CN112398653B - Block chain consensus verification method - Google Patents

Block chain consensus verification method Download PDF

Info

Publication number
CN112398653B
CN112398653B CN202011145941.6A CN202011145941A CN112398653B CN 112398653 B CN112398653 B CN 112398653B CN 202011145941 A CN202011145941 A CN 202011145941A CN 112398653 B CN112398653 B CN 112398653B
Authority
CN
China
Prior art keywords
node
consensus
private data
nodes
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011145941.6A
Other languages
Chinese (zh)
Other versions
CN112398653A (en
Inventor
苗政委
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shaanxi Medicine Chain Group Co Ltd
Original Assignee
Shaanxi Medicine Chain Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shaanxi Medicine Chain Group Co Ltd filed Critical Shaanxi Medicine Chain Group Co Ltd
Priority to CN202011145941.6A priority Critical patent/CN112398653B/en
Publication of CN112398653A publication Critical patent/CN112398653A/en
Application granted granted Critical
Publication of CN112398653B publication Critical patent/CN112398653B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Development Economics (AREA)
  • Pure & Applied Mathematics (AREA)
  • Power Engineering (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Analysis (AREA)
  • Algebra (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a block chain consensus verification method, which comprises the following steps: a. private data is exchanged among all nodes of the block chain through network communication; b. any node in the block chain performs consensus on the transaction and signs the consensus information; c. carrying out hash calculation on the signature and the consensus information by any node to obtain a hash value H; d. the hash value H is sent to other nodes in the block chain by any node; e. performing hash calculation on other nodes to obtain a hash value H'; f. and the other nodes verify whether the received hash value H is equal to the calculated hash value H', and if so, the verification is passed. The method and the device adopt HASH (Hash) operation to replace elliptic curve signature and signature verification algorithm, avoid huge calculation power consumption brought by the elliptic curve algorithm, and improve the efficiency of block chain consensus verification.

Description

Block chain consensus verification method
Technical Field
The application relates to the technical field of block chains, in particular to a block chain consensus verification method.
Background
Common consensus verification algorithms in block chains at present use elliptic curve signature and de-signature algorithms, which require that the signature and the consensus of the producer are sent to the verification producer together. The verification producer needs to perform signature release operation on the signature, and the elliptic curve signature and signature release algorithm need a large amount of calculation power to be consumed in the process of verifying the consensus. For example: three nodes A, B and C in the block chain need to identify the transaction T.
Firstly, carrying out consensus signature sig-A on a transaction T by a node A, and sending the consensus signature sig-A to nodes B and C;
the nodes B and C perform label release on the signature sig-A and verify consensus information;
the node B performs consensus signature sig-B on the transaction T, and sends consensus information, signature sig-A and signature sig-B to the nodes A and C;
the node C performs consensus sigC on the transaction T, and sends consensus information, the signature sigA and the signature sigC to the nodes A and B;
the node A receives the data of the node B, judges whether different signature data exist or not, if so, carries out label-off on the different signature data, and if so, combines the signatures to obtain signatures (sig-A and sig-B);
the node A receives the data of the node C, judges whether different signature data exist or not, if so, carries out label release on the different signature data, if so, combines the signatures, and if not, abandons the different signatures incorrectly, and finally obtains the signatures (sig-A, sig-B and sig-C);
the node B receives the signature data sent by the node C, signature comparison is carried out, different signatures are de-signed, if the result is correct, the signatures are combined, and finally [ sig-A, sig-B and sig-C ] are obtained;
the same node C receives the data sent by the node B, executes the same operation and finally obtains signatures (sig-A, sig-B and sig-C);
and finally, the three nodes A, B and C obtain consensus signatures (sig-A, sig-B and sig-C), and the consensus is successful.
From the above description, it can be derived that when there are N nodes, the whole system needs to perform elliptic curve de-signing for N × N (N-1). I.e. each node performs elliptic curve de-signing N-1 times. When the transaction amount is large, most of the calculation power of the whole system is consumed on elliptic curve signature removal, and the efficiency of block chain consensus confirmation is greatly reduced.
Disclosure of Invention
In view of the above, the present application provides a method, an apparatus, a device and a medium for verifying block chain consensus, which aims to improve the efficiency of block chain consensus verification.
In order to achieve the purpose, the technical scheme adopted by the application is as follows:
the application provides a block chain consensus verification method, which comprises the following steps:
a. establishing network communication among all nodes of a block chain, and exchanging private data through the network communication, wherein the private data is matched with a communication node and a communication direction;
b. carrying out consensus on transactions by each node in a block chain to form consensus information and signing the consensus information, wherein the consensus information is used for indicating whether the transaction participation node agrees on the transactions;
c. the nodes perform hash calculation on the signature and the consensus information through the matched private data to obtain a hash value H;
d. the nodes send the hash value H and the signed consensus information to other nodes in the block chain;
e. c, extracting the signature and the consensus information from the received information by the other nodes, and performing hash calculation on the extracted consensus information and the signature by adopting the private data same as the private data in the step c to obtain a hash value H';
f. and the other nodes verify whether the received hash value H is equal to the calculated hash value H', and if so, the verification is passed.
Optionally, after the verification passes, the block chain consensus verification method further includes:
g. combining different signatures by each node in the block chain;
h. judging whether all nodes in the block chain obtain the joint signatures of all the nodes or not;
i. if yes, the consensus is successful.
Optionally, the exchanging of private data through the network communication specifically includes:
signing the private data by using a private key of the sending node;
sending the signed private data to a receiving node;
and the receiving node carries out signature removal on the signed private data.
Optionally, the private data is signed and de-signed by using an elliptic curve algorithm.
Optionally, before the step e, the method further includes:
c, judging whether the other nodes have the same private data as the private data in the step c or not by the other nodes;
if yes, executing step e;
and if the signature does not exist, the signed consensus information is subjected to label release by adopting an elliptic curve algorithm.
The beneficial effect of this application is:
1. according to the method, the respective private data are exchanged to serve as confirmation conditions for pairwise communication of the block link points, and the private data are signed by the private key of the sending node, so that the authenticity and the integrity of the private data are guaranteed;
2. according to the method, the signature and the signature of the private data are carried out only at the beginning of communication by adopting the elliptic curve signature, and HASH (Hash) operation is adopted in the subsequent process to replace the elliptic curve signature and signature verification algorithm, so that huge calculation power consumption caused by the elliptic curve algorithm is avoided, and the efficiency of block chain consensus verification is improved;
3. according to the method and the device, the problem that how to realize consensus verification by carrying third-party consensus information when the network is unstable is solved, the consensus verification requirements under various different network environments are met, and certain universality is achieved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a flowchart of a block chain consensus verification method according to the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments.
The application provides a block chain consensus verification method, which comprises the following steps:
s101, establishing network communication among nodes of a block chain, and exchanging private data through the network communication, wherein the private data is matched with a communication node and a communication direction;
for example, when a network communication is established between node a and node B in the blockchain, node a may send private data to node B, and node B may also send private data to node a. However, the private data sent by node a to node B is completely different from the private data sent by node B to node a, i.e. the private data matches the communication node and the communication direction.
Specifically, before the private data is exchanged, the private data is signed by using a private key of the sending node, and the receiving node receives the signed private data and then performs the signature removal. The identity of the sending node can thus be verified to ensure authenticity of the private data and data integrity.
This application includes, but is not limited to, signing and de-signing the private data using elliptic curve algorithms.
The private data is interference data used for Hash calculation.
S102, carrying out consensus on the transaction by each node in the block chain to form consensus information and signing the consensus information, wherein the consensus information is used for indicating whether the transaction participation node achieves consensus on the transaction;
s103, performing hash calculation on the signature and the consensus information by each node through the matched private data to obtain a hash value H;
s104, the nodes send the hash value H and the signed consensus information to other nodes in a block chain;
s105, the other nodes extract the signatures and the consensus information from the received information, and hash calculation is carried out on the extracted consensus information and the signatures by using the private data same as that in the step S103 to obtain hash values H';
in each node, there are several private data obtained by exchange, and among these private data, the same private data as that in step S103 is selected to perform hash calculation on the extracted consensus information and signature.
And S106, verifying whether the received hash value H is equal to the calculated hash value H' by other nodes, and if so, passing the verification.
As a further embodiment, after the verification passes, the block chain consensus verification method further includes:
combining different signatures by each node in the block chain;
judging whether each node in the block chain obtains the combined signature of all the nodes or not;
if yes, the consensus is successful.
As an optional implementation manner, before the step S105, the method further includes:
the other nodes judge whether private data same as the private data in the step S103 exists or not;
if yes, go to step S105;
and if the signature does not exist, the signed consensus information is subjected to label release by adopting an elliptic curve algorithm.
In a specific implementation process, when a communication network is unstable or has a delay, and it is possible that a certain node in a block chain does not receive private data of an opposite node, the node does not have private data for performing hash calculation, and at this time, the authenticity of the consensus information cannot be verified by adopting the hash calculation.
Example (c):
the method comprises the steps of establishing network communication among nodes A, B and C in a block chain, exchanging communication private data, signing the exchanged data by using a private key of a sending node, and carrying out label release on a receiving node so as to verify the identity and the information integrity of the sending node. The established private data comprises:
p-ab represents the private data sent by the node A to the node B;
p-ba, which represents private data sent by node B to node A;
p-bc represents private data sent by the node B to the node C;
p-cb, which represents the private data sent by the node C to the node B;
p-ac, which represents the private data sent by the node A to the node C;
p-ca, which represents private data sent by the node C to the node A;
when the node A carries out consensus signature sig-A on the transaction T and sends consensus to the node B, HASH is carried out on consensus information + signature sig-A + P-ab, the Hash result is H (A-B), and the consensus information, the signature sig-A and the H (A-B) are sent to the node B together. When consensus is sent to the node C, HASH is carried out on the consensus information and the signatures sig-A and P-ac, the Hash result is H (A-C), and the consensus information, the signatures sig-A and H (A-C) are sent to the node C together;
the node B receives the information sent by the node A, acquires the consensus information, the signatures sig-A and H (A-B) from the information, performs HASH operation on the consensus information, the signatures sig-A and the P-ab to obtain a Hash result H (A-B)', and if the H (A-B) = = H (A-B), the consensus information is confirmed to be correct;
the node C receives the information sent by the node A, acquires the consensus information, the signatures sig-A and H (A-C) from the information, performs HASH operation on the consensus information, the signatures sig-A and the P-ac to obtain a Hash result H (A-C) ', and if H (A-C)' = = H (A-C), the consensus information is confirmed to be correct;
and the node B carries out consensus signature sig-B on the transaction T, HASH operation is carried out on the consensus information + signature sig-B + P-base:Sub>A when consensus is sent to the node A to obtain H (B-A), and the consensus information, the signature sig-A, the sig-B and the H (B-A) are sent to the node A. Sending consensus to a node C, carrying out HASH operation on the consensus information and the signature sig-B + P-bc to obtain H (B-C), and sending the consensus information, the signature sig-A, the signature sig-B and the H (B-C) to the node C;
and the node C carries out consensus signature sig-C on the transaction T, HASH operation is carried out on the consensus information + signature sig-B + P-cse:Sub>A when consensus is sent to the node A to obtain H (C-A), and the consensus information, the signatures sig-A, sig-C and H (C-A) are sent to the node A. Sending a consensus to a node B, carrying out HASH operation on the consensus information and the signature sig-C + P-cb to obtain H (C-B), and sending the consensus information, the signatures sig-A, sig-C and H (C-B) to the node B;
the node A receives the information sent by the node B, firstly, HASH operation is carried out on the consensus information + signature sig-B + P-base:Sub>A to obtain H (B-A)', and if H (B-A) = = H (B-A), different signatures are combined to obtain signatures [ sig-A, sig-B ];
the node A receives the information sent by the node C, HASH operation is carried out on the consensus information and the signature sig-C + P-cse:Sub>A to obtain H (C-A) ', and if the H (C-A)' = = H (C-A), different signatures are combined to obtain signatures (sig-A, sig-B and sig-C);
the node B receives the information sent by the node C, HASH operation is carried out on the consensus information and the signature sig-C + P-cb to obtain H (C-B) ', and if the H (C-B)' = = H (C-B), different signatures are combined to obtain signatures [ sig-A, sig-B and sig-C ];
node C receives the information sent by node B, HASH operation is carried out on the consensus information + signature sig-B + P-bc to obtain H (B-C) ', and if H (B-C)' = = H (B-C), different signatures are combined to obtain signatures [ sig-A, sig-B and sig-C ];
and the nodes A, B and C obtain the joint signatures (sig-A, sig-B and sig-C) of all the nodes, and the joint identification is successful.
It should be further noted that each node in the block chain, i.e., nodes a, B, and C, simultaneously recognizes the transaction T, and for convenience of description, the recognition operations of different nodes are described in sections.
In addition, in the specific implementation, due to the situation of network delay and the like, a certain node, for example, the node B receives the consensus information and the signature sent by the node a before the node B performs consensus on the transaction T, and at this time, after the node B performs consensus on the transaction T, the node B not only sends the consensus information and the signature of the node B to the nodes a and C, but also sends the received consensus information and the signature of the node a to the nodes a and C.
In other embodiments, there may be a node, for example, when the node C does not receive the consensus information and the signature sent by the node a, the node C receives the consensus information and the signature sent by the node B first, and the consensus information and the signature carry the consensus signature of the node a, and at this time, the node C also needs to determine the correctness of the consensus signature of the node a, and at this time, if the node C does not have the private data P-ac, the consensus signature of the node a is verified by using an elliptic curve de-signing algorithm.
According to the method and the device, the elliptic curve signature is adopted only at the beginning of communication to sign and sign private data, HASH (Hash) operation is adopted in the subsequent process to replace elliptic curve signature and signature verification algorithm, huge calculation power consumption caused by the elliptic curve algorithm is avoided, and the efficiency of block chain consensus verification is improved. In addition, the method and the device solve the problem that when the network is unstable, how to realize the consensus verification by carrying the third-party consensus information meets the consensus verification requirements under various different network environments, and have certain universality.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think of the changes or substitutions within the technical scope of the present application, and shall cover the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (5)

1. A block chain consensus verification method, comprising:
a. establishing network communication among all nodes of a block chain, and exchanging private data through the network communication, wherein the private data is matched with a communication node and a communication direction;
b. each node in the block chain performs consensus on the transaction to form consensus information and signs the consensus information, wherein the consensus information is used for indicating whether the transaction participation node agrees on the transaction;
c. the nodes perform hash calculation on the signature and the consensus information through the matched private data to obtain a hash value H;
d. the nodes send the hash value H and the signed consensus information to other nodes in the block chain;
e. c, extracting the signature and the consensus information from the received information by the other nodes, and performing hash calculation on the extracted consensus information and the signature by adopting the private data same as the private data in the step c to obtain a hash value H';
f. and the other nodes verify whether the received hash value H is equal to the calculated hash value H', and if so, the verification is passed.
2. The method as claimed in claim 1, wherein after the verification is passed, the method further comprises:
g. combining different signatures by each node in the block chain;
h. judging whether all nodes in the block chain obtain the joint signatures of all the nodes or not;
i. if yes, the consensus is successful.
3. A method as claimed in claim 1 or 2, wherein said exchanging private data via said network communication comprises:
signing the private data by using a private key of the sending node;
sending the signed private data to a receiving node;
and the receiving node carries out signature removal on the signed private data.
4. The blockchain consensus verification method of claim 3, wherein the private data is signed and de-signed using an elliptic curve algorithm.
5. The method as claimed in claim 3, wherein said step e further comprises:
c, judging whether private data identical to the private data in the step c exist in each node by the other nodes;
if yes, executing step e;
and if the signature does not exist, the signed consensus information is subjected to label release by adopting an elliptic curve algorithm.
CN202011145941.6A 2020-10-23 2020-10-23 Block chain consensus verification method Active CN112398653B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011145941.6A CN112398653B (en) 2020-10-23 2020-10-23 Block chain consensus verification method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011145941.6A CN112398653B (en) 2020-10-23 2020-10-23 Block chain consensus verification method

Publications (2)

Publication Number Publication Date
CN112398653A CN112398653A (en) 2021-02-23
CN112398653B true CN112398653B (en) 2022-12-06

Family

ID=74597109

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011145941.6A Active CN112398653B (en) 2020-10-23 2020-10-23 Block chain consensus verification method

Country Status (1)

Country Link
CN (1) CN112398653B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108711052A (en) * 2018-05-18 2018-10-26 电子科技大学 A kind of information authentication system based on block chain
CN111723406A (en) * 2020-06-08 2020-09-29 上海朝夕网络技术有限公司 Consensus algorithm and system of block chain

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2020108023A (en) * 2018-12-27 2020-07-09 株式会社東京技術計算コンサルタント Content time certification system
CN109767220B (en) * 2019-01-15 2021-02-19 中国联合网络通信集团有限公司 Block chain based transaction method and block chain based transaction system
CN110597489B (en) * 2019-09-26 2023-11-24 腾讯科技(深圳)有限公司 Random number generation method, equipment and medium
CN110825755B (en) * 2019-10-30 2021-05-04 北京海益同展信息科技有限公司 Block chain consensus method, consensus node, electronic device, and storage medium
CN111414650B (en) * 2020-03-25 2023-11-21 北京新创智链科技有限公司 Order processing method and system based on blockchain storage certificate

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108711052A (en) * 2018-05-18 2018-10-26 电子科技大学 A kind of information authentication system based on block chain
CN111723406A (en) * 2020-06-08 2020-09-29 上海朝夕网络技术有限公司 Consensus algorithm and system of block chain

Also Published As

Publication number Publication date
CN112398653A (en) 2021-02-23

Similar Documents

Publication Publication Date Title
CN109741056B (en) Method and device for uploading electronic certificate
CN108269090B (en) Consensus method and device for block chain system based on non-negotiation random drawing
CN107396360A (en) Block verification method and device
CN111899002B (en) Method for efficiently performing cross-chain information transaction interaction in blockchain
CN103544013B (en) A kind of plug-in system and plug-in management method
CN110071807B (en) Block chain point-to-point node authentication method, system and computer readable storage medium
CN116155507A (en) Message hash chain construction method
CN111478772A (en) Assembly line friendly signature and signature verification method, device and storage medium
CN112686672A (en) Block chain endorsement signature compression method, electronic device and storage medium
CN111224782B (en) Data verification method based on digital signature, intelligent device and storage medium
CN110690969A (en) Method and system for completing bidirectional SSL/TLS authentication in cooperation of multiple parties
CN112734410B (en) Method and device for pre-executing chain code in Fabric Block chain
CN112398653B (en) Block chain consensus verification method
CN112667743B (en) Data uplink method, system, equipment and storage medium applied to transmission terminal
CN111600703B (en) SM 2-based signature method, system, electronic equipment and storage medium
CN111294359B (en) Pressure testing method, pressure testing device, computer equipment and storage medium
CN112838930A (en) Block chain transaction execution method and device, electronic equipment and storage medium
CN115860683A (en) Business process processing system, method, client and medium
CN114844716A (en) Digital signature message processing method, device, equipment and computer medium
CN110443616B (en) Byzantine fault-tolerant consensus method based on random threshold signature mechanism
CN110061841B (en) Signature method, signature verification method and signature verification device
CN108282336A (en) Device subscription verification method and device
CN113489690A (en) On-line/off-line outsourcing data integrity auditing method with strong resistance to key exposure
CN114445072A (en) Block chain transaction method and block chain transaction system
CN112580109B (en) Software business process legality design method by using block chain signature technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant