CN109743171B - Key series method for solving multi-party digital signature, timestamp and encryption - Google Patents
Key series method for solving multi-party digital signature, timestamp and encryption Download PDFInfo
- Publication number
- CN109743171B CN109743171B CN201811485865.6A CN201811485865A CN109743171B CN 109743171 B CN109743171 B CN 109743171B CN 201811485865 A CN201811485865 A CN 201811485865A CN 109743171 B CN109743171 B CN 109743171B
- Authority
- CN
- China
- Prior art keywords
- file
- signature
- key
- operation information
- sample
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 230000008569 process Effects 0.000 claims description 16
- FGUUSXIOTUKUDN-IBGZPJMESA-N C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 Chemical compound C1(=CC=CC=C1)N1C2=C(NC([C@H](C1)NC=1OC(=NN=1)C1=CC=CC=C1)=O)C=CC=C2 FGUUSXIOTUKUDN-IBGZPJMESA-N 0.000 claims description 3
- 238000012795 verification Methods 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000007667 floating Methods 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000000844 transformation Methods 0.000 description 1
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a key series method for solving the problems of multi-party digital signature, timestamp and encryption, which comprises a private key and a public key for decrypting the private key; calling a function module to operate an execution file sample to generate operation information; b. performing digital signature on the execution file sample and the operation information thereof by using a signature module to generate a signature file; c. encrypting the signature file by using a private key to generate an encrypted file; d. transmitting the encrypted file; e. receiving the encrypted file, decrypting the encrypted file by using a public key, calling a function module to verify operation information, and taking the successfully verified encrypted file as a new execution file sample; f. and (c) repeating the steps a and b on the new execution file sample to form a new signature file. The invention solves the technical problem that the prior art can not realize convenient and effective signature by multiple parties.
Description
Technical Field
The invention relates to the field of secret and secure communication, in particular to a key serial method for solving multi-party digital signature, timestamp and encryption.
Background
Digital signature (also called public key digital signature, electronic signature) is a common physical signature similar to that written on paper, but is implemented by using the technology in the field of public key encryption, and is used as a method for identifying digital information. A set of digital signatures typically defines two complementary operations, one for signing and the other for verification. The digital signature is a digital string which can be generated only by a sender of the information and cannot be forged by others, and the digital string is also a valid proof of the authenticity of the information sent by the sender of the information.
In short, a digital signature is some data appended to a data unit or a cryptographic transformation performed on a data unit. Such data or transformations allow the recipient of the data unit to verify the source of the data unit and the integrity of the data unit and to protect the data against counterfeiting by a person (e.g., the recipient). Which is a method of signing a message in electronic form, a signed message being capable of being transmitted in a communication network. The digital signature can be obtained based on both a public key cryptosystem and a private key cryptosystem, and is mainly based on the public key cryptosystem. Including ordinary digital signatures and special digital signatures. Common digital signature algorithms include RSA, ElGamal, Fiat-Shamir, Guillou-Quisquarter, Schnorr, Ong-Schnorr-Shamir digital signature algorithm, Des/DSA, elliptic curve digital signature algorithm, finite automaton digital signature algorithm and the like. The special digital signature includes blind signature, proxy signature, group signature, undeniable signature, fair blind signature, threshold signature, signature with message recovery function, etc., and is closely related to a specific application environment.
Specifically, the digital signature technique is to encrypt digest information with a private key of a sender and transmit the encrypted digest information to a receiver together with an original text. The receiver can decrypt the encrypted digest information only by using the public key of the sender, and then generates a digest information for the received original text by using the HASH function, and compares the digest information with the decrypted digest information. If the two information are the same, the received information is complete and is not modified in the transmission process, otherwise, the information is modified, and therefore the digital signature can verify the integrity of the information. Digital signature is an encryption process and digital signature verification is a decryption process.
The digital signature has non-repudiation, is a core technology in the field of electronic contracts, and realizes data encryption of the electronic contracts by using the digital signature in different links so as to ensure that the electronic contracts are not falsified and are legal and credible. The digital signature has two functions, namely, the digital signature can determine whether the message is really signed and sent out by a sender, and the digital signature can determine whether the content of the data message is tampered or not, so that the integrity of the message is ensured. The digital signature can ensure the integrity of information transmission and the identity authentication of a sender, and prevent the repudiation in transaction.
A group signature (group signature) is a signature that satisfies such a requirement: in a group signature scheme, any member of a group can sign messages anonymously on behalf of the entire group. Like other digital signatures, group signatures are publicly verifiable and can be verified with only a single group public key. The main purpose, kind, etc. of the group can also be displayed as a group mark. At present, whether the signature is a single signature or a group signature, the signature is basically signed by a pair of secret keys, namely public key decryption and a private key. And the problem of convenient and effective signature by multiple parties can not be solved.
Therefore, there is a need for improvement of the prior art to solve the above technical problems.
Disclosure of Invention
In view of the above, the present invention provides a key concatenation method for solving multi-party digital signature, timestamp and encryption, and solves the technical problem in the prior art that multi-party convenient and effective signature cannot be realized. The method is realized by the following technical scheme:
a key series method for solving the problems of multi-party digital signature, timestamp and encryption is designed, and comprises a private key and a public key for decrypting the private key; the specific process comprises the following steps of,
a. calling a function module to operate the execution file sample to generate operation information, wherein the function module can use a time function module or other function modules and the like to generate operation information for verification in the step e;
b. a user uses a signature module to digitally sign an execution file sample and the operation information thereof to generate a signature file;
c. encrypting the signature file by using a private key to generate an encrypted file;
d. the encrypted file is transmitted, the encrypted file can be transmitted on the Internet or other networks, the encrypted file is transmitted to another user needing digital signature, and the user can directionally transmit the encrypted file to another user needing digital signature and can also group the encrypted file to other users needing digital signature;
d. the second user receives the encrypted file, decrypts the encrypted file by using the public key, calls the function module to verify the operation information, and takes the successfully verified encrypted file as a new execution file sample;
f. and (c) repeating the steps a and b on the new execution file sample to form a new signature file.
Further, the key concatenation method for solving the multi-party digital signature, the timestamp and the encryption further comprises the step of repeating c, d, e, f, a and b for the new signature file in the step f, the private keys and the public keys for decrypting the private keys comprise a plurality of private keys, the private keys used for encrypting the execution file sample and the operation information of the execution file sample are different, the private keys are respectively used by a plurality of users for encrypting the execution file sample and the operation information and then transmitting the encrypted execution file sample and the operation information, each user receiving the encrypted file can decrypt the encrypted file through the public key and can call a function module to verify the operation information, and the file is determined to be transmitted by a specific user with the private key.
Further, the function module is a time function module, the operation information is a timestamp generated after the operation is performed on the executed file sample, the operation information is verified in a mode that whether the timestamp is generated in a specific time interval is verified, when the file needs to be sequentially transmitted to multiple users, whether the timestamp is generated in the specific time interval can be verified, the time sequence of the timestamp generation meets a specific sequence, the time function module can adopt a time module which can adopt Python to represent the timestamp, can represent the offset which is calculated from No. 1/1: 00:00 in 1970 to the current time in seconds, and tick units (relative time of the system, floating point numbers with intervals in seconds) are most suitable for performing date operation.
Further, the step b further includes a process of performing an operation on the executed file sample to generate the digest information and encrypting the digest information, and the step e further includes a process of performing a digest information verification after decryption, and the digest information generated and verified by performing the operation on the executed file sample by using a hash function can further ensure that the file is not tampered.
Furthermore, the process of generating the summary information and verifying the summary is operated by using a HASH function, and since the operation speed of the asymmetric algorithm is low, the operation speed can be ensured by adopting a one-way HASH function in the digital signature protocol on the premise that the file data is mapped to generate the summary information.
The invention has the beneficial effects that: during group signature, multiple parties can realize respective signature without meeting each other; the group signature is a digital signature with a time stamp, so that the group signature is legal and effective and cannot be changed; other advantageous effects of the present invention will be further described in conjunction with the following specific examples.
Drawings
The invention is further described below with reference to the following figures and examples:
FIG. 1 is a process diagram of the present invention.
Detailed Description
Example (b): as shown in fig. 1, a key concatenation method for solving multi-party digital signature, timestamp and encryption comprises a private key and a public key for decrypting the private key; the specific process comprises the following steps of,
a. calling a function module to operate the execution file sample to generate operation information, wherein the function module can use a time function module or other function modules and the like to generate operation information for verification in the step e;
b. a user uses a signature module to digitally sign an execution file sample and the operation information thereof to generate a signature file;
c. encrypting the signature file by using a private key to generate an encrypted file;
d. the encrypted file is transmitted, the encrypted file can be transmitted on the Internet or other networks, the encrypted file is transmitted to another user needing to be digitally signed, and the user can directionally transmit the encrypted file to another user or group-transmit the encrypted file to other users;
d. the second user receives the encrypted file, decrypts the encrypted file by using the public key, calls the function module to verify the operation information, and takes the successfully verified encrypted file as a new execution file sample;
f. and (c) repeating the steps a and b on the new execution file sample to form a new signature file.
In this embodiment, the key concatenation method for solving the multi-party digital signature, the timestamp and the encryption further includes the step of repeating c, d, e, f, a and b for the new signature file in the step f, the private keys and the public keys for decrypting the private keys include a plurality of private keys, the private keys used for encrypting the execution file sample and the operation information are different, the private keys used for encrypting the execution file sample and the operation information by the private keys of the users are respectively used for transmitting the execution file sample and the operation information after the encryption by the private keys of the users, each user receiving the encrypted file can decrypt the encrypted file through the public key and can call the function module to verify the operation information, and the file is determined to be transmitted by a specific user with the private key.
In this embodiment, the function module is a time function module, the operation information is a timestamp generated after an operation is performed on an execution file sample, the operation information is verified in a manner that whether the timestamp is generated in a specific time interval is verified, when a file needs to be sequentially transmitted to multiple users, whether the timestamp is generated in the specific time interval is verified, and a time sequence of generating the timestamp meets a specific sequence, the time function module adopts a time module which can adopt Python to represent the timestamp, can represent an offset calculated from 1/00: 00:00:00 in 1970 to the current time in seconds, and tick units (relative time of the system, floating point numbers with intervals in seconds) are most suitable for performing date operation.
In this embodiment, the step b further includes a process of performing an operation on the sample of the file to generate the digest information and encrypting the digest information, and the step e further includes a process of performing a digest information verification after decryption, and the digest information generated and verified by performing the operation on the sample of the file may be generated by using a hash function, so that the file is further ensured not to be tampered with.
In this embodiment, the process of generating the digest information and verifying the digest is performed by using a HASH function, and since the asymmetric algorithm has a relatively slow operation speed, in the digital signature protocol, the operation speed can be ensured on the premise that the file data is mapped to generate the digest information by using the one-way HASH function.
The specific implementation process comprises the following steps: the invention mainly comprises four modules, namely time function modules which are used for generating and adding timestamps; the signature module is used for digitally signing; the decryption module is used for decrypting; the key superposition module is used for multi-party signature; for example, an electronic document D requires the A, B, C parties to complete within a specific time interval [ t1, t2 ]; a initiates a signature, A calculates time through a time function module, determines that a timestamp is generated in a time interval [ t1, t2], adds the content of D, calls a signature module, encrypts the D 'by using a private key of A, and sends the D' to B or C, and for convenience of description, descriptions are transmitted in the sequence of A, B, C; b, after receiving D ', calling a decryption module, decrypting by using a public key of A, calling a time function module, verifying that the signature of A is valid, calculating time by using the time function module, determining that a timestamp is participated in a time interval [ t1, t2], adding the content of D', calling the signature module, encrypting by using a private key of B to generate D 'and sending the D' to C; repeating the steps until the A, B and C complete the signature; or directly grouping the D 'to B and C, then respectively calling a decryption module by B and C, decrypting by using a public key of A, then calling a time function module to verify the signature of A to be valid, then calculating time by the time function module, determining that a timestamp participates in a time interval [ t1, t2], adding the content of D', calling the signature module, encrypting by using a private key of B to generate D '(B), generating D' (C) by using a private key of C, transmitting the file D '(B) to C by B, transmitting the file D' (C) to B by C, and finishing multi-party signature; when the electronic file D needs more than three users to sign, the multi-party users can decrypt, sign the timestamp, encrypt, send or group send according to the steps.
Finally, the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made to the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention, and all of them should be covered in the claims of the present invention.
Claims (4)
1. A key concatenation method for solving multi-party digital signature, time stamp and encryption is characterized in that: comprises a private key and a public key for decrypting the private key; the specific process comprises the following steps of,
a. calling a function module to operate an execution file sample to generate operation information;
b. performing digital signature on the execution file sample and the operation information thereof by using a signature module to generate a signature file;
c. encrypting the signature file by using a private key to generate an encrypted file;
d. transmitting the encrypted file;
e. receiving the encrypted file, decrypting the encrypted file by using a public key, calling a function module to verify operation information, and taking the successfully verified encrypted file as a new execution file sample;
f. repeating the steps a and b on a new execution file sample to form a new signature file;
the function module is a time function module, the operation information is a timestamp generated after the operation is performed on the execution file sample, and the operation information is verified in a mode that whether the timestamp is generated in a specific time interval is verified and the time sequence of generating the timestamp meets a specific sequence.
2. The key concatenation method for resolving multi-party digital signatures, timestamps and encryptions of claim 1, wherein: the method also comprises the step of repeating c, d, e, f, a and b for the new signature file in the step f, wherein a plurality of private keys and public keys for decrypting the private keys are included, and the private keys used for encrypting the executed file sample and the operation information of the executed file sample are different.
3. The key concatenation method for resolving multi-party digital signatures, timestamps and encryptions of claim 1, wherein: the step b also comprises the processes of operating the executed file samples to generate the summary information and encrypting the summary information, and the step e also comprises the process of verifying the summary information after decryption.
4. The key concatenation method for resolving multi-party digital signatures, timestamps and encryptions of claim 3, wherein: the process of generating the summary information and verifying the summary is operated by a HASH function.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201811485865.6A CN109743171B (en) | 2018-12-06 | 2018-12-06 | Key series method for solving multi-party digital signature, timestamp and encryption |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201811485865.6A CN109743171B (en) | 2018-12-06 | 2018-12-06 | Key series method for solving multi-party digital signature, timestamp and encryption |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN109743171A CN109743171A (en) | 2019-05-10 |
| CN109743171B true CN109743171B (en) | 2022-04-12 |
Family
ID=66358501
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201811485865.6A Active CN109743171B (en) | 2018-12-06 | 2018-12-06 | Key series method for solving multi-party digital signature, timestamp and encryption |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN109743171B (en) |
Families Citing this family (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110233736B (en) * | 2019-06-19 | 2020-05-08 | 核芯互联(北京)科技有限公司 | Digital signature generation method, verification method, device, equipment and medium |
| US10790990B2 (en) | 2019-06-26 | 2020-09-29 | Alibaba Group Holding Limited | Ring signature-based anonymous transaction |
| CN110189131B (en) * | 2019-06-26 | 2020-11-06 | 创新先进技术有限公司 | Method and device for realizing confidential blockchain transaction by adopting ring signature |
| US11238447B2 (en) | 2019-06-26 | 2022-02-01 | Advanced New Technologies Co., Ltd. | Blockchain transactions with ring signatures |
| CN112488703B (en) * | 2019-06-26 | 2025-02-21 | 蚂蚁链技术有限公司 | Anonymous transaction method and device based on ring signature |
| CN110620780B (en) * | 2019-09-26 | 2021-10-22 | 如般量子科技有限公司 | Anti-quantum computation two-dimensional code authentication method and system based on asymmetric key pool and timestamp |
| CN110955918A (en) * | 2019-10-29 | 2020-04-03 | 浙江工业大学 | A contract text protection method based on RSA encryption sha-256 digital signature |
| CN112926974B (en) * | 2019-12-06 | 2024-02-13 | 环球数科集团有限公司 | An offline ticket anti-counterfeiting method based on the principle of distributed ledger |
| CN112052435B (en) * | 2020-09-30 | 2023-11-28 | 杭州尚尚签网络科技有限公司 | CAD drawing multiuser electronic signature method |
| CN112580110A (en) * | 2020-12-23 | 2021-03-30 | 国家电网有限公司大数据中心 | Data resource sharing safety method based on watermark technology |
| CN113190834B (en) * | 2021-01-29 | 2024-09-24 | 统信软件技术有限公司 | File signing method, computing device and storage medium |
| CN112906041B (en) * | 2021-03-31 | 2025-01-24 | 上海简苏网络科技有限公司 | A dynamic multi-party signature encryption and decryption method and system |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1672358A (en) * | 2002-07-29 | 2005-09-21 | 国际商业机器公司 | Groups signature scheme |
Family Cites Families (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9276749B2 (en) * | 2012-07-31 | 2016-03-01 | Adobe Systems Incorporated | Distributed validation of digitally signed electronic documents |
| US20170220999A1 (en) * | 2016-02-02 | 2017-08-03 | Adobe Systems Incorporated | Techniques for document management workflows |
| CN106533698A (en) * | 2016-12-15 | 2017-03-22 | 北京三未信安科技发展有限公司 | RSA-based distributed threshold signature method and system |
| CN107017993B (en) * | 2017-04-01 | 2020-05-05 | 北京江南天安科技有限公司 | Multi-party combined key generation and digital signature method and system |
| CN108199835B (en) * | 2018-01-19 | 2021-11-30 | 北京江南天安科技有限公司 | Multi-party combined private key decryption method |
| CN108833115B (en) * | 2018-06-15 | 2021-01-26 | 中山大学 | Multi-party fair PDF (Portable document Format) contract signing method based on block chain |
-
2018
- 2018-12-06 CN CN201811485865.6A patent/CN109743171B/en active Active
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN1672358A (en) * | 2002-07-29 | 2005-09-21 | 国际商业机器公司 | Groups signature scheme |
Also Published As
| Publication number | Publication date |
|---|---|
| CN109743171A (en) | 2019-05-10 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN109743171B (en) | Key series method for solving multi-party digital signature, timestamp and encryption | |
| US12375304B2 (en) | Mutual authentication of confidential communication | |
| EP3642997B1 (en) | Secure communications providing forward secrecy | |
| JP4593533B2 (en) | System and method for updating keys used for public key cryptography | |
| JP3858527B2 (en) | Data generation apparatus, data verification apparatus and method | |
| US11870891B2 (en) | Certificateless public key encryption using pairings | |
| US7146500B2 (en) | System for obtaining signatures on a single authoritative copy of an electronic record | |
| US8661240B2 (en) | Joint encryption of data | |
| EP1063813A2 (en) | Public key encryption with digital signature scheme | |
| US9705683B2 (en) | Verifiable implicit certificates | |
| CN110113150B (en) | Encryption method and system based on non-certificate environment and capable of repudiation authentication | |
| US9088419B2 (en) | Keyed PV signatures | |
| CA2819211C (en) | Data encryption | |
| GB2603495A (en) | Generating shared keys | |
| US20150006900A1 (en) | Signature protocol | |
| US6507656B1 (en) | Non malleable encryption apparatus and method | |
| CN117955688A (en) | Tamper-resistant network data encryption method and device | |
| CN111641494A (en) | Method and device for realizing global block chain | |
| US7035403B2 (en) | Encryption method and apparatus with escrow guarantees | |
| JP3796528B2 (en) | Communication system for performing content certification and content certification site device | |
| Witzke et al. | Key management for large scale end-to-end encryption | |
| KR20010096036A (en) | Method for constructing domain-verifiable signcryption | |
| JP3862397B2 (en) | Information communication system | |
| CN120034390A (en) | Multi-link data security verification method based on homomorphic encryption and asymmetric encryption | |
| JP3668138B2 (en) | Signed ciphertext conversion method, verification method thereof, and apparatus thereof |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| CB03 | Change of inventor or designer information | ||
| CB03 | Change of inventor or designer information |
Inventor after: Yin Jianwen Inventor after: Ni Xiangdong Inventor after: Xu Xufeng Inventor after: Hu Jianmin Inventor before: Yin Jianwen Inventor before: Ni Xiangdong |
|
| GR01 | Patent grant | ||
| GR01 | Patent grant |