks to the other task execution devices, so that any task execution device can obtain the subtask information that has been executed by all the task execution devices, and can decrypt the subtasks of the other task execution devices by using the respective private key, so as to obtain all the execution result information.
In an optional manner, the block chain signature management apparatus further includes: and the generating unit is used for generating an intermediate factor according to the second random number and storing the intermediate factor in the block chain. By generating the intermediate factor and storing the intermediate factor in the block chain, the encryption subtask of the first task execution device is decrypted, and the data processing efficiency is improved.
In an optional manner, the signature unit 35 is specifically configured to aggregate public keys of the N task execution devices, and determine an aggregated public key; determining an aggregation factor, wherein the aggregation factor is determined according to the third random numbers of the N task execution devices; and signing the aggregation task according to the aggregation public key, the third random number of the first task execution device and the aggregation factor, and determining the task signature of the first task execution device.
In the application, after the task is aggregated, the aggregated task is signed by aggregating the public key, the aggregation factor and the third random number, so that the safety of the task can be ensured.
In an optional manner, the block chain signature management apparatus further includes: a decryption unit, configured to obtain the intermediate factor and a fourth random number, where the fourth random number is used to generate a symmetric key factor of the task execution device other than the first task execution device; determining a symmetric key of the task execution equipment except the first task execution equipment according to the intermediate factor and the fourth random number; and decrypting the encrypted subtasks of the task execution devices except the first task execution device by using the symmetric keys of the task execution devices except the first task execution device to obtain decrypted subtask results. According to the method and the device, the encrypted subtask is decrypted based on the intermediate factor and the fourth random number, the task result is determined, and the data processing efficiency can be improved.
In an alternative, the symmetric key factor of the first task execution device is determined by a modulo operation. Determining the symmetric key factor by modulo arithmetic may improve the security of data processing.
After introducing the block chain signature management method and apparatus in the exemplary embodiments of the present application, a computing device in another exemplary embodiment of the present application is introduced next.
As will be appreciated by one skilled in the art, aspects of the present application may be embodied as a system, method or program product. Accordingly, various aspects of the present application may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
In some possible implementations, a computing device according to the present application may include at least one processor, and at least one memory. Wherein the memory stores a computer program which, when executed by the processor, causes the processor to perform the steps of the block chain signature management method according to various exemplary embodiments of the present application described above in the present specification. For example, the processor may perform steps 201-205 as shown in fig. 2.
The computing device 130 according to this embodiment of the present application is described below with reference to fig. 4. The computing device 130 shown in fig. 4 is only an example and should not bring any limitations to the functionality or scope of use of the embodiments of the present application. As shown in fig. 4, the computing device 130 is embodied in the form of a general purpose smart terminal. Components of computing device 130 may include, but are not limited to: the at least one processor 131, the at least one memory 132, and a bus 133 that connects the various system components (including the memory 132 and the processor 131).
In some possible embodiments, the aspects of the transaction data backup method provided by the present application may also be implemented in the form of a program product including a computer program for causing a computer device to perform the steps of the block chain signature management method according to various exemplary embodiments of the present application described above in this specification when the program product is run on the computer device. For example, the processor may perform steps 201-205 as shown in fig. 2.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The program product for three-dimensional visual repositioning of embodiments of the present application may employ a portable compact disc read-only memory (CD-ROM) and include a computer program, and may be run on a smart terminal. The program product of the present application is not so limited, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A readable signal medium may include a propagated data signal with a readable computer program embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
It should be noted that although several units or sub-units of the apparatus are mentioned in the above detailed description, such division is merely exemplary and not mandatory. Indeed, the features and functions of two or more units described above may be embodied in one unit, according to embodiments of the application. Conversely, the features and functions of one unit described above may be further divided into embodiments by a plurality of units.
Further, while the operations of the methods of the present application are depicted in the drawings in a particular order, this does not require or imply that these operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
Claims (10)
1. A block chain signature management method is applied to a task management system, and the task management system comprises: the system comprises a task initiating device and N task executing devices; n is a positive integer, wherein N is greater than or equal to 2, and comprises:
the first task execution device acquires a first parameter, wherein the first parameter comprises: subtask information of the first task execution device, a symmetric key factor of the first task execution device; the first task execution device is any one of the N task execution devices;
the first task execution device determines a symmetric key of the first task execution device according to a first random number and a symmetric key factor of the first task execution device;
the first task execution equipment encrypts the subtasks completed by the first task execution equipment according to the symmetric key of the first task execution equipment, and determines encrypted subtasks;
the first task execution device obtains the encrypted subtasks of the N task execution devices and then performs splicing processing to determine an aggregated task;
and the first task execution device signs the aggregated task and determines the task signature of the first task execution device.
2. The method of claim 1, wherein before the first task execution device obtains the first parameter, further comprising:
the first task execution device verifies whether the task initiating device has task information or not according to the block chain account information of the task initiating device and the public key of the task initiating device;
if the task information exists, performing signature processing on the task information through a private key of the first task execution device to obtain signature data, and storing the signature data in a block chain account of the first task execution device;
broadcasting a public key of the first task execution device.
3. The method according to claim 1, wherein the first task execution device performs the splicing process after acquiring the encrypted subtasks of the N task execution devices, and further comprises, before determining the aggregated task:
acquiring a public key of the task execution device except the first task execution device;
and after the encryption processing is respectively carried out on the subtasks of the first task execution device by adopting the public keys of the task execution devices except the first task execution device, distributing the encrypted subtasks to the corresponding task execution devices.
4. The method of claim 1, further comprising:
the first task execution device generates an intermediate factor according to a second random number and stores the intermediate factor in a block chain.
5. The method of any of claims 1-4, wherein the first task execution device signs the aggregated task, and wherein determining a task signature comprises:
the first task execution device aggregates the public keys of the N task execution devices to determine an aggregated public key;
the first task execution device determining an aggregation factor, the aggregation factor being determined according to third random numbers of the N task execution devices;
and the first task execution device signs the aggregated task according to the aggregated public key, the third random number of the first task execution device and the aggregation factor, and determines the task signature of the first task execution device.
6. The method of claim 4, further comprising:
acquiring the intermediate factor and a fourth random number, wherein the fourth random number is used for generating a symmetric key factor of the task execution equipment except the first task execution equipment;
determining a symmetric key of the task execution device except the first task execution device according to the intermediate factor and the fourth random number;
and decrypting the encrypted subtasks of the task execution equipment except the first task execution equipment respectively through the symmetric keys of the task execution equipment except the first task execution equipment to obtain decrypted subtask results.
7. The method of claim 1, wherein the symmetric key factor of the first task execution device is determined by a modulo operation.
8. A block chain signature management device is applied to a task management system, and the task management system comprises: the system comprises a task initiating device and N task executing devices; n is a positive integer, wherein N is greater than or equal to 2, and comprises:
an obtaining unit, configured to obtain a first parameter, where the first parameter includes: subtask information of the first task execution device, a symmetric key factor of the first task execution device; the first task execution device is any one of the N task execution devices;
a determining unit, configured to determine a symmetric key of the first task execution device according to a first random number and a symmetric key factor of the first task execution device;
an encryption unit, configured to encrypt the subtask completed by the first task execution device according to a symmetric key of the first task execution device, and determine an encrypted subtask;
the splicing unit is used for obtaining the encrypted subtasks of the N task execution devices and then splicing the encrypted subtasks to determine an aggregation task;
and the signature unit is used for signing the aggregation task and determining the signature of the first task execution device task.
9. A computing device, comprising: a memory and a processor;
a memory for storing program instructions;
a processor for calling program instructions stored in said memory to execute the method of any one of claims 1 to 7 in accordance with the obtained program.
10. A computer storage medium storing computer-executable instructions for performing the method of any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111244948.8A CN113987594B (en) | 2021-10-26 | 2021-10-26 | Block chain signature management method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111244948.8A CN113987594B (en) | 2021-10-26 | 2021-10-26 | Block chain signature management method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113987594A true CN113987594A (en) | 2022-01-28 |
CN113987594B CN113987594B (en) | 2024-08-02 |
Family
ID=79741326
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111244948.8A Active CN113987594B (en) | 2021-10-26 | 2021-10-26 | Block chain signature management method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113987594B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114697122A (en) * | 2022-04-08 | 2022-07-01 | 中国电信股份有限公司 | Data transmission method and device, electronic equipment and storage medium |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101873328A (en) * | 2010-06-28 | 2010-10-27 | 北京邮电大学 | Multipartite contract signing method based on aggregated signature |
CN108768634A (en) * | 2018-05-30 | 2018-11-06 | 数安时代科技股份有限公司 | Verifiable Encryptosystem signature generating method and system |
CN109587132A (en) * | 2018-11-29 | 2019-04-05 | 苏宁易购集团股份有限公司 | A kind of data transferring method and device based on alliance's chain |
CN110012443A (en) * | 2019-03-11 | 2019-07-12 | 暨南大学 | A kind of the data encryption polymerization and its system of full homomorphism |
CN111310208A (en) * | 2020-02-14 | 2020-06-19 | 云从科技集团股份有限公司 | Data processing method, system, platform, equipment and machine readable medium |
CN111769938A (en) * | 2020-06-29 | 2020-10-13 | 福建福链科技有限公司 | Key management system and data verification system of block chain sensor |
CN112152808A (en) * | 2020-09-27 | 2020-12-29 | 成都国泰网信科技有限公司 | Multi-party collaborative digital signature method based on SM2 algorithm |
CN112380575A (en) * | 2020-11-17 | 2021-02-19 | 平安普惠企业管理有限公司 | Multi-party electronic signature synthesis method, device, equipment and storage medium |
CN112417489A (en) * | 2020-12-04 | 2021-02-26 | 矩阵元技术(深圳)有限公司 | Digital signature generation method and device and server |
US20210067345A1 (en) * | 2019-09-04 | 2021-03-04 | Puzzzle Cybersecurity Ltd. | Systems and methods for signing of a message |
CN112600671A (en) * | 2021-03-02 | 2021-04-02 | 腾讯科技(深圳)有限公司 | Data processing method, device, equipment and storage medium |
CN112632611A (en) * | 2020-12-28 | 2021-04-09 | 杭州趣链科技有限公司 | Method, apparatus, electronic device, and storage medium for data aggregation |
-
2021
- 2021-10-26 CN CN202111244948.8A patent/CN113987594B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101873328A (en) * | 2010-06-28 | 2010-10-27 | 北京邮电大学 | Multipartite contract signing method based on aggregated signature |
CN108768634A (en) * | 2018-05-30 | 2018-11-06 | 数安时代科技股份有限公司 | Verifiable Encryptosystem signature generating method and system |
CN109587132A (en) * | 2018-11-29 | 2019-04-05 | 苏宁易购集团股份有限公司 | A kind of data transferring method and device based on alliance's chain |
CN110012443A (en) * | 2019-03-11 | 2019-07-12 | 暨南大学 | A kind of the data encryption polymerization and its system of full homomorphism |
US20210067345A1 (en) * | 2019-09-04 | 2021-03-04 | Puzzzle Cybersecurity Ltd. | Systems and methods for signing of a message |
CN111310208A (en) * | 2020-02-14 | 2020-06-19 | 云从科技集团股份有限公司 | Data processing method, system, platform, equipment and machine readable medium |
CN111769938A (en) * | 2020-06-29 | 2020-10-13 | 福建福链科技有限公司 | Key management system and data verification system of block chain sensor |
CN112152808A (en) * | 2020-09-27 | 2020-12-29 | 成都国泰网信科技有限公司 | Multi-party collaborative digital signature method based on SM2 algorithm |
CN112380575A (en) * | 2020-11-17 | 2021-02-19 | 平安普惠企业管理有限公司 | Multi-party electronic signature synthesis method, device, equipment and storage medium |
CN112417489A (en) * | 2020-12-04 | 2021-02-26 | 矩阵元技术(深圳)有限公司 | Digital signature generation method and device and server |
CN112632611A (en) * | 2020-12-28 | 2021-04-09 | 杭州趣链科技有限公司 | Method, apparatus, electronic device, and storage medium for data aggregation |
CN112600671A (en) * | 2021-03-02 | 2021-04-02 | 腾讯科技(深圳)有限公司 | Data processing method, device, equipment and storage medium |
Non-Patent Citations (1)
Title |
---|
王韫烨等: "基于安全多方的区块链可审计签名方案", 《计算机应用》, 31 May 2020 (2020-05-31) * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114697122A (en) * | 2022-04-08 | 2022-07-01 | 中国电信股份有限公司 | Data transmission method and device, electronic equipment and storage medium |
CN114697122B (en) * | 2022-04-08 | 2023-11-07 | 中国电信股份有限公司 | Data transmission method, device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN113987594B (en) | 2024-08-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113424185B (en) | Fast inadvertent transmission | |
CN110247757B (en) | Block chain processing method, device and system based on cryptographic algorithm | |
Chen et al. | On the design and implementation of an efficient DAA scheme | |
WO2021046668A1 (en) | Blockchain system, information transmission method, system and apparatus, and computer medium | |
CN102318260B (en) | The acceleration of key agreement protocol | |
CN111010277B (en) | Key exchange method, device, storage medium and computing device | |
CA2769995A1 (en) | Issuing implicit certificates | |
CN112446052A (en) | Aggregated signature method and system suitable for secret-related information system | |
Su et al. | Distributed attribute-based signature with attribute dynamic update for smart grid | |
CN110995443B (en) | Data processing method and device | |
CN113987594B (en) | Block chain signature management method and device | |
Zhao et al. | Certificateless public auditing scheme with designated verifier and privacy-preserving property in cloud storage | |
CN110992031B (en) | Data processing method and device | |
WO2021134898A1 (en) | Blockchain transaction data proof supervision method and system, and related device | |
KR102070061B1 (en) | Batch verification method and apparatus thereof | |
Venugopalan et al. | Bbb-voting: 1-out-of-k blockchain-based boardroom voting | |
CN111314080A (en) | SM9 algorithm-based collaborative signature method, device and medium | |
CN111274613B (en) | Iterative SM2 digital signature generation method, system, medium and device | |
CN114764510A (en) | Anti-quantum-computation electronic contract signing system and method | |
Shi et al. | Identity-based undetachable digital signature for mobile agents in electronic commerce | |
CN114124396B (en) | Information transmission method, system and storage medium | |
CN112887097A (en) | Signature method based on SM2 elliptic curve, related device and storage medium | |
CN113810195B (en) | Safe transmission method and device for electric power training simulation assessment data | |
Montenegro et al. | A practical solution for sealed bid and multi-currency auctions | |
Fan et al. | Multi-recastable e-bidding game with dual-blindness |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |