CN110929275B - Block chain data security method based on multiple signatures - Google Patents
Block chain data security method based on multiple signatures Download PDFInfo
- Publication number
- CN110929275B CN110929275B CN201911109465.XA CN201911109465A CN110929275B CN 110929275 B CN110929275 B CN 110929275B CN 201911109465 A CN201911109465 A CN 201911109465A CN 110929275 B CN110929275 B CN 110929275B
- Authority
- CN
- China
- Prior art keywords
- block chain
- chain data
- manually
- user
- data storage
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a block chain data security method based on multiple signatures, which comprises the following steps of firstly, registering a user; step two, multiple signature authentication; step three, storing block chain data; step four, decrypting the multiple signatures; step five, the files are summarized and stored; step six, comparing later data; manually selecting a block chain data system, searching a block chain data storage system suitable for the block chain data storage system by multiple comparison, and connecting and storing the block chain data storage system in a computer; the block chain data security method based on multiple signatures adopts automatic computer planning, uses an RSA algorithm to arrange and sum up user block chain data, is beneficial to multiple signatures for security authentication, solves the problems that the traditional user block chain data storage security is low, the multiple signature authentication cannot be carried out, the security is safer, the user block chain data storage security is greatly improved, the block chain data storage is more convenient and faster, and the use by users is facilitated.
Description
Technical Field
The invention relates to the field of block chain data, in particular to a block chain data security method based on multiple signatures.
Background
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, is an important concept of the bitcoin, is essentially a decentralized database, is used as a bottom layer technology of the bitcoin, is a series of data blocks which are produced by correlation through a cryptography method, and each data block contains information of a batch of bitcoin network transactions and is used for verifying the validity of the information and generating the next block; the block chain data storage security generally adopts a secret key encryption mode, the traditional secret key encryption mode adopts manual password setting, single password decryption is extremely unsafe, the block chain data storage security is low, and meanwhile, the block chain data storage is troublesome, the password input decryption needs to be carried out for multiple times, and the use by a user is not facilitated; in view of these drawbacks, it is necessary to design a block chain data security method based on multiple signatures.
Disclosure of Invention
The present invention is directed to a block chain data security method based on multiple signatures, so as to solve the problems mentioned in the background art.
In order to solve the technical problems, the invention provides the following technical scheme: a block chain data security method based on multiple signatures comprises the steps of firstly, registering a user; step two, multiple signature authentication; step three, storing block chain data; step four, decrypting the multiple signatures; step five, the files are summarized and stored; step six, comparing later data;
in the first step, the user registration comprises the following steps:
1) Manually selecting a block chain data system, searching a block chain data storage system suitable for the block chain data storage system by multiple comparison, and connecting and storing the block chain data storage system in a computer;
2) Manually inputting own information in a block chain data system, registering to obtain a public key registration address and an address for registering a private key;
in the second step, the multiple signature authentication includes the following steps:
1) Performing a public key algorithm on the block chain data, determining a public key password by a trapdoor single-item function, determining the block chain data as M by using an RSA algorithm, and encrypting the block chain data by E kc (M) = C, obtaining encrypted public key E of multiple signatures kc ;
2) Then, by RSA algorithm, encrypting by D kd (C) = M, encrypted private key D resulting in multiple signatures kd ;
3) General public key E kc With a private key D kd Manually recording and storing in a file folder;
in the third step, the block chain data storage includes the following steps:
1) Manually storing the own block chain data in a block chain data storage system, and selecting and storing after confirming that no error exists;
2) Typing in public key E kc Public key E kc After successful verification, the public key E kc For counting user block chainsConverting the block chain data into a ciphertext on the network;
3) At the moment, the storage is finished, and the data of the block chain can be continuously written and stored manually;
in the fourth step, the multiple signature decryption includes the following steps:
1) Manually finding the block chain data stored in the block chain data storage system by the user, and selecting the block chain data for extraction after the user confirms that the data is correct;
2) Keying in private key D kd Private key D kd After the verification is successful, the block chain data storage system considers the block chain data to be owned by the signer, the signature is valid, and the private key D kd The system is used for converting the block chain data of the user from the plaintext into the plaintext which can be seen by the user, and converting the block chain data of the system into the plaintext on the network;
3) After the conversion is completed, the rewriting and transaction can be carried out manually;
in the fifth step, the operation steps are manually recorded and stored in a file room and a computer for comparison again;
in the sixth step, the step of each operation is manually recorded, and the previously recorded step data is compared.
According to the technical scheme, in the step one 2), the public key registration address and the address connection of the registration private key are both stored in the computer.
According to the above technical solution, in the third step 1), the blockchain data stored in the blockchain data storage system is manually backed up for user comparison.
According to the technical scheme, in the step four 2), the manually extracted block chain data is compared with the source data to observe whether the block chain data is different.
According to the technical scheme, in the fifth step, one copy is manually copied and compared.
According to the technical scheme, in the sixth step, the observation and recording operation is performed once every other month.
Compared with the prior art, the invention has the following beneficial effects: the block chain data security method based on multiple signatures adopts automatic computer planning, uses an RSA algorithm to arrange and sum up user block chain data, is beneficial to multiple signatures for security authentication, solves the problems that the traditional user block chain data storage security is low, the multiple signature authentication cannot be carried out, the security is safer, the user block chain data storage security is greatly improved, the block chain data storage is more convenient and faster, and the use by users is facilitated.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a process flow diagram of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
Referring to fig. 1, the present invention provides a technical solution:
a block chain data security method based on multiple signatures comprises the steps of firstly, registering a user; step two, multiple signature authentication; step three, storing block chain data; step four, decrypting the multiple signatures; step five, the files are summarized and stored; step six, comparing the later data;
in the first step, the user registration comprises the following steps:
1) Manually selecting a block chain data system, searching a block chain data storage system suitable for the block chain data storage system by multiple comparison, and connecting and storing the block chain data storage system in a computer;
2) Manually inputting own information in a block chain data system, registering to obtain a public key registration address and an address for registering a private key, wherein the public key registration address and the address connection of the registered private key are stored in a computer;
in the second step, the multiple signature authentication includes the following steps:
1) Performing a public key algorithm on the block chain data, determining a public key password by a trapdoor single-item function, determining the block chain data as M by using an RSA algorithm, and encrypting the block chain data by E kc (M) = C, obtaining encrypted public key E of multiple signatures kc ;
2) Then, by RSA algorithm, encrypting by D kd (C) = M, encrypted private key D resulting in multiple signatures kd ;
3) General public key E kc With a private key D kd Manually recording and storing in a file folder;
in the third step, the block chain data storage includes the following steps:
1) Manually storing own block chain data in a block chain data storage system, selecting and storing after confirming that no error exists, and manually backing up the block chain data stored in the block chain data storage system for user comparison;
2) Typing in public key E kc Public key E kc After successful verification, the public key E kc The system is used for converting the user block chain data into a ciphertext and converting the block chain data of the user into the ciphertext on the network;
3) At the moment, the storage is finished, and the data of the block chain can be continuously written and stored manually;
in the fourth step, the multiple signature decryption includes the following steps:
1) Manually finding the block chain data stored in the block chain data storage system, and selecting the block chain data for extraction after the data is confirmed to be correct;
2) Keying in private key D kd Private key D kd After the verification is successful, the block chain data storage system considers the block chain data to be owned by the signer, the signature is valid, and the private key D kd The method is used for converting user blockchain data into plain text which is visible to a user from the plain text, and converting the own blockchain data into the plain textConverting the data into a plaintext on the network, comparing the block chain data extracted manually with the source data, and observing whether the block chain data is different;
3) After the conversion is completed, the rewriting and transaction can be carried out manually;
in the fifth step, the operation steps are manually recorded and stored in an archive room and a computer respectively for comparison again, and meanwhile, one copy is manually copied for comparison;
in the sixth step, the operation is observed and recorded once every month, the manual recording is carried out in each operation step, and meanwhile, the previously recorded step data are compared.
Based on the above, the method has the advantages that the method adopts the automatic computer programming, uses the RSA algorithm to arrange and summarize the user block chain data, is beneficial to multiple signatures for carrying out security authentication, solves the problems that the traditional user block chain data has low storage security, cannot carry out multiple signature authentication security, is safer to keep secret, greatly improves the user block chain data storage security, and is more convenient and faster to store the block chain data.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (6)
1. A block chain data security method based on multiple signatures comprises the steps of firstly, registering a user; step two, multiple signature authentication; step three, storing block chain data; step four, decrypting the multiple signatures; step five, the files are summarized and stored; step six, comparing later data; the method is characterized in that:
in the first step, the user registration comprises the following steps:
1) Manually selecting a block chain data system, searching a block chain data storage system suitable for the block chain data storage system by multiple comparison, and connecting and storing the block chain data storage system in a computer;
2) Manually inputting own information in a block chain data system, registering to obtain a public key registration address and an address for registering a private key;
in the second step, the multiple signature authentication includes the following steps:
1) Performing a key algorithm on the block chain data, determining a public key password by a trapdoor monomial function, using an RSA algorithm to determine the block chain data as M, and encrypting the block chain data byObtaining an encrypted public key for multiple signatures
2) Then, the RSA algorithm encrypts the data D kd (C) = M, encrypted private key D yielding multiple signatures kd ;
in the third step, the block chain data storage includes the following steps:
1) Manually storing the own block chain data in a block chain data storage system, and selecting and storing after confirming that no error exists;
2) Keying in public keyPublic keyAfter successful verification, the public keyThe system is used for converting the user block chain data into a ciphertext and converting the block chain data of the user into the ciphertext on the network;
3) At the moment, the storage is finished, and the data of the block chain can be continuously written and stored manually;
in the fourth step, the multiple signature decryption includes the following steps:
1) Manually finding the block chain data stored in the block chain data storage system by the user, and selecting the block chain data for extraction after the user confirms that the data is correct;
2) Keying in private key D kd Private key D kd After the verification is successful, the block chain data storage system considers the block chain data to be owned by the signer, the signature is valid, and the private key D kd The system is used for converting the block chain data of the user from the plaintext into the plaintext which can be seen by the user, and converting the block chain data of the system into the plaintext on the network;
3) After the conversion is completed, the rewriting and transaction can be carried out manually;
in the fifth step, the operation steps are manually recorded and stored in a file room and a computer for comparison again;
in the sixth step, the step of each operation is manually recorded, and the previously recorded step data is compared.
2. The multi-signature-based block chain data security method of claim 1, wherein: in the step one 2), the public key registration address and the address connection of the registration private key are both stored in the computer.
3. The multi-signature-based block chain data security method of claim 1, wherein: in the step three 1), the blockchain data stored in the blockchain data storage system is manually backed up for user comparison.
4. The multi-signature-based block chain data security method of claim 1, wherein: in the step four 2), comparing the manually extracted block chain data with the source data, and observing whether the block chain data is different.
5. The multi-signature-based block chain data security method of claim 1, wherein: and in the fifth step, manually copying one copy for comparison.
6. The method of claim 1, wherein: in the sixth step, the observation and recording operation is performed once every other month.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911109465.XA CN110929275B (en) | 2019-11-14 | 2019-11-14 | Block chain data security method based on multiple signatures |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911109465.XA CN110929275B (en) | 2019-11-14 | 2019-11-14 | Block chain data security method based on multiple signatures |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110929275A CN110929275A (en) | 2020-03-27 |
CN110929275B true CN110929275B (en) | 2023-03-24 |
Family
ID=69852973
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911109465.XA Active CN110929275B (en) | 2019-11-14 | 2019-11-14 | Block chain data security method based on multiple signatures |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110929275B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111523889B (en) * | 2020-04-17 | 2023-09-01 | 昆明大棒客科技有限公司 | Multiple signature implementation method, device, equipment and storage medium |
CN111817858A (en) * | 2020-07-27 | 2020-10-23 | 北京金仓幸福科技有限公司 | Block chain data security method based on multiple signatures |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
WO2018145127A1 (en) * | 2017-02-06 | 2018-08-09 | ShoCard, Inc. | Electronic identification verification methods and systems with storage of certification records to a side chain |
CN108810895A (en) * | 2018-07-12 | 2018-11-13 | 西安电子科技大学 | Wireless Mesh netword identity identifying method based on block chain |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
PL3073670T4 (en) * | 2015-03-27 | 2021-08-23 | Black Gold Coin, Inc. | A system and a method for personal identification and verification |
-
2019
- 2019-11-14 CN CN201911109465.XA patent/CN110929275B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018145127A1 (en) * | 2017-02-06 | 2018-08-09 | ShoCard, Inc. | Electronic identification verification methods and systems with storage of certification records to a side chain |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN108810895A (en) * | 2018-07-12 | 2018-11-13 | 西安电子科技大学 | Wireless Mesh netword identity identifying method based on block chain |
Non-Patent Citations (1)
Title |
---|
基于国密算法和区块链的移动端安全eID及认证协议设计;胡卫等;《信息网络安全》;20180710(第07期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN110929275A (en) | 2020-03-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI706275B (en) | System and method for information protection | |
US11874943B2 (en) | Managing group authority and access to a secured file system in a decentralized environment | |
US6035398A (en) | Cryptographic key generation using biometric data | |
JP4581200B2 (en) | Personal authentication system, personal authentication method, information processing apparatus, and program providing medium | |
JP4655345B2 (en) | Information processing apparatus, information processing method, and program providing medium | |
CN101567780B (en) | Key management and recovery method for encrypted digital certificate | |
CN102255729B (en) | IBE (Internet Booking Engine) data encryption system based on medium digital certificate | |
CN109687963A (en) | Anti- quantum calculation alliance chain method of commerce and system based on public key pond | |
CN110419053A (en) | Systems and methods for information protection | |
CN109146479B (en) | Data encryption method based on block chain | |
US8806206B2 (en) | Cooperation method and system of hardware secure units, and application device | |
JP2005532742A5 (en) | Method and system for preventing unauthorized delivery and use of electronic keys with key seeds | |
EP3543891B1 (en) | A computer implemented method and a system for tracking of certified documents lifecycle and computer programs thereof | |
CN110929275B (en) | Block chain data security method based on multiple signatures | |
US20250094969A1 (en) | Enabling confidential and non-confidential transactions on a digital token architecture | |
CN111047305A (en) | A kind of private key storage and mnemonic method of encrypted digital currency wallet based on digital watermark technology | |
CN115203728A (en) | Financial data safety storage system and method based on alliance block chain and big data | |
CN109146684B (en) | Decentralized transaction verification method | |
CN119363343A (en) | A medical service management system based on national secret key splitting algorithm | |
EP4379631A1 (en) | Digital wallet device and dual offline transaction method thereof | |
CN112950356B (en) | Personal loan processing method, system, equipment and medium based on digital identity | |
CN111130763B (en) | A Key Backup and Recovery Method Based on Integrated Encryption Technology | |
Ibor et al. | A conceptual framework for augmenting the security of digitized academic records in Nigerian tertiary institutions using blockchain technology | |
Zohar et al. | Financial cryptography and data security: FC 2018 international workshops, bitcoin, voting, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, revised selected papers | |
US20250148061A1 (en) | Systems and methods for providing a trackable digital asset and its use thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |