[go: up one dir, main page]

CN110929275B - Block chain data security method based on multiple signatures - Google Patents

Block chain data security method based on multiple signatures Download PDF

Info

Publication number
CN110929275B
CN110929275B CN201911109465.XA CN201911109465A CN110929275B CN 110929275 B CN110929275 B CN 110929275B CN 201911109465 A CN201911109465 A CN 201911109465A CN 110929275 B CN110929275 B CN 110929275B
Authority
CN
China
Prior art keywords
block chain
chain data
manually
user
data storage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911109465.XA
Other languages
Chinese (zh)
Other versions
CN110929275A (en
Inventor
时超
汪昕
陈力
赵博
金伟达
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Golden Bridge Info Tech Co ltd
Original Assignee
Shanghai Golden Bridge Info Tech Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Golden Bridge Info Tech Co ltd filed Critical Shanghai Golden Bridge Info Tech Co ltd
Priority to CN201911109465.XA priority Critical patent/CN110929275B/en
Publication of CN110929275A publication Critical patent/CN110929275A/en
Application granted granted Critical
Publication of CN110929275B publication Critical patent/CN110929275B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a block chain data security method based on multiple signatures, which comprises the following steps of firstly, registering a user; step two, multiple signature authentication; step three, storing block chain data; step four, decrypting the multiple signatures; step five, the files are summarized and stored; step six, comparing later data; manually selecting a block chain data system, searching a block chain data storage system suitable for the block chain data storage system by multiple comparison, and connecting and storing the block chain data storage system in a computer; the block chain data security method based on multiple signatures adopts automatic computer planning, uses an RSA algorithm to arrange and sum up user block chain data, is beneficial to multiple signatures for security authentication, solves the problems that the traditional user block chain data storage security is low, the multiple signature authentication cannot be carried out, the security is safer, the user block chain data storage security is greatly improved, the block chain data storage is more convenient and faster, and the use by users is facilitated.

Description

Block chain data security method based on multiple signatures
Technical Field
The invention relates to the field of block chain data, in particular to a block chain data security method based on multiple signatures.
Background
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, is an important concept of the bitcoin, is essentially a decentralized database, is used as a bottom layer technology of the bitcoin, is a series of data blocks which are produced by correlation through a cryptography method, and each data block contains information of a batch of bitcoin network transactions and is used for verifying the validity of the information and generating the next block; the block chain data storage security generally adopts a secret key encryption mode, the traditional secret key encryption mode adopts manual password setting, single password decryption is extremely unsafe, the block chain data storage security is low, and meanwhile, the block chain data storage is troublesome, the password input decryption needs to be carried out for multiple times, and the use by a user is not facilitated; in view of these drawbacks, it is necessary to design a block chain data security method based on multiple signatures.
Disclosure of Invention
The present invention is directed to a block chain data security method based on multiple signatures, so as to solve the problems mentioned in the background art.
In order to solve the technical problems, the invention provides the following technical scheme: a block chain data security method based on multiple signatures comprises the steps of firstly, registering a user; step two, multiple signature authentication; step three, storing block chain data; step four, decrypting the multiple signatures; step five, the files are summarized and stored; step six, comparing later data;
in the first step, the user registration comprises the following steps:
1) Manually selecting a block chain data system, searching a block chain data storage system suitable for the block chain data storage system by multiple comparison, and connecting and storing the block chain data storage system in a computer;
2) Manually inputting own information in a block chain data system, registering to obtain a public key registration address and an address for registering a private key;
in the second step, the multiple signature authentication includes the following steps:
1) Performing a public key algorithm on the block chain data, determining a public key password by a trapdoor single-item function, determining the block chain data as M by using an RSA algorithm, and encrypting the block chain data by E kc (M) = C, obtaining encrypted public key E of multiple signatures kc
2) Then, by RSA algorithm, encrypting by D kd (C) = M, encrypted private key D resulting in multiple signatures kd
3) General public key E kc With a private key D kd Manually recording and storing in a file folder;
in the third step, the block chain data storage includes the following steps:
1) Manually storing the own block chain data in a block chain data storage system, and selecting and storing after confirming that no error exists;
2) Typing in public key E kc Public key E kc After successful verification, the public key E kc For counting user block chainsConverting the block chain data into a ciphertext on the network;
3) At the moment, the storage is finished, and the data of the block chain can be continuously written and stored manually;
in the fourth step, the multiple signature decryption includes the following steps:
1) Manually finding the block chain data stored in the block chain data storage system by the user, and selecting the block chain data for extraction after the user confirms that the data is correct;
2) Keying in private key D kd Private key D kd After the verification is successful, the block chain data storage system considers the block chain data to be owned by the signer, the signature is valid, and the private key D kd The system is used for converting the block chain data of the user from the plaintext into the plaintext which can be seen by the user, and converting the block chain data of the system into the plaintext on the network;
3) After the conversion is completed, the rewriting and transaction can be carried out manually;
in the fifth step, the operation steps are manually recorded and stored in a file room and a computer for comparison again;
in the sixth step, the step of each operation is manually recorded, and the previously recorded step data is compared.
According to the technical scheme, in the step one 2), the public key registration address and the address connection of the registration private key are both stored in the computer.
According to the above technical solution, in the third step 1), the blockchain data stored in the blockchain data storage system is manually backed up for user comparison.
According to the technical scheme, in the step four 2), the manually extracted block chain data is compared with the source data to observe whether the block chain data is different.
According to the technical scheme, in the fifth step, one copy is manually copied and compared.
According to the technical scheme, in the sixth step, the observation and recording operation is performed once every other month.
Compared with the prior art, the invention has the following beneficial effects: the block chain data security method based on multiple signatures adopts automatic computer planning, uses an RSA algorithm to arrange and sum up user block chain data, is beneficial to multiple signatures for security authentication, solves the problems that the traditional user block chain data storage security is low, the multiple signature authentication cannot be carried out, the security is safer, the user block chain data storage security is greatly improved, the block chain data storage is more convenient and faster, and the use by users is facilitated.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a process flow diagram of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
Referring to fig. 1, the present invention provides a technical solution:
a block chain data security method based on multiple signatures comprises the steps of firstly, registering a user; step two, multiple signature authentication; step three, storing block chain data; step four, decrypting the multiple signatures; step five, the files are summarized and stored; step six, comparing the later data;
in the first step, the user registration comprises the following steps:
1) Manually selecting a block chain data system, searching a block chain data storage system suitable for the block chain data storage system by multiple comparison, and connecting and storing the block chain data storage system in a computer;
2) Manually inputting own information in a block chain data system, registering to obtain a public key registration address and an address for registering a private key, wherein the public key registration address and the address connection of the registered private key are stored in a computer;
in the second step, the multiple signature authentication includes the following steps:
1) Performing a public key algorithm on the block chain data, determining a public key password by a trapdoor single-item function, determining the block chain data as M by using an RSA algorithm, and encrypting the block chain data by E kc (M) = C, obtaining encrypted public key E of multiple signatures kc
2) Then, by RSA algorithm, encrypting by D kd (C) = M, encrypted private key D resulting in multiple signatures kd
3) General public key E kc With a private key D kd Manually recording and storing in a file folder;
in the third step, the block chain data storage includes the following steps:
1) Manually storing own block chain data in a block chain data storage system, selecting and storing after confirming that no error exists, and manually backing up the block chain data stored in the block chain data storage system for user comparison;
2) Typing in public key E kc Public key E kc After successful verification, the public key E kc The system is used for converting the user block chain data into a ciphertext and converting the block chain data of the user into the ciphertext on the network;
3) At the moment, the storage is finished, and the data of the block chain can be continuously written and stored manually;
in the fourth step, the multiple signature decryption includes the following steps:
1) Manually finding the block chain data stored in the block chain data storage system, and selecting the block chain data for extraction after the data is confirmed to be correct;
2) Keying in private key D kd Private key D kd After the verification is successful, the block chain data storage system considers the block chain data to be owned by the signer, the signature is valid, and the private key D kd The method is used for converting user blockchain data into plain text which is visible to a user from the plain text, and converting the own blockchain data into the plain textConverting the data into a plaintext on the network, comparing the block chain data extracted manually with the source data, and observing whether the block chain data is different;
3) After the conversion is completed, the rewriting and transaction can be carried out manually;
in the fifth step, the operation steps are manually recorded and stored in an archive room and a computer respectively for comparison again, and meanwhile, one copy is manually copied for comparison;
in the sixth step, the operation is observed and recorded once every month, the manual recording is carried out in each operation step, and meanwhile, the previously recorded step data are compared.
Based on the above, the method has the advantages that the method adopts the automatic computer programming, uses the RSA algorithm to arrange and summarize the user block chain data, is beneficial to multiple signatures for carrying out security authentication, solves the problems that the traditional user block chain data has low storage security, cannot carry out multiple signature authentication security, is safer to keep secret, greatly improves the user block chain data storage security, and is more convenient and faster to store the block chain data.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (6)

1. A block chain data security method based on multiple signatures comprises the steps of firstly, registering a user; step two, multiple signature authentication; step three, storing block chain data; step four, decrypting the multiple signatures; step five, the files are summarized and stored; step six, comparing later data; the method is characterized in that:
in the first step, the user registration comprises the following steps:
1) Manually selecting a block chain data system, searching a block chain data storage system suitable for the block chain data storage system by multiple comparison, and connecting and storing the block chain data storage system in a computer;
2) Manually inputting own information in a block chain data system, registering to obtain a public key registration address and an address for registering a private key;
in the second step, the multiple signature authentication includes the following steps:
1) Performing a key algorithm on the block chain data, determining a public key password by a trapdoor monomial function, using an RSA algorithm to determine the block chain data as M, and encrypting the block chain data by
Figure FSA0000194808970000011
Obtaining an encrypted public key for multiple signatures
Figure FSA0000194808970000012
2) Then, the RSA algorithm encrypts the data D kd (C) = M, encrypted private key D yielding multiple signatures kd
3) Will public key
Figure FSA0000194808970000013
With a private key D kd Manually recording and storing in a file folder;
in the third step, the block chain data storage includes the following steps:
1) Manually storing the own block chain data in a block chain data storage system, and selecting and storing after confirming that no error exists;
2) Keying in public key
Figure FSA0000194808970000014
Public key
Figure FSA0000194808970000015
After successful verification, the public key
Figure FSA0000194808970000016
The system is used for converting the user block chain data into a ciphertext and converting the block chain data of the user into the ciphertext on the network;
3) At the moment, the storage is finished, and the data of the block chain can be continuously written and stored manually;
in the fourth step, the multiple signature decryption includes the following steps:
1) Manually finding the block chain data stored in the block chain data storage system by the user, and selecting the block chain data for extraction after the user confirms that the data is correct;
2) Keying in private key D kd Private key D kd After the verification is successful, the block chain data storage system considers the block chain data to be owned by the signer, the signature is valid, and the private key D kd The system is used for converting the block chain data of the user from the plaintext into the plaintext which can be seen by the user, and converting the block chain data of the system into the plaintext on the network;
3) After the conversion is completed, the rewriting and transaction can be carried out manually;
in the fifth step, the operation steps are manually recorded and stored in a file room and a computer for comparison again;
in the sixth step, the step of each operation is manually recorded, and the previously recorded step data is compared.
2. The multi-signature-based block chain data security method of claim 1, wherein: in the step one 2), the public key registration address and the address connection of the registration private key are both stored in the computer.
3. The multi-signature-based block chain data security method of claim 1, wherein: in the step three 1), the blockchain data stored in the blockchain data storage system is manually backed up for user comparison.
4. The multi-signature-based block chain data security method of claim 1, wherein: in the step four 2), comparing the manually extracted block chain data with the source data, and observing whether the block chain data is different.
5. The multi-signature-based block chain data security method of claim 1, wherein: and in the fifth step, manually copying one copy for comparison.
6. The method of claim 1, wherein: in the sixth step, the observation and recording operation is performed once every other month.
CN201911109465.XA 2019-11-14 2019-11-14 Block chain data security method based on multiple signatures Active CN110929275B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911109465.XA CN110929275B (en) 2019-11-14 2019-11-14 Block chain data security method based on multiple signatures

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911109465.XA CN110929275B (en) 2019-11-14 2019-11-14 Block chain data security method based on multiple signatures

Publications (2)

Publication Number Publication Date
CN110929275A CN110929275A (en) 2020-03-27
CN110929275B true CN110929275B (en) 2023-03-24

Family

ID=69852973

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911109465.XA Active CN110929275B (en) 2019-11-14 2019-11-14 Block chain data security method based on multiple signatures

Country Status (1)

Country Link
CN (1) CN110929275B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111523889B (en) * 2020-04-17 2023-09-01 昆明大棒客科技有限公司 Multiple signature implementation method, device, equipment and storage medium
CN111817858A (en) * 2020-07-27 2020-10-23 北京金仓幸福科技有限公司 Block chain data security method based on multiple signatures

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
WO2018145127A1 (en) * 2017-02-06 2018-08-09 ShoCard, Inc. Electronic identification verification methods and systems with storage of certification records to a side chain
CN108810895A (en) * 2018-07-12 2018-11-13 西安电子科技大学 Wireless Mesh netword identity identifying method based on block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
PL3073670T4 (en) * 2015-03-27 2021-08-23 Black Gold Coin, Inc. A system and a method for personal identification and verification

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018145127A1 (en) * 2017-02-06 2018-08-09 ShoCard, Inc. Electronic identification verification methods and systems with storage of certification records to a side chain
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN108810895A (en) * 2018-07-12 2018-11-13 西安电子科技大学 Wireless Mesh netword identity identifying method based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于国密算法和区块链的移动端安全eID及认证协议设计;胡卫等;《信息网络安全》;20180710(第07期);全文 *

Also Published As

Publication number Publication date
CN110929275A (en) 2020-03-27

Similar Documents

Publication Publication Date Title
TWI706275B (en) System and method for information protection
US11874943B2 (en) Managing group authority and access to a secured file system in a decentralized environment
US6035398A (en) Cryptographic key generation using biometric data
JP4581200B2 (en) Personal authentication system, personal authentication method, information processing apparatus, and program providing medium
JP4655345B2 (en) Information processing apparatus, information processing method, and program providing medium
CN101567780B (en) Key management and recovery method for encrypted digital certificate
CN102255729B (en) IBE (Internet Booking Engine) data encryption system based on medium digital certificate
CN109687963A (en) Anti- quantum calculation alliance chain method of commerce and system based on public key pond
CN110419053A (en) Systems and methods for information protection
CN109146479B (en) Data encryption method based on block chain
US8806206B2 (en) Cooperation method and system of hardware secure units, and application device
JP2005532742A5 (en) Method and system for preventing unauthorized delivery and use of electronic keys with key seeds
EP3543891B1 (en) A computer implemented method and a system for tracking of certified documents lifecycle and computer programs thereof
CN110929275B (en) Block chain data security method based on multiple signatures
US20250094969A1 (en) Enabling confidential and non-confidential transactions on a digital token architecture
CN111047305A (en) A kind of private key storage and mnemonic method of encrypted digital currency wallet based on digital watermark technology
CN115203728A (en) Financial data safety storage system and method based on alliance block chain and big data
CN109146684B (en) Decentralized transaction verification method
CN119363343A (en) A medical service management system based on national secret key splitting algorithm
EP4379631A1 (en) Digital wallet device and dual offline transaction method thereof
CN112950356B (en) Personal loan processing method, system, equipment and medium based on digital identity
CN111130763B (en) A Key Backup and Recovery Method Based on Integrated Encryption Technology
Ibor et al. A conceptual framework for augmenting the security of digitized academic records in Nigerian tertiary institutions using blockchain technology
Zohar et al. Financial cryptography and data security: FC 2018 international workshops, bitcoin, voting, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, revised selected papers
US20250148061A1 (en) Systems and methods for providing a trackable digital asset and its use thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant