Movatterモバイル変換


[0]ホーム

URL:


CN107395349A - A kind of block chain network cryptographic key distribution method based on self-certified public key system - Google Patents

A kind of block chain network cryptographic key distribution method based on self-certified public key system
Download PDF

Info

Publication number
CN107395349A
CN107395349ACN201710699693.1ACN201710699693ACN107395349ACN 107395349 ACN107395349 ACN 107395349ACN 201710699693 ACN201710699693 ACN 201710699693ACN 107395349 ACN107395349 ACN 107395349A
Authority
CN
China
Prior art keywords
mrow
msub
key
block chain
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710699693.1A
Other languages
Chinese (zh)
Inventor
刘鹏辉
于松亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen State Micro Technology Co Ltd
Original Assignee
Shenzhen State Micro Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen State Micro Technology Co LtdfiledCriticalShenzhen State Micro Technology Co Ltd
Priority to CN201710699693.1ApriorityCriticalpatent/CN107395349A/en
Publication of CN107395349ApublicationCriticalpatent/CN107395349A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention discloses a kind of block chain network cryptographic key distribution method based on self-certified public key system, comprise the following steps:(1)System initialization, TA nodes produce and announce respective block chain network systematic parameter, then complete the distribution of block catenary system master key by multiple KDC node cooperations;(2)The user's registration of block chain is carried out, the user node u for participating in block chain business network first has to carry out offline registration at TA nodes, audits its identity by TA nodes and issues registration voucher;(3)Block chain user key is distributed, multiple distributed key distribution center nodes transmission key request of the user node into network, after KDC's checking request, distributes corresponding user key to the user node.The invention provides safer and more flexible Key Issuance mechanism, the block chain business operation for safety provides Cryptographic Assurance About, is adapted to the block chain network participated in large-scale consumer node, and have stronger exploitativeness.

Description

A kind of block chain network cryptographic key distribution method based on self-certified public key system
Technical field
The present invention relates to netkey administrative skill field, more particularly to a kind of block chain based on self-certified public key systemNetkey distribution method.
Background technology
Block chain is the core support technology using bit coin as the digital encryption currency system of representative.The core of block chain technologyHeart advantage is decentralization, can be encrypted, the means such as timestamp, distributed common recognition and economic incentives, saved by maintenance dataThe point-to-point transaction based on decentralization credit, coordination are realized in the distributed system that point need not trust each other with cooperating, so as toSolution is provided to solve the problems such as high cost of centralization mechanism generally existing, poor efficiency and data storage are dangerous.
With the fast development of bit coin in recent years and popularization, research and the application of block chain technology also show explosion typeGrowing trend, it is considered to be the 5th top of normal form is calculated after large scale computer, PC, internet, movement/social networksFormula innovation is covered, is the 4th mileage on mankind's credit evolutionary history after blood relation's credit, noble metal credit, Central Bank's paper creditUpright stone tablet.Blank of the block chain technology as cloud computing of future generation, it will be expected to as internet thoroughly remold human social activity's shapeState, and realize the transformation from current information interconnected network to value internet.
Block chain technology originates from 2008, not yet forms the generally acknowledged block chain definition of industry at present.For narrow sense, blockChain be it is a kind of data block is combined into specific data structure in a manner of chain sequentially in time, and protected in a manner of cryptographyGeneral ledger (Decentralized shared ledger), Neng Gouan are shared in the decentralization that can not be distorted He can not forge of cardIt is complete to store data simple, having precedence relationship, being verified in system.
The block chain technology of broad sense is verified with data storage, saved using distribution using chain type block structure is encryptedPoint common recognition algorithm programs one kind with operation data to generate and update the data, using automatized script code (intelligent contract)Brand-new decentralization architecture and Distributed Calculation normal form.
Block chain has the characteristics that decentralization, time series data, collective's maintenance, programmable and secure and trusted.Go firstCentralization:The processes such as checking, book keeping operation, storage, maintenance and the transmission of block chain data are all based on distributed system architecture, usePure mathematical method rather than central authority establish the trusting relationship between distributed node, so as to form the trusted of decentralizationDistributed system;Next to that time series data:Block chain use with timestamp chain type block structure data storage, so as to forData add time dimension, have extremely strong verifiability and trackability;3rd is that collective safeguards:Block catenary system usesSpecific economic limit water cut ensures that all nodes in distributed system each may participate in verification process (such as bit of data blockThe digging ore deposit process of coin), and select specific node that new block is added into block chain by knowing together algorithm;4th is to compileJourney:Block chain technology can provide flexible scripted code system, support user create advanced intelligent contract, currency or other goCentralization application.For example, ether mill (Ethereum) platform is to provide the figure complete script of spirit so that user buildsIt is any can be with the intelligent contract or type of transaction of explication;It is finally secure and trusted:Block chain technology uses asymmetric cryptographyLearn principle data are encrypted, while the common recognition algorithm formation such as proof of work by each node of distributed system is powerfulCalculation power is to resist external attack, guarantee block chain data can not distort and can not forge, thus has higher security.
It is, in general, that block catenary system is made up of data Layer, Internet, common recognition layer, excitation layer, contract layer and application layer.Wherein, data Layer encapsulates the technologies such as data encryption and the timestamp of bottom data block and correlation;Internet then includes dividingCloth networking mechanism, data dissemination mechanism and data authentication mechanism etc.;All kinds of common recognitions of common recognition layer predominant package network node are calculatedMethod;Economic factor is integrated into block chain technical system by excitation layer, main issuing mechanism and distribution including economic incentivesMechanism etc.;All kinds of scripts of contract layer predominant package, algorithm and intelligent contract, it is the basis of block chain programmable features;Application layerThen encapsulate the various application scenarios and case of block chain.Chain type block structure, the common recognition of distributed node based on timestampThe intelligent contract of mechanism, the economic incentives based on common recognition calculation power and flexible programmable is the most representational innovation of block chain technologyPoint.
At present, security threat is the sixty-four dollar question that block chain is faced so far, the secret protection of block chainThere is also security risks.Each node is not full energy matries in block catenary system, but passes through the ground of similar e-mail addressSender is required for transaction when location identifies (such as bit coin public key address) to realize transmission of transaction data, while merchandise every timeInformation is signed, and recipient needs to carry out sign test after receiving Transaction Information, to prove the credibility of transaction business, prevents falsenessBusiness is spread unchecked, while in order to adapt to the needs of different transaction scenes, block chain business needs to enter on the basis of safeguard protectionIndustry business is evolved, such as encrypted transaction message, multiple party signatures etc., and these safety services are required for using one or more correlationsPrivacy key, and then the distribution or generation of key need a reliable key management mechanism.
The content of the invention
To solve existing technical problem, the embodiment of the present invention provides a kind of block based on self-certified public key systemChain network cryptographic key distribution method, it is safe, flexible, and can preferably be embedded into existing block chain operation system, reducesImplementation cost, there is stronger exploitativeness.
To reach above-mentioned purpose, what the technical scheme of the embodiment of the present invention was realized in:
A kind of block chain network cryptographic key distribution method based on self-certified public key system, comprises the following steps:
Step 1, system initialization
TA nodes produce and announce respective block chain network systematic parameter, then complete area by multiple KDC node cooperationsThe distribution of block catenary system master key;
Step 2, the user's registration for carrying out block chain
The user node u for participating in block chain business network first has to carry out offline registration at TA nodes, is examined by TA nodesIts identity of core simultaneously issues registration voucher;
Step 3, the distribution of block chain user key
Multiple distributed key distribution center nodes of the user node into network send key request, KDCAfter checking request, distribute corresponding user key to the user node.
Further, step 1 specifically includes:
Step 10, block catenary system parameter are established
Define the security system parameter needed for the key distribution mechanism of whole block chain network;
Step 11, the distribution of block catenary system master key
First, n KDC node generates system master key s by distributed collaborative, and then each KDC nodes calculate itselfSecret shadow.
Further, step 11 specifically comprises the following steps:
Step 110, each KDC node is (i=1,2 ..., n) one secret (t-1) rank multinomial of construction:
fi(x)=di+ai,1x+ai,2x2+…+ai,t-1xt-1(mod q) (2)
Wherein, ai,j∈Zq*(j=1,2 ..., t-1);Then calculate and announce the public key P of itselfi=diP;
Step 111, KDC node is calculate and safely send the sub-secret share s of other KDC nodes j (j ≠ i)i,j=fi(j), then calculate and send corresponding experimental evidence Vi,0=diP, Vi,j=ai,jP (j=1,2 ..., t-1);
Step 112 ,] KDC nodes j receives the sub-secret share s from KDC node isi,jAnd after experimental evidence, utilize formula(3) its validity is verified;
It is effective then receive, otherwise distribute again.
Further, step 2 specifically comprises the following steps:
Step 20, user u select a secret random number wu∈Zq*, calculate evidence Wu=wuP, then by { IDu、WuCarryGive TA nodes;
After step 21, TA nodes receive user u log-on message, if auditing its identity not by refusal user u;OtherwiseCalculate user u registration voucher Ceru=dTAVu, wherein, Vu=H0(IDu||IDTA||Tu,Wu), TuTo register voucher CeruConjunctionThe method time limit;Then by { Ceru、TuIt is sent to user u;
After step 22, user u receive the registration voucher of TA nodes return, V is calculatedu=H0(IDu||IDTA||Tu,Wu), andUtilize the public key P of TA nodesTARegistration voucher Cer is verified by formula (4)uValidity;
It is verified and then receives registration voucher Ceru, otherwise re-register.
Further, step 3 specifically comprises the following steps:
Step 30, user u select t secret random number kiRZq*;CalculateWith r=kP;Then auxiliary is calculatedKey Kui=H1(wuPi), auxiliary information Yui=Kui⊕kiAnd authentication information Rui=HKui(Yui);Then by { IDu、IDTA、Tu、Wu、Ceru、r、Yui、RuiIt is sent to node KDCi(i=1,2 ..., t);
Step 31, node KDCiAfter the cipher key request information for receiving user u, V is calculatedu=H0(IDu||IDTA||Tu,Wu), andChecking registration voucher CeruLegitimacy;Then K is calculatedui'=H1(diWu) and Rui'=HKui'(Yui), and verified by formula (5)YuiValidity;
It is above-mentioned be verified after, receive user u request, otherwise refuse;
Step 32, user u receive node KDCiAfter the signing messages of transmission, S is calculatedui'=HKui(Eui), and pass through formula (7)Verify EuiValidity;
Then signature e is recoveredi=Kui⊕Eui, calculate Xi=rirx+eiP simultaneously utilizes node KDCiPublic key PiAnd open letterCease sj,iP (j=t+1 ..., n) pass through formula (8) checking signature eiValidity;
After being verified, receive signature ei, otherwise resubmit key request.
The beneficial effect of technical scheme provided in an embodiment of the present invention is:
Block chain network cryptographic key distribution method of the invention based on self-certified public key system provides safer and more flexibleKey Issuance mechanism, for safety block chain business operation Cryptographic Assurance About is provided, be adapted to have large-scale consumer node participationBlock chain network, such as alliance's block chain and publicly-owned block chain, on the premise of large-scale redevelopment system is not needed, the present inventionKey distribution function can preferably be embedded into existing block chain operation system, reduce implementation cost, have it is strongerExploitativeness.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existingThere is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only thisSome embodiments of invention, for those of ordinary skill in the art, without having to pay creative labor, may be used alsoTo obtain other accompanying drawings according to these accompanying drawings.
Fig. 1 is the block catenary system management structure without complete trusted key Distribution Center;
Fig. 2 is that have 5 block catenary system master key distribution procedure schematic diagrames without complete trusted key Distribution Center;
Fig. 3 is the block chain key distribution overall process schematic diagram of the present invention;
Fig. 4 is the block chain cipher key user registration process of the present invention;
Fig. 5 A are the block chain key request process schematics of the present invention;
Fig. 5 B are the block chain key distribution procedure schematic diagrames of the present invention.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to embodiment party of the present inventionFormula is described in further detail.
, it is necessary to dispose trusted party or private key generation center (private key in key managing projectGenerator, PKG) carry out the private key of dispatch user or the identity of certification user, block chain network are no exception.Fig. 1 show nothingThe block catenary system management structure of complete trusted key Distribution Center, Fig. 2 are that prior art has 5 without complete trusted key pointThe block catenary system master key distribution procedure schematic diagram at hair center, it is assumed that block chain network is made up of N number of node, is designated as U={ ID1, ID2 ..., IDN }, IDi (1≤i≤N) represent i-th of user, TA or KDC nodes globally unique identity in a networkMark.The present invention carries out the function of single PKG nodes decentralized distributed treatment, by n KDC (keyDistribution center, KDC) node and trusted authority mechanism (trusted authority, a TA) node on behalf ofPerform, so as to avoid block catenary system from only relying upon the problem of single PKG nodes are also easy to produce single point failure, and mitigate singleThe burden of PKG nodes.
Shown in reference picture 3, the block chain network cryptographic key distribution method of the invention based on self-certified public key system includes as followsStep:
Step 1, system initialization
First, TA nodes produce and announce respective block chain network systematic parameter, then by multiple KDC node cooperations Lai completeInto the distribution of block catenary system master key, and after the completion of initialization, TA nodes will be in offline (off-line) state.This hairBright is in embodiment, it is assumed that the node that the distribution of system master key is participated in block chain network is n (1≤n≤N) individual KDC nodes, itsThreshold value is t (t≤n≤2t-1).
Specifically, the system initialization comprises the following steps:
Step 10, block catenary system parameter are established;
Systematic parameter establishes the safety that process is used mainly to define needed for the key distribution mechanism of whole block chain networkSystem parameter.
First, TA joint structures meet the Bilinear map ê of GDH (gap Diffie-Hellman) group property:G1×G1→G2.The generation point that P is group G1 is made, while constructs the one-way hash function of lower big powers impact resistant:
H0:{0,1}*×G1*→G1*;
H1:G1*→Zq*;
H2:{0,1}*×G1*→Zq*;
Hk:{ 0,1 } * → Zq*,
Wherein k is auxiliary key;
Then randomly choose n secret number di ∈ Zq* and be securely distributed to corresponding KDC node is (i=1,2 ...,n);System public key is calculated by formula (1) again
Then, the private key dTA ∈ Zq* of itself are randomly choosed, and calculate public key PTA=dTAP;Then delete all secretClose several di (i=1,2 ..., n) simultaneously announce block catenary system parameter { G1, G2, ê, P, Ppub, PTA, H0, H1, H2, Hk }.
Step 11, the distribution of block catenary system master key
System master key distribution procedure is mainly used in when block chain business network is established, and the master for initializing whole system is closeKey (public/private keys to), got ready for the distribution of follow-up key, the master key of whole system equivalent to system root key,The whole network is credible, when can be used for follow-up block chain network operation, verifies the user key distributed in network.
First, n KDC node generates system master key s by distributed collaborative, and then each KDC nodes calculate itself(on master key s's) secret shadow, specific distributing step is as follows:
Step 110, each KDC node is (i=1,2 ..., n) one secret (t-1) rank multinomial of construction:
fi(x)=di+ai,1x+ai,2x2+…+ai,t-1xt-1(mod q) (2)
Wherein, ai,j∈Zq*(j=1,2 ..., t-1);Then calculate and announce the public key P of itselfi=diP。
Step 111, KDC node is calculate and safely send the sub-secret share s of other KDC nodes j (j ≠ i)i,j=fi(j), then calculate and send corresponding experimental evidence Vi,0=diP, Vi,j=ai,jP (j=1,2 ..., t-1).
Step 112 ,] KDC nodes j receives the sub-secret share s from KDC node isi,jAnd after experimental evidence, utilize formula(3) its validity is verified.
It is effective then receive, otherwise distribute again, receive all other n-1 sub- secret shadow si,jAfter (j ≠ i), institute is preservedThere is sub-secret share and announce si,jP;Finally, the sub-secret share s of itself is combinedj,jCalculate the secret shadow of itself
By said process, system safely establishes master key s, moreover, according to any t secret shadow siJust can weightStructure goes out system master keySystem public key Ppub=sP.
Step 2, the user's registration for carrying out block chain
User registration course is mainly used in auditing the identity information of user node, only true enough and satisfactory sectionPoint could add block chain network, and after auditing user node identity, system can issue a registration voucher, for subsequently participating in netThe behavior checking of network activity, this process can be carried out in a manner of online or be offline.
Shown in reference picture 4, before dispatch user key, it is intended to participate in user node u (its body of block chain business networkPart is identified as IDu) TA nodes (its identity is IDTA) place progress offline registration is first had to, its identity is audited by TA nodesAnd issue registration voucher.Comprise the following steps that:
Step 20, user u select a secret random number wu∈Zq*, calculate evidence Wu=wuP, then by { IDu、WuCarryGive TA nodes;
After step 21, TA nodes receive user u log-on message, if auditing its identity not by refusal user u;OtherwiseCalculate user u registration voucher Ceru=dTAVu, wherein, Vu=H0(IDu||IDTA||Tu,Wu), TuTo register voucher CeruConjunctionThe method time limit;Then by { Ceru、TuIt is sent to user u;
After step 22, user u receive the registration voucher of TA nodes return, V is calculatedu=H0(IDu||IDTA||Tu,Wu), andUtilize the public key P of TA nodesTARegistration voucher Cer is verified by formula (4)uValidity.
It is verified and then receives registration voucher Ceru, otherwise re-register.
Step 3, the distribution of block chain user key
User key distribution procedure is mainly used in (asymmetric close to participate in the user node of block chain network distribution keyKey, public/private keys to), multiple distributed key distribution center nodes of the user node into network send key request, keyAfter Distribution Center's checking request, distribute corresponding user key (public/private keys to) to the user node.Key distribution function byMultiple block chain network entities are taken on jointly, the problem of can avoiding single point failure.
In order to obtain private key SKu, user u needs to select t KDC node and to submit key request, assumes in the present embodimentThe t KDC node chosen is node KDCi, its public key is Pi(i=1,2 ..., t).Specific distributing step is as follows:
Step 30, user u select t secret random number kiRZq*;CalculateAnd r=kP;Then calculate auxiliaryHelp key Kui=H1(wuPi), auxiliary information Yui=Kui⊕kiAnd authentication information Rui=HKui(Yui);Then by { IDu、IDTA、Tu、Wu、Ceru、r、Yui、RuiIt is sent to node KDCi(i=1,2 ..., t);
Step 31, node KDCiAfter the cipher key request information for receiving user u, V is calculatedu=H0(IDu||IDTA||Tu,Wu), andRegistration voucher Cer is verified by formula (4)uLegitimacy;Then K is calculatedui'=H1(diWu) and Rui'=HKui'(Yui), and pass throughFormula (5) verifies YuiValidity.
It is above-mentioned be verified after, receive user u request, otherwise refuse.Then k is calculatedi=Kui'⊕YuiWith signature ei
Wherein, rxFor coordinates of the point r in x-axis;Further, auxiliary information E is calculatedui=Kui'⊕eiAnd authentication informationSui=HKui'(Eui);Then by { Eui、SuiIt is sent to user u;
Step 32, user u receive node KDCiAfter the signing messages of transmission, S is calculatedui'=HKui(Eui), and pass through formula (7)Verify EuiValidity.
Then signature e is recoveredi=Kui⊕Eui, calculate Xi=rirx+eiP simultaneously utilizes node KDCiPublic key PiAnd open letterCease sj,iP (j=t+1 ..., n) pass through formula (8) checking signature eiValidity.
It is above-mentioned be verified after, receive signature ei, otherwise resubmit key request.Receive t effective signature eiAfterwards,CalculateAnd private key SK is calculated by formula (9)u
SKu=wu+e+k (9)
Further, E=eP is calculated, and generates the public key PK of itselfu={ Wu, E, r }, followed by block chain network systemUnite public key PpubIts validity is verified by formula (10).
Or utilize the private key SK of itselfuIt is verified by formula (11).
SKuP=Wu+E+r (11)
It is above-mentioned be verified after, show public key PKu={ Wu, E, r } and it is effective, otherwise recalculate public key PKu
By said process, block chain user u can obtain the believable public/private keys of the whole network in the block catenary system of oneselfTo { PKu, SKu}.Key needed for follow-up other subsystems can be block chain business system by this key to further expandingSystem provides support.
In the embodiment of the present invention, the key distributed is unsymmetrical key, can be that subsequent zone block chain service communication uses,For example, generate wallet account etc. and make basis.
Block chain key request process and key distribution when Fig. 5 A, Fig. 5 B is are (n, t)=(5,3) with thresholding t=3Process schematic.In Fig. 5 A, user node transmits key distribution request message to KDC nodes, calculates auxiliary information, authentication informationDeng being sent to node KDCi(i=0,1,2 ..., 4).Fig. 5 B are that KDC nodes transmit key generation message, section to user nodePoint KDCiAfter the cipher key request information for receiving user, by calculating, checking, user is then sent to.
In step 3, distribute use by the registration evidence of user and based on the group signature method of elliptic curve cryptosystemFamily private key, because single KDC is merely able to generating portion private key for user, even if multiple KDCs combineTo crack, the complete private key of user can not be also obtained, overcomes key escrow present in identity-based cipher key scheme.SeparatelyOutside, the public key of distribution has Self-certified, realizes client public key and signature verification in logic single step while completes.
The embodiment of the present invention by introducing Identity- based cryptography, threshold cryptography model and Bilinear map mechanism, andUse for reference self-certified public key concept and group ranking thought, for block chain network provide one newly based on self-certified public key systemThe thresholding cryptographic key distribution method without complete trusted key Distribution Center.In the present embodiment, PKG is common by multiple network entitiesTake on, avoid single point failure problem;And system master key is protected using threshold cryptography model, system has well fault-tolerantProperty;In addition, by the registration evidence of user and based on the group signature method of elliptic curve cryptosystem come dispatch user private key, byIn being merely able to generating portion private key for user, even if multiple KDCs join together to crack, the complete of user can not be also obtainedWhole private key, overcome key escrow present in IBC schemes.Meanwhile the public key of the inventive method generation has Self-certifiedProperty, client public key and signature verification are realized in logic single step while are completed;In key distribution procedure, centre can be resistedThe various attacks such as people's attack, identity personation, the confederate crack, message-replay and passive wiretapping;Be effectively saved computing resource andNetwork bandwidth.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer programProduct.Therefore, the shape of the embodiment in terms of the present invention can use hardware embodiment, software implementation or combination software and hardwareFormula.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more to use storageThe form for the computer program product that medium is implemented on (including but is not limited to magnetic disk storage and optical memory etc.).
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program productFigure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagramJourney and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be providedThe processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produceA raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for realThe device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spyDetermine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring toMake the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram orThe function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that countedSeries of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer orThe instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram oneThe step of function of being specified in individual square frame or multiple square frames.
The all or part of above-mentioned technical proposal provided in an embodiment of the present invention can pass through the related hardware of programmed instructionTo complete, described program can be stored in the storage medium that can be read, and the storage medium includes:ROM, RAM, magnetic disc or lightDisk etc. is various can be with the medium of store program codes.
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all the present invention spirit andWithin principle, any modification, equivalent substitution and improvements made etc., it should be included in the scope of the protection.

Claims (5)

<mrow> <msub> <mi>H</mi> <mn>2</mn> </msub> <mrow> <mo>(</mo> <msub> <mi>ID</mi> <mi>u</mi> </msub> <mo>,</mo> <msub> <mi>W</mi> <mi>u</mi> </msub> <mo>)</mo> </mrow> <mo>&amp;lsqb;</mo> <msub> <mi>P</mi> <mi>i</mi> </msub> <mo>+</mo> <mrow> <mo>(</mo> <msubsup> <mo>&amp;Sigma;</mo> <mrow> <mi>j</mi> <mo>=</mo> <mi>t</mi> <mo>+</mo> <mn>1</mn> </mrow> <mi>n</mi> </msubsup> <msub> <mi>s</mi> <mrow> <mi>j</mi> <mo>,</mo> <mi>i</mi> </mrow> </msub> <msubsup> <mo>&amp;Pi;</mo> <mrow> <mi>k</mi> <mo>=</mo> <mn>1</mn> <mo>,</mo> <mi>k</mi> <mo>&amp;NotEqual;</mo> <mi>i</mi> </mrow> <mi>t</mi> </msubsup> <mfrac> <mi>k</mi> <mrow> <mi>k</mi> <mo>-</mo> <mi>i</mi> </mrow> </mfrac> <mo>)</mo> </mrow> <mi>P</mi> <mo>&amp;rsqb;</mo> <mover> <mo>=</mo> <mo>?</mo> </mover> <msub> <mi>X</mi> <mi>i</mi> </msub> <mo>-</mo> <mo>-</mo> <mo>-</mo> <mrow> <mo>(</mo> <mn>8</mn> <mo>)</mo> </mrow> </mrow>
CN201710699693.1A2017-08-162017-08-16A kind of block chain network cryptographic key distribution method based on self-certified public key systemPendingCN107395349A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201710699693.1ACN107395349A (en)2017-08-162017-08-16A kind of block chain network cryptographic key distribution method based on self-certified public key system

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201710699693.1ACN107395349A (en)2017-08-162017-08-16A kind of block chain network cryptographic key distribution method based on self-certified public key system

Publications (1)

Publication NumberPublication Date
CN107395349Atrue CN107395349A (en)2017-11-24

Family

ID=60352515

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201710699693.1APendingCN107395349A (en)2017-08-162017-08-16A kind of block chain network cryptographic key distribution method based on self-certified public key system

Country Status (1)

CountryLink
CN (1)CN107395349A (en)

Cited By (56)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN108835779A (en)*2018-09-062018-11-20深圳市安思科电子科技有限公司A kind of intelligence payment bracelet convenient for scanning based on block chain technology
CN108851388A (en)*2018-09-062018-11-23深圳市乐业科技有限公司A kind of Intelligent bracelet with fingerprint identification function based on block chain technology
CN108898039A (en)*2018-09-062018-11-27深圳市晓控通信科技有限公司A kind of shatter-resistant based on block chain technology and energy-efficient barcode scanning gun
CN109008095A (en)*2018-08-172018-12-18深圳市安思科电子科技有限公司A kind of comfort type Intelligent bracelet for authentication based on block chain technology
CN109043750A (en)*2018-08-172018-12-21深圳市安思科电子科技有限公司A kind of Intelligent bracelet based on block chain technology
CN109118179A (en)*2018-08-312019-01-01篱笆墙网络科技有限公司A kind of office worker's recruitment methods and recruitment platform
CN109222350A (en)*2018-09-062019-01-18深圳市乐业科技有限公司A kind of Intelligent bracelet with emergency function based on block chain technology
CN109274499A (en)*2018-09-292019-01-25四川赢才多多科技有限公司 Time stamp distribution acquisition method for blockchain
CN109344625A (en)*2018-07-242019-02-15东方银谷(北京)投资管理有限公司User account management method and device for block chain
CN109377644A (en)*2018-10-122019-02-22深圳市贝优通新能源技术开发有限公司A kind of vending machine with anti-theft function based on block chain technology
CN109472924A (en)*2018-10-122019-03-15深圳市雷凌广通技术研发有限公司A kind of vending machine with monitoring and regulating function based on block chain technology
CN109493521A (en)*2018-10-122019-03-19深圳市乐业科技有限公司A kind of self-service machine based on block chain technology
WO2019072281A2 (en)2018-11-272019-04-18Alibaba Group Holding LimitedAsymmetric key management in consortium blockchain networks
CN109660340A (en)*2018-12-112019-04-19北京安御道合科技有限公司A kind of application system and its application method based on quantum key
CN109727032A (en)*2018-12-292019-05-07杭州趣链科技有限公司A kind of alliance's block chain access control method of identity-based id password
CN109921900A (en)*2019-02-182019-06-21深圳市优学链科技有限公司A kind of algorithm of distributed key generation
CN109962777A (en)*2017-12-262019-07-02航天信息股份有限公司The key in block catenary system is permitted to generate, obtain the method and apparatus of key
CN110084622A (en)*2019-04-182019-08-02西安邮电大学A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving
CN110213264A (en)*2019-05-302019-09-06全链通有限公司Auth method, equipment and storage medium based on alliance's block chain
CN110278076A (en)*2019-05-292019-09-24电子科技大学 A blockchain-based transparent data integrity audit and transparent encrypted data deduplication protocol
WO2019179277A1 (en)*2018-03-192019-09-26华为技术有限公司Data access rights control method and device
CN110417843A (en)*2018-04-302019-11-05慧与发展有限责任合伙企业 System and method for decentralized management of equipment assets external to a computer network
CN110719163A (en)*2019-09-292020-01-21联想(北京)有限公司Information processing method, device and storage medium
CN110751556A (en)*2019-09-282020-02-04北京瑞卓喜投科技发展有限公司Asset issuing supervision method, equipment and system
CN110851859A (en)*2019-10-222020-02-28华东师范大学 A distributed authoritative node blockchain system with (n, t) threshold and its authentication method
CN110971413A (en)*2019-06-202020-04-07腾讯科技(深圳)有限公司Random number generation method, random number generation device and storage medium
CN111010280A (en)*2019-12-092020-04-14中山大学 A Supervised Blockchain Construction Method Based on Group Signature
CN111030821A (en)*2019-08-272020-04-17杭州云象网络技术有限公司Alliance chain encryption method based on bilinear mapping technology
CN111066286A (en)*2019-03-272020-04-24阿里巴巴集团控股有限公司Retrieving common data for blockchain networks using high availability trusted execution environments
CN111095899A (en)*2019-04-262020-05-01阿里巴巴集团控股有限公司Distributed key management for trusted execution environments
CN111104678A (en)*2018-10-252020-05-05北京国盾量子信息技术有限公司Block chain consensus method and device
CN111181730A (en)*2019-12-312020-05-19航天信息股份有限公司User identity generation and updating method and device, storage medium and node equipment
CN111277412A (en)*2020-02-182020-06-12暨南大学Data security sharing system and method based on block chain key distribution
CN111314060A (en)*2018-12-122020-06-19中移动信息技术有限公司Key updating method, device and storage medium
CN111371744A (en)*2020-02-212020-07-03重庆邮电大学Byzantine fault-tolerant consensus method based on distributed key
CN111466098A (en)*2017-12-072020-07-28区块链控股有限公司Block chain implemented security system and method for blind result selection
CN111865988A (en)*2020-07-222020-10-30山东华普信息科技有限公司Certificate-free key management method, system and terminal based on block chain
CN112165711A (en)*2020-09-282021-01-01扬州大学Vehicle-mounted ad hoc network group key negotiation method based on block chain
CN112262422A (en)*2018-04-132021-01-22比特飞翔区块链株式会社Block chain network and determination method therefor
CN112260834A (en)*2020-10-122021-01-22南京邮电大学Block chain-based key generation and management method in Ad Hoc network
CN112364387A (en)*2020-10-232021-02-12华南理工大学Identity authentication method, device, medium and equipment based on block chain network
CN112970227A (en)*2018-10-172021-06-15区块链控股有限公司Computer-implemented system and method including public key combination verification
CN113691570A (en)*2020-05-182021-11-23山东浪潮质量链科技有限公司Cross-organization communication method, device and medium based on multi-level block chain
US11218293B2 (en)2020-01-272022-01-04Hewlett Packard Enterprise Development LpSecure parameter merging using homomorphic encryption for swarm learning
CN114169888A (en)*2021-12-072022-03-11北京众信星空网络技术有限公司Universal type multi-signature supporting encryption currency custody method
CN114301612A (en)*2020-09-222022-04-08中国移动通信有限公司研究院Information processing method, communication apparatus, and encryption apparatus
CN114640451A (en)*2022-03-292022-06-17蚂蚁区块链科技(上海)有限公司Method, system and consensus node for realizing distributed key generation on block chain
CN114650132A (en)*2022-03-292022-06-21蚂蚁区块链科技(上海)有限公司Method, system and consensus node for realizing distributed key generation on block chain
CN114697001A (en)*2020-12-282022-07-01山东浪潮质量链科技有限公司Information encryption transmission method, equipment and medium based on block chain
EP3879747A4 (en)*2018-12-292022-08-10Shanghai Weilian Information Technology Co., Ltd.Key security management system and method, medium, and computer program
US11436692B2 (en)2020-01-272022-09-06Hewlett Packard Enterprise Development LpSystems and methods for monetizing data in decentralized model building for machine learning using a blockchain
US11605013B2 (en)2018-04-302023-03-14Hewlett Packard Enterprise Development LpSystem and method of decentralized machine learning using blockchain
US11748337B2 (en)2018-04-302023-09-05Hewlett Packard Enterprise Development LpSystem and method of decentralized management of multi-owner nodes using blockchain
CN111614462B (en)*2020-04-242023-11-14傲林科技有限公司Key calculation method and system based on blockchain
US11966818B2 (en)2019-02-212024-04-23Hewlett Packard Enterprise Development LpSystem and method for self-healing in decentralized model building for machine learning using blockchain
US12393883B2 (en)2020-01-312025-08-19Hewlett Packard Enterprise Development LpAdaptively synchronizing learning of multiple learning models

Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106487821A (en)*2017-01-042017-03-08北京天云智汇科技有限公司A kind of digital signature method based on internet block chain technology
CN106534092A (en)*2016-11-022017-03-22西安电子科技大学Message-based and key-dependent privacy data encryption method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN106534092A (en)*2016-11-022017-03-22西安电子科技大学Message-based and key-dependent privacy data encryption method
CN106487821A (en)*2017-01-042017-03-08北京天云智汇科技有限公司A kind of digital signature method based on internet block chain technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
肖自金,: ""一种基于自认证公钥体制思想的MANET网络密钥分发方案"", 《计算机应用与软件》*

Cited By (98)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111466098A (en)*2017-12-072020-07-28区块链控股有限公司Block chain implemented security system and method for blind result selection
CN111466098B (en)*2017-12-072024-04-02区块链控股有限公司System and method for block chain implementation security for blind result selection
CN109962777A (en)*2017-12-262019-07-02航天信息股份有限公司The key in block catenary system is permitted to generate, obtain the method and apparatus of key
WO2019179277A1 (en)*2018-03-192019-09-26华为技术有限公司Data access rights control method and device
US12058253B2 (en)2018-03-192024-08-06Huawei Technologies Co., LtdMethod and apparatus for controlling data access right to data stored on a blockchain
US11563569B2 (en)2018-03-192023-01-24Huawei Technologies Co., Ltd.Method and apparatus for controlling data access right to data stored on a blockchain
CN112262422A (en)*2018-04-132021-01-22比特飞翔区块链株式会社Block chain network and determination method therefor
US11330019B2 (en)2018-04-302022-05-10Hewlett Packard Enterprise Development LpSystem and method of decentralized management of device assets outside a computer network
US12273394B2 (en)2018-04-302025-04-08Hewlett Packard Enterprise Development LpSystem and method of decentralized management of device assets outside a computer network
CN110417843B (en)*2018-04-302022-05-27慧与发展有限责任合伙企业System and method for decentralized management of device assets outside a computer network
US11748337B2 (en)2018-04-302023-09-05Hewlett Packard Enterprise Development LpSystem and method of decentralized management of multi-owner nodes using blockchain
US11605013B2 (en)2018-04-302023-03-14Hewlett Packard Enterprise Development LpSystem and method of decentralized machine learning using blockchain
CN110417843A (en)*2018-04-302019-11-05慧与发展有限责任合伙企业 System and method for decentralized management of equipment assets external to a computer network
CN109344625A (en)*2018-07-242019-02-15东方银谷(北京)投资管理有限公司User account management method and device for block chain
CN109043750A (en)*2018-08-172018-12-21深圳市安思科电子科技有限公司A kind of Intelligent bracelet based on block chain technology
CN109008095A (en)*2018-08-172018-12-18深圳市安思科电子科技有限公司A kind of comfort type Intelligent bracelet for authentication based on block chain technology
CN109043750B (en)*2018-08-172021-03-16浙江合式信息科技有限公司Intelligent bracelet based on block chain technology
CN109118179A (en)*2018-08-312019-01-01篱笆墙网络科技有限公司A kind of office worker's recruitment methods and recruitment platform
CN108835779B (en)*2018-09-062021-11-05深圳老玩童网络有限公司Intelligent payment bracelet convenient to scan based on block chain technology
CN108851388A (en)*2018-09-062018-11-23深圳市乐业科技有限公司A kind of Intelligent bracelet with fingerprint identification function based on block chain technology
CN108898039A (en)*2018-09-062018-11-27深圳市晓控通信科技有限公司A kind of shatter-resistant based on block chain technology and energy-efficient barcode scanning gun
CN109222350A (en)*2018-09-062019-01-18深圳市乐业科技有限公司A kind of Intelligent bracelet with emergency function based on block chain technology
CN108835779A (en)*2018-09-062018-11-20深圳市安思科电子科技有限公司A kind of intelligence payment bracelet convenient for scanning based on block chain technology
CN109274499A (en)*2018-09-292019-01-25四川赢才多多科技有限公司 Time stamp distribution acquisition method for blockchain
CN109377644A (en)*2018-10-122019-02-22深圳市贝优通新能源技术开发有限公司A kind of vending machine with anti-theft function based on block chain technology
CN109493521B (en)*2018-10-122021-06-01广东乘心电器实业有限公司Unmanned vending machine based on block chain technology
CN109493521A (en)*2018-10-122019-03-19深圳市乐业科技有限公司A kind of self-service machine based on block chain technology
CN109472924A (en)*2018-10-122019-03-15深圳市雷凌广通技术研发有限公司A kind of vending machine with monitoring and regulating function based on block chain technology
CN112970227A (en)*2018-10-172021-06-15区块链控股有限公司Computer-implemented system and method including public key combination verification
CN112970227B (en)*2018-10-172025-02-21区块链控股有限公司 Computer-implemented systems and methods including public key combined authentication
CN111104678A (en)*2018-10-252020-05-05北京国盾量子信息技术有限公司Block chain consensus method and device
CN111104678B (en)*2018-10-252022-03-18北京国盾量子信息技术有限公司Block chain consensus method and device
KR102286301B1 (en)*2018-11-272021-08-09어드밴스드 뉴 테크놀로지스 씨오., 엘티디. Asymmetric Key Management in Consortium Blockchain Networks
CN110622464A (en)*2018-11-272019-12-27阿里巴巴集团控股有限公司Asymmetric key management in federated blockchain networks
KR20200066262A (en)*2018-11-272020-06-09알리바바 그룹 홀딩 리미티드 Asymmetric key management in the consortium blockchain network
CN110622464B (en)*2018-11-272022-07-26创新先进技术有限公司Asymmetric key management in federated blockchain networks
WO2019072281A2 (en)2018-11-272019-04-18Alibaba Group Holding LimitedAsymmetric key management in consortium blockchain networks
RU2733097C1 (en)*2018-11-272020-09-29Алибаба Груп Холдинг ЛимитедControl of asymmetric keys in consortium blockchain networks
TWI706661B (en)*2018-11-272020-10-01香港商阿里巴巴集團服務有限公司 Asymmetric key management in the alliance blockchain network
US10819509B2 (en)2018-11-272020-10-27Alibaba Group Holding LimitedAsymmetric key management in consortium blockchain networks
WO2019072281A3 (en)*2018-11-272019-09-26Alibaba Group Holding LimitedAsymmetric key management in consortium blockchain networks
CN109660340B (en)*2018-12-112021-11-26北京安御道合科技有限公司Application system based on quantum key and use method thereof
CN109660340A (en)*2018-12-112019-04-19北京安御道合科技有限公司A kind of application system and its application method based on quantum key
CN111314060A (en)*2018-12-122020-06-19中移动信息技术有限公司Key updating method, device and storage medium
EP3879747A4 (en)*2018-12-292022-08-10Shanghai Weilian Information Technology Co., Ltd.Key security management system and method, medium, and computer program
US12058252B2 (en)2018-12-292024-08-06Shanghai Nanojclean Technology Co., Ltd.Key security management system and method, medium, and computer program
CN109727032A (en)*2018-12-292019-05-07杭州趣链科技有限公司A kind of alliance's block chain access control method of identity-based id password
CN109921900A (en)*2019-02-182019-06-21深圳市优学链科技有限公司A kind of algorithm of distributed key generation
US11966818B2 (en)2019-02-212024-04-23Hewlett Packard Enterprise Development LpSystem and method for self-healing in decentralized model building for machine learning using blockchain
CN116132162B (en)*2019-03-272024-12-17蚂蚁链技术有限公司Retrieving public data of a blockchain network using a high availability trusted execution environment
CN116132162A (en)*2019-03-272023-05-16创新先进技术有限公司Retrieving public data of a blockchain network using a high availability trusted execution environment
US11323271B2 (en)2019-03-272022-05-03Advanced New Technologies Co., Ltd.Retrieving public data for blockchain networks using highly available trusted execution environments
CN111066286A (en)*2019-03-272020-04-24阿里巴巴集团控股有限公司Retrieving common data for blockchain networks using high availability trusted execution environments
CN111066286B (en)*2019-03-272023-02-28创新先进技术有限公司 Retrieve public data of a blockchain network using a highly available trusted execution environment
CN110084622A (en)*2019-04-182019-08-02西安邮电大学A kind of commodity are traced to the source block catenary system and code key saves and method for retrieving
US11356285B2 (en)2019-04-262022-06-07Advanced New Technologies Co., Ltd.Distributed key management for trusted execution environments
CN111095899A (en)*2019-04-262020-05-01阿里巴巴集团控股有限公司Distributed key management for trusted execution environments
CN111095899B (en)*2019-04-262021-12-24创新先进技术有限公司Distributed key management for trusted execution environments
CN110278076A (en)*2019-05-292019-09-24电子科技大学 A blockchain-based transparent data integrity audit and transparent encrypted data deduplication protocol
CN110278076B (en)*2019-05-292022-06-03电子科技大学 A blockchain-based transparent data integrity audit and transparent encrypted data deduplication method
CN110213264A (en)*2019-05-302019-09-06全链通有限公司Auth method, equipment and storage medium based on alliance's block chain
CN110971413A (en)*2019-06-202020-04-07腾讯科技(深圳)有限公司Random number generation method, random number generation device and storage medium
CN110971413B (en)*2019-06-202021-07-06腾讯科技(深圳)有限公司Random number generation method, random number generation device and storage medium
CN111030821A (en)*2019-08-272020-04-17杭州云象网络技术有限公司Alliance chain encryption method based on bilinear mapping technology
CN110751556A (en)*2019-09-282020-02-04北京瑞卓喜投科技发展有限公司Asset issuing supervision method, equipment and system
CN110719163A (en)*2019-09-292020-01-21联想(北京)有限公司Information processing method, device and storage medium
CN110851859B (en)*2019-10-222023-09-29华东师范大学Authentication method of distributed authority node block chain system with (n, t) threshold
CN110851859A (en)*2019-10-222020-02-28华东师范大学 A distributed authoritative node blockchain system with (n, t) threshold and its authentication method
CN111010280B (en)*2019-12-092021-07-30中山大学 A Supervised Blockchain Construction Method Based on Group Signature
CN111010280A (en)*2019-12-092020-04-14中山大学 A Supervised Blockchain Construction Method Based on Group Signature
CN111181730A (en)*2019-12-312020-05-19航天信息股份有限公司User identity generation and updating method and device, storage medium and node equipment
US11218293B2 (en)2020-01-272022-01-04Hewlett Packard Enterprise Development LpSecure parameter merging using homomorphic encryption for swarm learning
US11436692B2 (en)2020-01-272022-09-06Hewlett Packard Enterprise Development LpSystems and methods for monetizing data in decentralized model building for machine learning using a blockchain
US11887204B2 (en)2020-01-272024-01-30Hewlett Packard Enterprise Development LpSystems and methods for monetizing data in decentralized model building for machine learning using a blockchain
US11876891B2 (en)2020-01-272024-01-16Hewlett Packard Enterprise Development LpSecure parameter merging using homomorphic encryption for swarm learning
US11748835B2 (en)2020-01-272023-09-05Hewlett Packard Enterprise Development LpSystems and methods for monetizing data in decentralized model building for machine learning using a blockchain
US12393883B2 (en)2020-01-312025-08-19Hewlett Packard Enterprise Development LpAdaptively synchronizing learning of multiple learning models
CN111277412B (en)*2020-02-182023-03-24暨南大学Data security sharing system and method based on block chain key distribution
CN111277412A (en)*2020-02-182020-06-12暨南大学Data security sharing system and method based on block chain key distribution
CN111371744B (en)*2020-02-212022-06-03重庆邮电大学Byzantine fault-tolerant consensus method based on distributed key
CN111371744A (en)*2020-02-212020-07-03重庆邮电大学Byzantine fault-tolerant consensus method based on distributed key
CN111614462B (en)*2020-04-242023-11-14傲林科技有限公司Key calculation method and system based on blockchain
CN113691570A (en)*2020-05-182021-11-23山东浪潮质量链科技有限公司Cross-organization communication method, device and medium based on multi-level block chain
CN111865988A (en)*2020-07-222020-10-30山东华普信息科技有限公司Certificate-free key management method, system and terminal based on block chain
CN111865988B (en)*2020-07-222022-10-18山东华普信息科技有限公司Certificate-free key management method, system and terminal based on block chain
CN114301612A (en)*2020-09-222022-04-08中国移动通信有限公司研究院Information processing method, communication apparatus, and encryption apparatus
CN114301612B (en)*2020-09-222024-11-15中国移动通信有限公司研究院 Information processing method, communication device and encryption device
CN112165711A (en)*2020-09-282021-01-01扬州大学Vehicle-mounted ad hoc network group key negotiation method based on block chain
CN112260834A (en)*2020-10-122021-01-22南京邮电大学Block chain-based key generation and management method in Ad Hoc network
CN112260834B (en)*2020-10-122023-01-20南京邮电大学Block chain-based key generation and management method in Ad Hoc network
CN112364387B (en)*2020-10-232024-04-02华南理工大学Identity authentication method and device based on blockchain network, medium and equipment
CN112364387A (en)*2020-10-232021-02-12华南理工大学Identity authentication method, device, medium and equipment based on block chain network
CN114697001B (en)*2020-12-282024-06-07浪潮云洲工业互联网有限公司Information encryption transmission method, equipment and medium based on blockchain
CN114697001A (en)*2020-12-282022-07-01山东浪潮质量链科技有限公司Information encryption transmission method, equipment and medium based on block chain
CN114169888A (en)*2021-12-072022-03-11北京众信星空网络技术有限公司Universal type multi-signature supporting encryption currency custody method
CN114169888B (en)*2021-12-072022-06-28北京众信星空网络技术有限公司Universal type cryptocurrency custody method supporting multiple signatures
CN114640451A (en)*2022-03-292022-06-17蚂蚁区块链科技(上海)有限公司Method, system and consensus node for realizing distributed key generation on block chain
CN114650132A (en)*2022-03-292022-06-21蚂蚁区块链科技(上海)有限公司Method, system and consensus node for realizing distributed key generation on block chain

Similar Documents

PublicationPublication DateTitle
CN107395349A (en)A kind of block chain network cryptographic key distribution method based on self-certified public key system
Feng et al.Blockchain-based cross-domain authentication for intelligent 5G-enabled internet of drones
Li et al.A blockchain privacy protection scheme based on ring signature
US20240095728A1 (en)Blockchain system for confidential and anonymous smart contracts
Xu et al.When quantum information technologies meet blockchain in Web 3.0
CN107240017B (en)Block chain transaction management system and method
CN108171511B (en) A blockchain system with privacy protection
CN103259650B (en)A kind of rationality many secret sharings method to honest participant&#39;s justice
Li et al.Metaopera: A cross-metaverse interoperability protocol
CN106503098A (en)It is built in the block chain cloud service frame system of Paas service layers
CN108885741A (en)Method and system for realizing communication certification on block chain
CN107682364B (en)A kind of license chain privacy method of commerce
CN109583893A (en)The traceable digital cash transaction system based on block chain
CN110380845A (en)Quantum secret communication alliance chain method of commerce based on group&#39;s pool of symmetric keys, system, equipment
CN113393225A (en)Digital currency encryption payment method and system
CN114936852B (en) A privacy token transaction method based on zero-knowledge proof in consortium chain account model
CN117614707B (en)Block chain transaction method, system, electronic equipment and medium based on intelligent contract
Dolev et al.SodsBC: a post-quantum by design asynchronous blockchain framework
Zhao et al.Fuzzy identity-based dynamic auditing of big data on cloud storage
CN106506165A (en) An Anonymous Sorting Method of Virtual Assets Based on Homomorphic Encryption
Zhang et al.Anonymous authentication and information sharing scheme based on blockchain and zero knowledge proof for vanets
CN111738857B (en) Method and device for generating and verifying hidden payment certificate applied to blockchain
CN112583598A (en)Complex Internet of things alliance chain system communication mechanism
Javaid et al.A lightweight and secure energy trading framework for electric vehicles
Lou et al.A weak quantum blind signature with entanglement permutation

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication

Application publication date:20171124

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp