CN113642018A - Key management method based on block chain - Google Patents

Key management method based on block chain Download PDF

Info

Publication number
CN113642018A
CN113642018A CN202110920189.6A CN202110920189A CN113642018A CN 113642018 A CN113642018 A CN 113642018A CN 202110920189 A CN202110920189 A CN 202110920189A CN 113642018 A CN113642018 A CN 113642018A
Authority
CN
China
Prior art keywords
sender
data
key
private key
receiver
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110920189.6A
Other languages
Chinese (zh)
Inventor
王保春
张蛟鹏
余洋
莫恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiaqiao Shenzhen Investment Co ltd
Original Assignee
Yongqi Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yongqi Beijing Technology Co Ltd filed Critical Yongqi Beijing Technology Co Ltd
Priority to CN202110920189.6A priority Critical patent/CN113642018A/en
Publication of CN113642018A publication Critical patent/CN113642018A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a block chain-based key management method, which comprises the following steps: s1, determining identity information of the sender and the receiver, and recording; s2, the sender outputs an instruction, after the server receives the instruction, the server encrypts, calculates and stores the instruction by using the public key of the receiver, and then sends the ciphertext of the original text and the signature of the sender; s3, transmitting the ciphertext of the original text and the signature of the sender to a receiver through a network, and selecting the private key of the management terminal by the receiver; s4, the receiving party decrypts the private key of the receiving party and verifies the private key of the sending party; and S5, after the verification is finished, the information is simultaneously sent to the receivers, the receivers receive the information and then decode or store the data, the data can be sent to a plurality of receivers by determining the number of the senders, and before the sending, the senders can determine the uniqueness and reading times of the data, so that the possibility of losing caused by forgetting to delete the data after stealing or reading for a plurality of times is reduced.

Description

Key management method based on block chain
Technical Field
The invention relates to the technical field of block chain key management, in particular to a block chain key management method.
Background
The block chain is a term in the technical field of information, and essentially, the block chain is a shared database, data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'open transparency', 'collective maintenance' and the like, and based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has a wide application prospect;
however, the current block chain key management method is disordered in transmission mode, and the required information cannot be normally received by a sender and a receiver after transmission easily, and the encryption mode is inconsistent with the decryption mode, so that the receiving mode is difficult, the data reception is unstable, and even the possibility of stealing occurs.
Disclosure of Invention
The invention provides a block chain-based key management method, which can effectively solve the problems that the conventional block chain key management method proposed in the background art is disordered in a transmission mode, a sender and a receiver cannot normally receive required information after transmission, an encryption mode is inconsistent with a decryption mode, the receiving mode is difficult, data receiving is unstable, and even stealing is possible.
In order to achieve the purpose, the invention provides the following technical scheme: a block chain-based key management method comprises the following steps:
s1, determining identity information of the sender and the receiver, and recording;
s2, the sender outputs an instruction, after the server receives the instruction, the server encrypts, calculates and stores the instruction by using the public key of the receiver, and then sends the ciphertext of the original text and the signature of the sender;
s3, transmitting the ciphertext of the original text and the signature of the sender to a receiver through a network, and selecting the private key of the management terminal by the receiver;
s4, the receiving party decrypts the private key of the receiving party and verifies the private key of the sending party;
and S5, after the verification is finished, the information is simultaneously sent to the receiving party, and the receiving party reads or stores the data after receiving the information.
According to the technical scheme, the signature of the sender is obtained by signing the data after calculation and storage, and the signature is carried out through a private key of the sender;
in S2, the number of senders is one, the sender may be an administrator of the server, the number of receivers may be deleted, and anonymity is removed.
According to the technical scheme, the number of the receiving parties in the step S3 is single or multiple, wherein multiple members can share, synchronize and copy the database, and multiple receiving parties can also finish the data sharing, synchronizing and copying;
when the key is personal, one-to-one operation can be realized, the accuracy and the safety are improved, when a plurality of persons exist, one-to-many operation can be realized, the convenient data receiving performance is improved, when the key is one-to-many, the sending party can select the using times of the key or set the automatic destroying time, the reading times and the time are convenient to control, and then the time, the times and the downloading state after the operation of the user can be known through the server.
According to the technical scheme, the algorithm calculated in the S2 and the S4 is formed by matching one or more of DES, AES and IEDA.
According to the technical scheme, in the transmission in the step S3, after receiving the data, the server selects one-time transmission, symmetric transmission or asymmetric transmission, and determines the data according to the re-reading of the receiving party and the requirements of the use frequency and the density, wherein the sender determines the form of the data in the transmission;
the sender can divide the data transmitted at this time into words and a plurality of transmission modes for transmission, the transmitted data is encrypted and calculated and stored by a plurality of public keys, the receiver can verify by the private key of the sender, the data is arranged and integrated, and the transmission can be carried out without sequencing.
According to the above technical solution, in S5, after the receiving side receives the instruction from the sending side, the sending side is given an electronic receipt.
According to the technical scheme, after the private key of the receiving party is decrypted, the private key of the receiving party is calculated again, and the data after the data and the public key of the sending party are verified are sent to the receiving party at the same time.
According to the above technical solution, in S3, when a network user needs to send an encryption message to another user through a public key cryptosystem, a certificate is needed to obtain a public key of the user, so as to complete an encryption operation;
when the digital signature of another user needs to be verified, the public key of the user also needs to be obtained by inquiring the public key certificate so as to verify the digital signature;
and (4) revoking the certificate, namely, when the validity period of the certificate is exceeded, the sender can revoke the certificate, and when a public and private key pair needs to be replaced due to the leakage of a private key, a request can be sent to the server to revoke the certificate.
Compared with the prior art, the invention has the beneficial effects that: the invention has scientific and reasonable structure and safe and convenient use, can send data to a plurality of receivers by determining the number of the senders, and before sending, the senders can determine the uniqueness and reading times of the data, thereby reducing the possibility of losing caused by forgetting to delete the data after stealing the data or reading the data for a plurality of times, secondly, the receivers can verify the data by the private key of the senders by encrypting and calculating the transmitted data by a plurality of public keys, and the large-scale data can be separately transmitted without sequencing in the transmission, thereby reducing the possibility of losing or stealing the data, then the private key can be used for a plurality of times by an encryption mode and reading the data by a plurality of people and one person, thereby realizing safer and more comprehensive reading records and realizing the effect of more transparence of key management, is suitable for better popularization and use.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.
In the drawings:
FIG. 1 is a schematic diagram of the structure of the process steps of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Example 1:
as shown in fig. 1, the present invention provides a technical solution, a block chain key management method, including the following steps:
s1, determining identity information of the sender and the receiver, and recording;
s2, the sender outputs an instruction, after the server receives the instruction, the server encrypts, calculates and stores the instruction by using the public key of the receiver, and then sends the ciphertext of the original text and the signature of the sender;
s3, transmitting the ciphertext of the original text and the signature of the sender to a receiver through a network, and selecting the private key of the management terminal by the receiver;
s4, the receiving party decrypts the private key of the receiving party and verifies the private key of the sending party;
and S5, after the verification is finished, the information is simultaneously sent to the receiving party, and the receiving party reads or stores the data after receiving the information.
According to the technical scheme, the signature of the sender is carried out by signing the data after calculation and storage, and the signature is carried out by a private key of the sender;
in S2, the number of senders is one, the sender may be an administrator of the server, the number of recipients may be deleted, and anonymity is removed.
According to the technical scheme, the receiver in the S3 is single;
when the operation is personal, one-to-one operation can be realized, and the accuracy and the safety are improved.
According to the technical scheme, the algorithm calculated in S2 and S4 is DES.
According to the technical scheme, in the transmission in S3, after receiving the data, the server selects one-time transmission, and determines the data according to the re-reading of the receiving party and the requirements of the use frequency and the density, wherein the sender determines the form of the data in the transmission;
the sender can divide the data transmitted at this time into words and transmit the data in a plurality of transmission modes, the transmitted data is encrypted, calculated and stored by a plurality of public keys, the receiver can verify the data by the private key of the sender, and the data is arranged and integrated without sequencing in transmission;
but a transmission can be added to provide the receiving sequence list so as to facilitate the receiving party to realize normal reading of data, and the data read at this time is sent singly and marked, and the receipt is sent more than once.
According to the technical scheme, in the S5, after the receiver receives the instruction of the sender, the sender is given an electronic receipt.
According to the technical scheme, after the private key of the receiving party is decrypted, the private key of the receiving party is calculated again, and the data verified by the public key of the sending party are simultaneously sent to the receiving party.
According to the above technical solution, when a network user needs to send an encryption message to another user through a public key cryptosystem in S3, a certificate is needed to obtain the public key of the user, so as to complete an encryption operation;
when the digital signature of another user needs to be verified, the public key of the user also needs to be obtained by inquiring the public key certificate so as to verify the digital signature;
and (4) revoking the certificate, namely, when the validity period of the certificate is exceeded, the sender can revoke the certificate, and when a public and private key pair needs to be replaced due to the leakage of a private key, a request can be sent to the server to revoke the certificate.
Example 2:
as shown in fig. 1, the present invention provides a technical solution, a block chain key management method, including the following steps:
s1, determining identity information of the sender and the receiver, and recording;
s2, the sender outputs an instruction, after the server receives the instruction, the server encrypts, calculates and stores the instruction by using the public key of the receiver, and then sends the ciphertext of the original text and the signature of the sender;
s3, transmitting the ciphertext of the original text and the signature of the sender to a receiver through a network, and selecting the private key of the management terminal by the receiver;
s4, the receiving party decrypts the private key of the receiving party and verifies the private key of the sending party;
and S5, after the verification is finished, the information is simultaneously sent to the receiving party, and the receiving party reads or stores the data after receiving the information.
According to the technical scheme, the signature of the sender is carried out by signing the data after calculation and storage, and the signature is carried out by a private key of the sender;
in S2, the number of senders is one, the sender may be an administrator of the server, the number of recipients may be deleted, and anonymity is removed.
According to the technical scheme, the number of the receiving parties in the S3 is multiple, wherein the multiple members can share, synchronize and copy the database, and the multiple receiving parties can also finish the data sharing, synchronizing and copying;
in the case of multiple persons, one-to-many operation can be realized, the convenient data receiving performance is improved, and in the case of one-to-many operation, the sender can select the use times of the key or set the automatic destruction time, so that the reading times and time are convenient to control, and the time, the times and the downloading state after operation of the user can be known through the server.
According to the technical scheme, the algorithm calculated in S2 and S4 is DES.
According to the technical scheme, in the transmission in S3, after receiving the data, the server selects one-time transmission, and determines the data according to the re-reading of the receiving party and the requirements of the use frequency and the density, wherein the sender determines the form of the data in the transmission;
the sender can divide the data transmitted at this time into words and transmit the data in a plurality of transmission modes, the transmitted data is encrypted, calculated and stored by a plurality of public keys, the receiver can verify the data by the private key of the sender, and the data is arranged and integrated without sequencing in transmission;
but a transmission can be added to provide the receiving sequence list so as to facilitate the receiving party to realize normal reading of data, and the data read at this time is sent singly and marked, and the receipt is sent more than once.
According to the technical scheme, in the S5, after the receiver receives the instruction of the sender, the sender is given an electronic receipt.
According to the technical scheme, after the private key of the receiving party is decrypted, the private key of the receiving party is calculated again, and the data verified by the public key of the sending party are simultaneously sent to the receiving party.
According to the above technical solution, when a network user needs to send an encryption message to another user through a public key cryptosystem in S3, a certificate is needed to obtain the public key of the user, so as to complete an encryption operation;
when the digital signature of another user needs to be verified, the public key of the user also needs to be obtained by inquiring the public key certificate so as to verify the digital signature;
and (4) revoking the certificate, namely, when the validity period of the certificate is exceeded, the sender can revoke the certificate, and when a public and private key pair needs to be replaced due to the leakage of a private key, a request can be sent to the server to revoke the certificate.
Compared with the prior art, the invention has the beneficial effects that: the invention has scientific and reasonable structure and safe and convenient use, can send data to a plurality of receivers by determining the number of the senders, and before sending, the senders can determine the uniqueness and reading times of the data, thereby reducing the possibility of losing caused by forgetting to delete the data after stealing the data or reading the data for a plurality of times, secondly, the receivers can verify the data by the private key of the senders by encrypting and calculating the transmitted data by a plurality of public keys, and the large-scale data can be separately transmitted without sequencing in the transmission, thereby reducing the possibility of losing or stealing the data, then the private key can be used for a plurality of times by an encryption mode and reading the data by a plurality of people and one person, thereby realizing safer and more comprehensive reading records and realizing the effect of more transparence of key management, is suitable for better popularization and use.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A block chain-based key management method is characterized in that: the method comprises the following steps:
s1, determining identity information of the sender and the receiver, and recording;
s2, the sender outputs an instruction, after the server receives the instruction, the server encrypts, calculates and stores the instruction by using the public key of the receiver, and then sends the ciphertext of the original text and the signature of the sender;
s3, transmitting the ciphertext of the original text and the signature of the sender to a receiver through a network, and selecting the private key of the management terminal by the receiver;
s4, the receiving party decrypts the private key of the receiving party and verifies the private key of the sending party;
and S5, after the verification is finished, the information is simultaneously sent to the receiving party, and the receiving party reads or stores the data after receiving the information.
2. The blockchain-based key management method of claim 1, wherein the S2 signature at the sender is signed by computing the stored data, and the signature is performed by a sender private key;
in S2, the number of senders is one, the sender may be an administrator of the server, the number of receivers may be deleted, and anonymity is removed.
3. The blockchain-based key management method of claim 1, wherein the receiving party in S3 is a single or multiple people, wherein multiple members can share, synchronize and duplicate the database, and wherein multiple receiving parties can also be jointly used;
when the key is personal, one-to-one operation can be realized, when a plurality of persons exist, one-to-many operation can be realized, and when one-to-many operation is realized, the sender can select the use times of the key or set the automatic destruction time so as to be convenient for reading the times and controlling the time, and then the server can know the time, the times and the downloading state after the operation of the user.
4. The blockchain-based key management method of claim 1, wherein the algorithms calculated in S2 and S4 are one or more of DES, AES and IEDA.
5. The blockchain-based key management method of claim 1, wherein in the transmission in S3, after the server receives the data, the server selects one-time transmission, symmetric transmission or asymmetric transmission, and determines the data according to the re-reading and using frequency and density requirement of the receiving party, and the sender determines the form of the data in the transmission;
the sender can divide the data transmitted at this time into words and a plurality of transmission modes for transmission, the transmitted data is encrypted and calculated and stored by a plurality of public keys, the receiver can verify by the private key of the sender, the data is arranged and integrated, and the transmission can be carried out without sequencing.
6. The blockchain-based key management method of claim 1, wherein in S5, after the receiving party receives the instruction from the sending party, the sending party is given an electronic receipt.
7. The blockchain-based key management method of claim 1, wherein the private key of the receiving party is decrypted at S5, and then the decrypted private key is recalculated to send the data and the data verified by the public key of the sending party to the receiving party at the same time.
8. The blockchain-based key management method of claim 1, wherein in S3, when a network user needs to send an encrypted message to another user through a public key cryptosystem, a certificate is needed to obtain a public key of the user to complete an encryption operation;
when the digital signature of another user needs to be verified, the public key of the user also needs to be obtained by inquiring the public key certificate so as to verify the digital signature;
and (4) revoking the certificate, namely, when the validity period of the certificate is exceeded, the sender can revoke the certificate, and when a public and private key pair needs to be replaced due to the leakage of a private key, a request can be sent to the server to revoke the certificate.
CN202110920189.6A 2021-08-11 2021-08-11 Key management method based on block chain Pending CN113642018A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110920189.6A CN113642018A (en) 2021-08-11 2021-08-11 Key management method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110920189.6A CN113642018A (en) 2021-08-11 2021-08-11 Key management method based on block chain

Publications (1)

Publication Number Publication Date
CN113642018A true CN113642018A (en) 2021-11-12

Family

ID=78420859

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110920189.6A Pending CN113642018A (en) 2021-08-11 2021-08-11 Key management method based on block chain

Country Status (1)

Country Link
CN (1) CN113642018A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101720071A (en) * 2009-12-01 2010-06-02 郑州信大捷安信息技术有限公司 Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN103138939A (en) * 2013-03-28 2013-06-05 武汉大学 Secret key use time management method based on credible platform module under cloud storage mode
CN106911704A (en) * 2017-03-13 2017-06-30 北京轻信科技有限公司 A kind of encrypting and decrypting method based on block chain
CN107301521A (en) * 2017-06-26 2017-10-27 深圳前海华深安信物联技术有限公司 Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain
CN109802825A (en) * 2017-11-17 2019-05-24 深圳市金证科技股份有限公司 A kind of data encryption, the method for decryption, system and terminal device
CN109889495A (en) * 2019-01-10 2019-06-14 如般量子科技有限公司 Anti- quantum calculation electronic seal method and system based on multiple unsymmetrical key ponds
CN110335051A (en) * 2019-07-03 2019-10-15 烟台市同翔网络科技有限责任公司 A kind of unique code publication of food labelling based on block chain major-minor chain technology and circulation source tracing method
CN110932863A (en) * 2019-11-19 2020-03-27 中国人民武装警察部队工程大学 Generalized signcryption method based on coding
CN111639361A (en) * 2020-05-15 2020-09-08 中国科学院信息工程研究所 Block chain key management method, multi-person common signature method and electronic device
CN111901336A (en) * 2020-07-28 2020-11-06 安徽高山科技有限公司 Block chain-based digital identity authentication method
CN112688999A (en) * 2020-12-18 2021-04-20 武汉科技大学 TrustZone-based key use frequency management method and system in cloud storage mode

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101720071A (en) * 2009-12-01 2010-06-02 郑州信大捷安信息技术有限公司 Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN103138939A (en) * 2013-03-28 2013-06-05 武汉大学 Secret key use time management method based on credible platform module under cloud storage mode
CN106911704A (en) * 2017-03-13 2017-06-30 北京轻信科技有限公司 A kind of encrypting and decrypting method based on block chain
CN107301521A (en) * 2017-06-26 2017-10-27 深圳前海华深安信物联技术有限公司 Strengthen the method for warehouse receipt transaction security in a kind of warehouse receipt system based on block chain
CN109802825A (en) * 2017-11-17 2019-05-24 深圳市金证科技股份有限公司 A kind of data encryption, the method for decryption, system and terminal device
CN109889495A (en) * 2019-01-10 2019-06-14 如般量子科技有限公司 Anti- quantum calculation electronic seal method and system based on multiple unsymmetrical key ponds
CN110335051A (en) * 2019-07-03 2019-10-15 烟台市同翔网络科技有限责任公司 A kind of unique code publication of food labelling based on block chain major-minor chain technology and circulation source tracing method
CN110932863A (en) * 2019-11-19 2020-03-27 中国人民武装警察部队工程大学 Generalized signcryption method based on coding
CN111639361A (en) * 2020-05-15 2020-09-08 中国科学院信息工程研究所 Block chain key management method, multi-person common signature method and electronic device
CN111901336A (en) * 2020-07-28 2020-11-06 安徽高山科技有限公司 Block chain-based digital identity authentication method
CN112688999A (en) * 2020-12-18 2021-04-20 武汉科技大学 TrustZone-based key use frequency management method and system in cloud storage mode

Similar Documents

Publication Publication Date Title
CN109587132B (en) Data transmission method and device based on alliance chain
Borisov et al. Off-the-record communication, or, why not to use PGP
US10903991B1 (en) Systems and methods for generating signatures
CN106104562B (en) System and method for securely storing and recovering confidential data
US10985910B2 (en) Method for exchanging keys authenticated by blockchain
CN103354498B (en) A kind of file encryption transmission method of identity-based
US8094822B2 (en) Broadcast encryption key distribution system
US20020154782A1 (en) System and method for key distribution to maintain secure communication
US20130083926A1 (en) Quantum key management
US9130744B1 (en) Sending an encrypted key pair and a secret shared by two devices to a trusted intermediary
Kremer et al. A multi-party non-repudiation protocol
US9712519B2 (en) Efficient encryption, escrow and digital signatures
Yao et al. A novel revocable and identity-based conditional proxy re-encryption scheme with ciphertext evolution for secure cloud data sharing
CN111049738B (en) E-mail data security protection method based on hybrid encryption
CN109962924B (en) Group chat construction method, group message sending method, group message receiving method and system
WO2018076798A1 (en) Method and apparatus for transmitting data
CN111131311A (en) Data transmission method based on block chain and block chain link point
TWI761243B (en) Encryption system and encryption method for group instant massaging
CN113642018A (en) Key management method based on block chain
KR20100023629A (en) Method and system of distributing group key using broadcasting message authentication on wireless sensor network and recording medium using this
CN111488618B (en) Block chain-based one-time pad encryption method, device and storage medium
Kester A public-key exchange cryptographic technique using matrix
Wong et al. E–mail protocols with perfect forward secrecy
JPH06112935A (en) Ciphering communication method
Anusree et al. A security framework for brokerless publish subscribe system using identity based signcryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20220928

Address after: Room 305, No. 188, Zhugu Shi Road, Wulian, Central City, Longgang Street, Longgang District, Shenzhen, Guangdong 518000

Applicant after: Jiaqiao (Shenzhen) Investment Co.,Ltd.

Address before: D-1908, 19th floor, building 222, Wangjing Xiyuan, Chaoyang District, Beijing

Applicant before: Yongqi (Beijing) Technology Co.,Ltd.

TA01 Transfer of patent application right