[go: up one dir, main page]

CN116915407A - Electronic public certificate verification method and system based on block chain - Google Patents

Electronic public certificate verification method and system based on block chain Download PDF

Info

Publication number
CN116915407A
CN116915407A CN202211739461.1A CN202211739461A CN116915407A CN 116915407 A CN116915407 A CN 116915407A CN 202211739461 A CN202211739461 A CN 202211739461A CN 116915407 A CN116915407 A CN 116915407A
Authority
CN
China
Prior art keywords
encryption
notarization
result
hash
algorithm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211739461.1A
Other languages
Chinese (zh)
Inventor
诸旦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Lianzheng Intelligent Technology Co ltd
Original Assignee
Suzhou Lianzheng Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Lianzheng Intelligent Technology Co ltd filed Critical Suzhou Lianzheng Intelligent Technology Co ltd
Priority to CN202211739461.1A priority Critical patent/CN116915407A/en
Publication of CN116915407A publication Critical patent/CN116915407A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Tourism & Hospitality (AREA)
  • Computing Systems (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • General Engineering & Computer Science (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a block chain-based electronic public certificate verification method and system, comprising a public certificate handling platform, a dynamic verification code and a public certificate management platform, wherein the public certificate handling platform generates an electronic public certificate and a dynamic verification code according to the application of a principal; generating an encryption result through an encryption algorithm according to the electronic public certificate and the dynamic check code and by combining a private key of the notarization transaction platform, and storing the encryption result to a blockchain to obtain a certification hash result; and the principal provides the electronic public certificate, the dynamic checking code and the certificate storing hash result to a verifier, and the verifier performs decryption by combining a public key at a notarization place to verify the authenticity of the electronic public certificate. The method of the present disclosure verifies the authenticity of the notarized document on the premise of ensuring that the notarized document is not exposed, and only the authorized verification party can verify the notarized document, thereby maximally ensuring the privacy of the party.

Description

Electronic public certificate verification method and system based on block chain
Technical Field
The present disclosure relates to blockchain technologies, and in particular, to a blockchain-based electronic public certificate verification method and system.
Background
At present, the certificate handling systems used at various notarization departments are all in government affair extranets and are not communicated with the Internet, and the certificate handling systems usually have paper public certificates or electronic versions without electronic signature. When the collection (use) organization of the public certificate and the individual check, the public certificate needs to contact the corresponding certificate-issuing department by dialing telephone and other modes, so that the authenticity of the public certificate can not be conveniently verified on the Internet.
The current checking mode mainly depends on manual work and has low efficiency. There are also online inquiry modes provided by some notarization places, such as adding two-dimensional codes on the notarization, identifying by scanning codes, etc., but the method is realized only for individual notarization places and has no universality.
The information disclosed in the background section of the application is only for enhancement of understanding of the general background of the application and should not be taken as an acknowledgement or any form of suggestion that this information forms the prior art already known to a person skilled in the art.
Disclosure of Invention
The embodiment of the disclosure provides a block chain-based electronic public certificate verification method and system, which can at least solve part of problems in the prior art, namely the problems of low efficiency and low universality and safety.
In a first aspect of embodiments of the present disclosure,
the utility model provides a block chain-based electronic public certificate verification method, which comprises the following steps:
the notarization handling platform generates an electronic certificate and a dynamic check code according to the application of a principal, wherein the electronic certificate comprises at least one of notarization number, applicant, notarization matters and notarization date;
generating an encryption result through an encryption algorithm according to the electronic public certificate and the dynamic check code and by combining a private key of the notarization transaction platform, and storing the encryption result to a blockchain to obtain a certification hash result;
and the notarization handling platform provides the electronic public certificate, the dynamic check code and the notarization hash result for a checking party, and the notarization handling platform is used for carrying out decryption by combining a public key of a notarization department to check the authenticity of the electronic public certificate.
In an alternative embodiment of the present application,
the evidence hash result comprises a first evidence hash result and a second evidence hash result, and the second evidence hash result is obtained by encrypting the first evidence hash result;
the principal providing the electronic public certificate, the dynamic check code and the certification hash result to a verifier, decrypting in combination with a public key at a notarization place, and verifying the authenticity of the electronic public certificate comprising:
based on the second evidence-storing hash result, acquiring evidence-storing details from a blockchain to obtain a second encrypted ciphertext;
decrypting the second encrypted ciphertext through a first decryption algorithm by combining the dynamic check code and the second encrypted ciphertext to obtain a first hash value;
acquiring evidence storage details from a blockchain according to the first hash value to obtain a first encrypted ciphertext;
decrypting the first encrypted ciphertext through a second decryption algorithm by combining a public key obtained from a notarization department to obtain a notarization hash result of the electronic public certificate;
and carrying out hash calculation on the electronic public certificate provided by the verifier by using a national cryptographic algorithm, and checking the authenticity of the electronic public certificate according to the comparison between the obtained verification hash result and the notarization hash result.
In an alternative embodiment of the present application,
the first decryption algorithm comprises a national encryption SM4 algorithm, and the second decryption algorithm comprises a national encryption SM2 algorithm.
In an alternative embodiment of the present application,
generating an encryption result through an encryption algorithm according to the electronic public certificate, the dynamic check code and a private key of the notarization transaction platform, and storing the encryption result to a blockchain, wherein the obtaining of the certification hash result comprises the following steps:
calculating a first hash value corresponding to the electronic public certificate through a preset first encryption algorithm, determining a first encryption result through a preset second encryption algorithm according to the first hash value and combining a private key of the notarization handling platform, and storing the first encryption result to a blockchain to obtain a first evidence-storing hash result, wherein the first encryption algorithm encrypts based on a hash function, and the second encryption algorithm encrypts based on an elliptic curve;
the notarization handling platform generates a dynamic check code according to the application of a principal, encrypts the first hash value by using the dynamic check code as a secret key through a third encryption algorithm to obtain a second encryption result, and stores the second encryption result to a blockchain to obtain a second verification hash result, wherein the third encryption algorithm comprises symmetric encryption.
In an alternative embodiment of the present application,
the first encryption algorithm comprises a national encryption SM3 algorithm, the second encryption algorithm comprises a national encryption SM2 algorithm, and the third encryption algorithm comprises a national encryption SM4 algorithm.
In a second aspect of the embodiments of the present disclosure,
provided is a blockchain-based electronic public certificate verification system, comprising:
the first unit is used for generating an electronic certificate and a dynamic check code by the notarization processing platform according to the application of a principal, wherein the electronic certificate comprises at least one of notarization number, applicant, notarization matters and notarization date;
the second unit is used for generating an encryption result through an encryption algorithm according to the electronic public certificate, the dynamic check code and a private key of the notarization transaction platform, and storing the encryption result to a blockchain to obtain a certification hash result;
and the third unit is used for providing the electronic public certificate, the dynamic check code and the verification hash result for a verifier by the notarization handling platform, decrypting by combining a public key of a notarization department, and verifying the authenticity of the electronic public certificate.
In an alternative embodiment of the present application,
the evidence hash result comprises a first evidence hash result and a second evidence hash result, and the second evidence hash result is obtained by encrypting the first evidence hash result;
the third unit is further configured to:
based on the second evidence-storing hash result, acquiring evidence-storing details from a blockchain to obtain a second encrypted ciphertext;
decrypting the second encrypted ciphertext through a first decryption algorithm by combining the dynamic check code and the second encrypted ciphertext to obtain a first hash value;
acquiring evidence storage details from a blockchain according to the first hash value to obtain a first encrypted ciphertext;
decrypting the first encrypted ciphertext through a second decryption algorithm by combining a public key obtained from a notarization department to obtain a notarization hash result of the electronic public certificate;
and carrying out hash calculation on the electronic public certificate provided by the verifier by using a national cryptographic algorithm, and checking the authenticity of the electronic public certificate according to the comparison between the obtained verification hash result and the notarization hash result.
In an alternative embodiment of the present application,
the second unit is further configured to:
calculating a first hash value corresponding to the electronic public certificate through a preset first encryption algorithm, determining a first encryption result through a preset second encryption algorithm according to the first hash value and combining a private key of the notarization handling platform, and storing the first encryption result to a blockchain to obtain a first evidence-storing hash result, wherein the first encryption algorithm encrypts based on a hash function, and the second encryption algorithm encrypts based on an elliptic curve;
the notarization handling platform generates a dynamic check code according to the application of a principal, encrypts the first hash value by using the dynamic check code as a secret key through a third encryption algorithm to obtain a second encryption result, and stores the second encryption result to a blockchain to obtain a second verification hash result, wherein the third encryption algorithm comprises symmetric encryption.
In a third aspect of the embodiments of the present disclosure,
there is provided an electronic device including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to invoke the instructions stored in the memory to perform the method described previously.
In a fourth aspect of embodiments of the present disclosure,
there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the method as described above.
The method of the present disclosure verifies the authenticity of the notarized document on the premise of ensuring that the notarized document is not exposed, and only the authorized verification party can verify the notarized document, thereby maximally ensuring the privacy of the party.
Drawings
FIG. 1 is a flow chart of a blockchain-based electronic public certificate verification method in accordance with embodiments of the present disclosure;
FIG. 2 is a logic diagram of a blockchain-based electronic public certificate encryption method in accordance with embodiments of the present disclosure;
FIG. 3 is a logic diagram of a blockchain-based electronic public certificate verification method in accordance with embodiments of the present disclosure;
fig. 4 is a schematic structural diagram of an electronic public certificate verification system based on a blockchain in an embodiment of the disclosure.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present disclosure more apparent, the technical solutions of the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present disclosure, and it is apparent that the described embodiments are only some embodiments of the present disclosure, not all embodiments. Based on the embodiments in this disclosure, all other embodiments that a person of ordinary skill in the art would obtain without making any inventive effort are within the scope of protection of this disclosure.
The terms "first," "second," "third," "fourth" and the like in the description and in the claims and in the above-described figures, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the disclosure described herein may be capable of operation in sequences other than those illustrated or described herein.
It should be understood that, in various embodiments of the present disclosure, the size of the sequence number of each process does not mean that the execution sequence of each process should be determined by its functions and internal logic, and should not constitute any limitation on the implementation process of the embodiments of the present disclosure.
It should be understood that in this disclosure, "comprising" and "having" and any variations thereof are intended to cover non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements that are expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that in this disclosure, "plurality" means two or more. "and/or" is merely an association relationship describing an association object, and means that three relationships may exist, for example, and/or B may mean: a exists alone, A and B exist together, and B exists alone. The character "/" generally indicates that the context-dependent object is an "or" relationship. "comprising A, B and C", "comprising A, B, C" means that all three of A, B, C comprise, "comprising A, B or C" means that one of the three comprises A, B, C, and "comprising A, B and/or C" means that any 1 or any 2 or 3 of the three comprises A, B, C.
It should be understood that in this disclosure, "B corresponding to A", "A and B
The correspondence "or" B corresponds to A "means that B is associated with A from which B can be determined. Determining B from a does not mean determining B from a alone, but may also determine B from a and/or other information. The matching of A and B is that the similarity of A and B is larger than or equal to a preset threshold value.
As used herein, "if" may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to detection" depending on the context.
The technical scheme of the present disclosure is described in detail below with specific examples. The following embodiments may be combined with each other, and some embodiments may not be repeated for the same or similar concepts or processes.
Fig. 1 is a flow chart of a blockchain-based electronic public certificate verification method according to an embodiment of the disclosure, as shown in fig. 1, the method includes:
s101, generating an electronic certificate and a dynamic check code by a notarization handling platform according to the application of a principal, wherein the electronic certificate comprises at least one of notarization number, applicant, notarization matters and notarization date;
s102, according to the electronic public certificate and the dynamic check code, and combining the notarization handling platform
Generates an encryption result through an encryption algorithm, and stores the encryption result to a blockchain to obtain a storage 5 A certificate hash result;
in an alternative embodiment of the present application,
generating an encryption result through an encryption algorithm according to the electronic public certificate, the dynamic check code and a private key of the notarization transaction platform, and storing the encryption result to a blockchain, wherein the obtaining of the certification hash result comprises the following steps:
calculating a first hash value corresponding to the electronic public certificate through a preset first encryption algorithm, determining a first encryption result through a preset second encryption algorithm according to the first hash value and combining a private key of the notarization handling platform, and storing the first encryption result to a blockchain to obtain a first evidence-storing hash result, wherein the first encryption algorithm encrypts based on a hash function, and the second encryption algorithm encrypts based on an elliptic curve;
the notarization handling platform generates a dynamic check code according to the application of a principal, encrypts the first hash value by using the dynamic check code as a secret key through a third encryption algorithm to obtain a second encryption result, and stores the second encryption result to a blockchain to obtain a second verification hash result, wherein the third encryption algorithm comprises symmetric encryption.
In an alternative embodiment of the present application,
the first encryption algorithm comprises a national encryption SM3 algorithm, the second encryption algorithm comprises a national encryption SM2 algorithm,
the third encryption algorithm includes a national encryption SM4 algorithm.
The SM1 algorithm is illustratively a block cipher algorithm, the block length is 128 bits, the key length is 128 bits, the security strength of the algorithm and the implementation performance of related software and hardware are equivalent to AES, the algorithm is not disclosed,
exist in the chip only in the form of an IP core;
the SM2 algorithm is an ECC elliptic curve cryptography mechanism, but is different from international standards such as ECDSA, ECDH and the like in terms of signature and key exchange, and adopts a safer mechanism. In addition, SM2 recommends a 256-bit curve as a standard curve;
the SM2 standard comprises four parts, namely a general rule, a digital signature algorithm, a key exchange protocol and a public key encryption algorithm;
the SM2 algorithm mainly considers elliptic curves on the prime fields Fp and F2m, introducing representations of these two types of fields respectively, 0 calculation, and representation of points of elliptic curves on a domain, calculation, and multiple point calculation algorithms. Data conversion in a programming language is then introduced, including integer and byte strings, byte strings and bit strings, field elements and integers, and rules for data conversion between point and byte strings. The method is characterized by specifically describing the generation and verification of the parameters of the elliptic curve on the finite field, wherein the parameters of the elliptic curve comprise the selection of the finite field, the parameters of elliptic curve equation, the selection of the base points of elliptic curve groups and the like, and providing the selection standard for the verification. And finally, generating a key pair on the elliptic curve and verifying a public key, wherein the key pair of the user is (s, sP), s is a private key of the user, sP is a public key of the user, s is difficult to obtain from sP due to the discrete logarithm problem, and a key pair generation detail and a verification mode are provided for a prime domain and a binary expansion domain.
The SM3 cryptographic hash (hash ) algorithm gives the calculation method and calculation steps of the hash function algorithm, and gives an operation example. The algorithm is suitable for digital signature and verification in commercial password application, generation and verification of the message authentication code and generation of random numbers, and can meet the security requirements of various password applications.
The algorithm generates a hash value with 256 bits by padding and iterative compression on a bit message with the input length less than 64 times of 2, wherein exclusive or, modulo addition, shift, and or, non-operation is used, and the hash value is formed by padding, iterative process, message expansion and compression function.
The SM4 algorithm is a grouping algorithm for wireless lan products. The algorithm has a packet length of 128 bits and a key length of 128 bits. The encryption algorithm and the key expansion algorithm both adopt a 32-round nonlinear iterative structure. The decryption algorithm is the same as the encryption algorithm except that the round keys are used in reverse order, and the decryption round keys are in reverse order of the encryption round keys.
The algorithm adopts a nonlinear iterative structure, each iteration is given by a round function, wherein the round function is formed by compounding a nonlinear transformation and a linear transformation, and the nonlinear transformation is given by an S box. Where rki is the round key and the synthetic permutation T constitutes the round function. The round key is generated by taking the encryption key as input, and the round key is generated by the round key, the linear transformation in the round function is different, and parameters are different.
S103, the notarization handling platform provides the electronic public certificate, the dynamic check code and the evidence-preserving hash result for a checking party, and the electronic public certificate is verified to be true or false by combining a public key of a notarization department to decrypt.
In an alternative embodiment of the present application,
the evidence hash result comprises a first evidence hash result and a second evidence hash result, and the second evidence hash result is obtained by encrypting the first evidence hash result;
the principal providing the electronic public certificate, the dynamic check code and the certification hash result to a verifier, decrypting in combination with a public key at a notarization place, and verifying the authenticity of the electronic public certificate comprising:
based on the second evidence-storing hash result, acquiring evidence-storing details from a blockchain to obtain a second encrypted ciphertext;
decrypting the second encrypted ciphertext through a first decryption algorithm by combining the dynamic check code and the second encrypted ciphertext to obtain a first hash value;
acquiring evidence storage details from a blockchain according to the first hash value to obtain a first encrypted ciphertext;
decrypting the first encrypted ciphertext through a second decryption algorithm in combination with the public key obtained from the notarization department to obtain the public key 5 A notarization hash result of the electronic public certificate;
and carrying out hash calculation on the electronic public certificate provided by the verifier by using a national cryptographic algorithm, and checking the authenticity of the electronic public certificate according to the comparison between the obtained verification hash result and the notarization hash result.
In an alternative embodiment of the present application,
the first decryption algorithm comprises a national encryption SM4 algorithm, and the second decryption algorithm comprises a national encryption SM2 algorithm. 0 FIG. 2 is a logic diagram of a blockchain-based electronic public certificate encryption method in accordance with embodiments of the present disclosure; FIG. 3
A logic schematic diagram of a block chain-based electronic public certificate verification method in an embodiment of the disclosure;
as shown in figures 2 and 3 of the drawings,
the notarization handling platform generates an electronic public certificate according to the application of the principal;
the platform calculates a file hash F for the electronic public certificate by using a national cryptographic algorithm SM 3: f=sm3 (public certificate file); 5 SM2 encrypting (F+ certificate key content) by using a private key at a notarization place to obtain an encryption result M1;
certificate key content example:
Desc={
notarization number: "(2022) Su-ripe certificate of hand (xxxx) number'
Applicants: "Zhang san",
0 notary items: "trademark transfer notarization",
notarization date: "2022-12-01"
}
D=F+Desc
M1=SM2(D,pri_key)
5 The encrypted result M1 is stored in a block chain to obtain a certificate storing Hash Hash1;
the platform generates a dynamic checking code A according to the needs of a principal, and encrypts the Hash1 by using the A as a secret key through a symmetric algorithm SM 4: m2=sm4 (Hash 1, a);
and storing the encrypted result M2 into a blockchain to obtain a certificate storing Hash Hash2.
The principal provides the electronic public certificate file, the dynamic check code A and the Hash2 to the checking party, and the checking party checks the authenticity of the public certificate through the electronic public certificate checking platform.
The platform acquires the certification details from the blockchain according to the Hash2 to obtain an encrypted ciphertext M2;
decrypting the ciphertext M2 by a symmetric algorithm SM4 with a dynamic verification code a provided by a verification party to obtain Hash1, wherein Hash 1=sm4_decryption (M2, a);
obtaining certification details from a blockchain according to the Hash1 to obtain a ciphertext M1;
decrypting M1 by using a public key at a notarization place through an SM2 algorithm to obtain a public certificate file hash F and public certificate key information: d=sm2 (M1, pub_key);
calculating a hash on an electronic public certificate held by a checking party by using a national cryptographic algorithm SM 3: f2 =sm3 (public certificate file provided by the verifier), F2 is obtained, F and F2 are compared, and authenticity of the electronic public certificate is confirmed.
Because the public certificate has certain privacy, on the premise of ensuring that the original document of the public certificate is not exposed, a convenient way for checking the authenticity of the public certificate is provided, and only authorized check parties can check the public certificate, so that the privacy of the parties is ensured to the greatest extent.
In a second aspect of the embodiments of the present disclosure,
provided is a blockchain-based electronic public certificate verification system, comprising:
the first unit is used for generating an electronic certificate and a dynamic check code by the notarization processing platform according to the application of a principal, wherein the electronic certificate comprises at least one of notarization number, applicant, notarization matters and notarization date;
the second unit is used for generating an encryption result through an encryption algorithm according to the electronic public certificate, the dynamic check code and a private key of the notarization transaction platform, and storing the encryption result to a blockchain to obtain a certification hash result;
and the third unit is used for providing the electronic public certificate, the dynamic checking code and the verification hash result for the verifier by the principal, decrypting by combining the public key at the notarization place, and verifying the authenticity of the electronic public certificate.
In an alternative embodiment of the present application,
the evidence hash result comprises a first evidence hash result and a second evidence hash result, and the second evidence hash result is obtained by encrypting the first evidence hash result;
the third unit is further configured to:
based on the second evidence-storing hash result, acquiring evidence-storing details from a blockchain to obtain a second encrypted ciphertext;
decrypting the second encrypted ciphertext through a first decryption algorithm by combining the dynamic check code and the second encrypted ciphertext to obtain a first hash value;
acquiring evidence storage details from a blockchain according to the first hash value to obtain a first encrypted ciphertext;
decrypting the first encrypted ciphertext through a second decryption algorithm by combining a public key obtained from a notarization department to obtain a notarization hash result of the electronic public certificate;
and carrying out hash calculation on the electronic public certificate provided by the verifier by using a national cryptographic algorithm, and checking the authenticity of the electronic public certificate according to the comparison between the obtained verification hash result and the notarization hash result.
In an alternative embodiment of the present application,
the second unit is further configured to:
calculating a first hash value corresponding to the electronic public certificate through a preset first encryption algorithm, determining a first encryption result through a preset second encryption algorithm according to the first hash value and combining a private key of the notarization handling platform, and storing the first encryption result to a blockchain to obtain a first evidence-storing hash result, wherein the first encryption algorithm encrypts based on a hash function, and the second encryption algorithm encrypts based on an elliptic curve;
the notarization handling platform generates a dynamic check code according to the application of a principal, encrypts the first hash value by using the dynamic check code as a secret key through a third encryption algorithm to obtain a second encryption result, and stores the second encryption result to a blockchain to obtain a second verification hash result, wherein the third encryption algorithm comprises symmetric encryption.
In a third aspect of the embodiments of the present disclosure,
there is provided an electronic device including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to invoke the instructions stored in the memory to perform the method described previously.
In a fourth aspect of embodiments of the present disclosure,
there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the method as described above.
The present application may be a method, apparatus, system, and/or computer program product. The computer program product may include a computer readable storage medium having computer readable program instructions embodied thereon for performing various aspects of the present application.
The computer readable storage medium may be a tangible device that can hold and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: portable computer disks, hard disks, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), static Random Access Memory (SRAM), portable compact disk read-only memory (CD-ROM), digital Versatile Disks (DVD), memory sticks, floppy disks, mechanical coding devices, punch cards or in-groove structures such as punch cards or grooves having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media, as used herein, are not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (e.g., optical pulses through fiber optic cables), or electrical signals transmitted through wires.
The computer readable program instructions described herein may be downloaded from a computer readable storage medium to a respective computing/processing device or to an external computer or external storage device over a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmissions, wireless transmissions, routers, firewalls, switches, gateway computers and/or edge servers. The network interface card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium in the respective computing/processing device.
Computer program instructions for carrying out operations of the present application may be assembly instructions, instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, c++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer readable program instructions may be executed entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, aspects of the present application are implemented by personalizing electronic circuitry, such as programmable logic circuitry, field Programmable Gate Arrays (FPGAs), or Programmable Logic Arrays (PLAs), with state information for computer readable program instructions, which can execute the computer readable program instructions.
Various aspects of the present application are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer readable program instructions may be provided to a processing unit of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processing unit of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable medium having the instructions stored therein includes an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Note that all features disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise. Thus, unless expressly stated otherwise, each feature disclosed is one example only of a generic set of equivalent or similar features. Where used, a further, preferred, still further and preferred is a simple starting point for carrying out the description of the other embodiment on the basis of the preceding embodiment, the further, preferred, still further or preferred combination of the contents of the rear band with the preceding embodiment being the complete construct of the other embodiment 5 And (3) forming the finished product. Several further, preferably, still further or still more preferably arranged after the same embodiment
Optionally combined, and the like.
It will be appreciated by persons skilled in the art that the embodiments of the application described above and shown in the drawings are by way of example only and are not limiting. The objects of the present application have been fully and effectively achieved. The function of the application
The structural principles have been shown and described in the examples and embodiments of the present application without departing from such principles 0 Any variations or modifications are possible.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present disclosure, and not for limiting the same; although the present disclosure has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: it can be modified or changed according to the technical scheme described in the previous embodiments
Equivalent replacement is carried out on part or all of the technical characteristics; without such modifications or substitutions being necessary for the corresponding technical party 5 The essence of the case is outside the scope of the technical solutions of the embodiments of the present disclosure.

Claims (10)

1. The electronic public certificate verification method based on the blockchain is characterized by comprising the following steps of:
the notarization handling platform generates an electronic certificate and a dynamic check code according to the application of a principal, wherein the electronic certificate comprises at least one of notarization number, applicant, notarization matters and notarization date;
generating an encryption result through an encryption algorithm according to the electronic public certificate and the dynamic check code and by combining a private key of the notarization transaction platform, and storing the encryption result to a blockchain to obtain a certification hash result;
and the notarization handling platform provides the electronic public certificate, the dynamic check code and the notarization hash result for a checking party, and the notarization handling platform is used for carrying out decryption by combining a public key of a notarization department to check the authenticity of the electronic public certificate.
2. The method of claim 1, wherein the forensic hash result comprises a first forensic hash result and a second forensic hash result, the second forensic hash result being obtained by encrypting the first forensic hash result;
the principal providing the electronic public certificate, the dynamic check code and the certification hash result to a verifier, decrypting in combination with a public key at a notarization place, and verifying the authenticity of the electronic public certificate comprising:
based on the second evidence-storing hash result, acquiring evidence-storing details from a blockchain to obtain a second encrypted ciphertext;
decrypting the second encrypted ciphertext through a first decryption algorithm by combining the dynamic check code and the second encrypted ciphertext to obtain a first hash value;
acquiring evidence storage details from a blockchain according to the first hash value to obtain a first encrypted ciphertext;
decrypting the first encrypted ciphertext through a second decryption algorithm by combining a public key obtained from a notarization department to obtain a notarization hash result of the electronic public certificate;
and carrying out hash calculation on the electronic public certificate provided by the verifier by using a national cryptographic algorithm, and checking the authenticity of the electronic public certificate according to the comparison between the obtained verification hash result and the notarization hash result.
3. The method of claim 2, wherein the first decryption algorithm comprises a national encryption SM4 algorithm and the second decryption algorithm comprises a national encryption SM2 algorithm.
4. The method of claim 1, wherein generating an encryption result by an encryption algorithm based on the electronic public certificate and the dynamic verification code and in combination with a private key of the notarization transaction platform, and saving the encryption result to a blockchain, the obtaining a certified hash result comprises:
calculating a first hash value corresponding to the electronic public certificate through a preset first encryption algorithm, determining a first encryption result through a preset second encryption algorithm according to the first hash value and combining a private key of the notarization handling platform, and storing the first encryption result to a blockchain to obtain a first evidence-storing hash result, wherein the first encryption algorithm encrypts based on a hash function, and the second encryption algorithm encrypts based on an elliptic curve;
the notarization handling platform generates a dynamic check code according to the application of a principal, encrypts the first hash value by a third encryption algorithm by taking the dynamic check code as a secret key to obtain a second encryption result, and 5 and storing the second encryption result to a blockchain to obtain a second evidence-storing hash result, wherein the third encryption algorithm comprises symmetric encryption.
5. The method of claim 1, wherein the first encryption algorithm comprises a national encryption SM3 algorithm, the second encryption algorithm comprises a national encryption SM2 algorithm, and the third encryption algorithm comprises a national encryption SM4 algorithm.
6. A blockchain-based electronic certificate verification system, comprising:
the first unit is used for generating an electronic certificate and a dynamic check code by the notarization processing platform according to the application of a principal, wherein the electronic certificate comprises at least one of notarization number, applicant, notarization matters and notarization date;
a second unit for combining the notarization based on the electronic certificate and the dynamic check code 5 The private key of the handling platform generates an encryption result through an encryption algorithm, and stores the encryption result to a blockchain to obtain a certification hash result;
and the third unit is used for providing the electronic public certificate, the dynamic check code and the verification hash result for a verifier by the notarization handling platform, decrypting by combining a public key of a notarization department, and verifying the authenticity of the electronic public certificate.
7. The system of claim 6, wherein the forensic hash result comprises a first forensic hash result and a second forensic hash result, the second forensic hash result being obtained by encrypting the first forensic hash result;
the third unit is further configured to:
based on the second evidence-storing hash result, acquiring evidence-storing details from a blockchain to obtain a second encrypted ciphertext; 5 decrypting the second encrypted ciphertext through a first decryption algorithm by combining the dynamic check code and the second encrypted ciphertext to obtain a first hash value;
acquiring evidence storage details from a blockchain according to the first hash value to obtain a first encrypted ciphertext;
decrypting the first encrypted ciphertext through a second decryption algorithm by combining a public key obtained from a notarization department to obtain a notarization hash result of the electronic public certificate;
0 and carrying out hash calculation on the electronic public certificate provided by the verifier by using a national cryptographic algorithm, and checking the authenticity of the electronic public certificate according to the comparison between the obtained verification hash result and the notarization hash result.
8. The system of claim 6, wherein the second unit is further configured to:
calculating a first hash value corresponding to the electronic public certificate through a preset first encryption algorithm, determining a first encryption result through a preset second encryption algorithm according to the first hash value and combining a private key of the notarization handling platform, and storing the first encryption result to a blockchain to obtain a first evidence-storing hash result, wherein the first encryption algorithm encrypts based on a hash function, and the second encryption algorithm encrypts based on an elliptic curve;
the notarization handling platform generates a dynamic check code according to the application of a principal, encrypts the first hash value by using the dynamic check code as a secret key through a third encryption algorithm to obtain a second encryption result, and stores the second encryption result to a blockchain to obtain a second verification hash result, wherein the third encryption algorithm comprises symmetric encryption.
9. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to invoke the instructions stored in the memory to perform the method of any of claims 1 to 5.
10. A computer readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the method of any of claims 1 to 5.
CN202211739461.1A 2022-12-31 2022-12-31 Electronic public certificate verification method and system based on block chain Pending CN116915407A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211739461.1A CN116915407A (en) 2022-12-31 2022-12-31 Electronic public certificate verification method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211739461.1A CN116915407A (en) 2022-12-31 2022-12-31 Electronic public certificate verification method and system based on block chain

Publications (1)

Publication Number Publication Date
CN116915407A true CN116915407A (en) 2023-10-20

Family

ID=88349879

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211739461.1A Pending CN116915407A (en) 2022-12-31 2022-12-31 Electronic public certificate verification method and system based on block chain

Country Status (1)

Country Link
CN (1) CN116915407A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118054899A (en) * 2024-02-02 2024-05-17 北京电子科技学院 Post-quantum one-time digital signature generation method and device using national secret algorithm SM3
CN119945680A (en) * 2024-11-29 2025-05-06 苏州联证智能科技有限公司 Multi-authentication electronic notarial certificate verification method and system based on blockchain

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118054899A (en) * 2024-02-02 2024-05-17 北京电子科技学院 Post-quantum one-time digital signature generation method and device using national secret algorithm SM3
CN118054899B (en) * 2024-02-02 2025-11-07 北京电子科技学院 Post quantum one-time digital signature generation method and device using cryptographic algorithm SM3
CN119945680A (en) * 2024-11-29 2025-05-06 苏州联证智能科技有限公司 Multi-authentication electronic notarial certificate verification method and system based on blockchain

Similar Documents

Publication Publication Date Title
Perlner et al. Quantum resistant public key cryptography: a survey
Liu et al. An efficient privacy-preserving outsourced calculation toolkit with multiple keys
CN111162906B (en) Collaborative secret sharing method, device, system and medium based on vast transmission algorithm
CN107395368B (en) Digital signature method, decapsulation method and decryption method in media-free environment
CN110851845B (en) Full homomorphic data encapsulation method for lightweight single-user multi-data
Iyer et al. A novel idea on multimedia encryption using hybrid crypto approach
CN103795533A (en) Id-based encryption and decryption method, and apparatus for executing same
CN112804205A (en) Data encryption method and device and data decryption method and device
WO2014007347A1 (en) Shared secret key generation device, encryption device, decryption device, shared secret key generation method, encryption method, decryption method, and program
CN114095181B (en) Threshold ring signature method and system based on cryptographic algorithm
US20100169658A1 (en) Elliptic curve-based message authentication code
KR20200055672A (en) Encryption systems and method using permutaion group based cryptographic techniques
US20060083370A1 (en) RSA with personalized secret
CN114448641A (en) A privacy encryption method, electronic device, storage medium and chip
US20120237030A1 (en) Elliptic curve-based message authentication code system and method
Hodowu et al. An enhancement of data security in cloud computing with an implementation of a two-level cryptographic technique, using AES and ECC algorithm
CN106549963A (en) Safe storage system based on HDFS
Khatarkar et al. A survey and performance analysis of various RSA based encryption techniques
Savu Signcryption scheme based on schnorr digital signature
CN103493428A (en) Data encryption
CN116915407A (en) Electronic public certificate verification method and system based on block chain
CN114362912A (en) Identification password generation method based on distributed key center, electronic device and medium
Olumide et al. A hybrid encryption model for secure cloud computing
CN116346336B (en) Key distribution method based on multi-layer key generation center and related system
CN106453253B (en) An Efficient Identity-Based Signcryption Method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination