[go: up one dir, main page]

CN109743171B - Key series method for solving multi-party digital signature, timestamp and encryption - Google Patents

Key series method for solving multi-party digital signature, timestamp and encryption Download PDF

Info

Publication number
CN109743171B
CN109743171B CN201811485865.6A CN201811485865A CN109743171B CN 109743171 B CN109743171 B CN 109743171B CN 201811485865 A CN201811485865 A CN 201811485865A CN 109743171 B CN109743171 B CN 109743171B
Authority
CN
China
Prior art keywords
file
signature
key
operation information
sample
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811485865.6A
Other languages
Chinese (zh)
Other versions
CN109743171A (en
Inventor
殷建文
倪向东
徐旭峰
胡建敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Doctor Information Technology Research Institute Co ltd
Original Assignee
Guangzhou Doctor Information Technology Research Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Doctor Information Technology Research Institute Co ltd filed Critical Guangzhou Doctor Information Technology Research Institute Co ltd
Priority to CN201811485865.6A priority Critical patent/CN109743171B/en
Publication of CN109743171A publication Critical patent/CN109743171A/en
Application granted granted Critical
Publication of CN109743171B publication Critical patent/CN109743171B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a key series method for solving the problems of multi-party digital signature, timestamp and encryption, which comprises a private key and a public key for decrypting the private key; calling a function module to operate an execution file sample to generate operation information; b. performing digital signature on the execution file sample and the operation information thereof by using a signature module to generate a signature file; c. encrypting the signature file by using a private key to generate an encrypted file; d. transmitting the encrypted file; e. receiving the encrypted file, decrypting the encrypted file by using a public key, calling a function module to verify operation information, and taking the successfully verified encrypted file as a new execution file sample; f. and (c) repeating the steps a and b on the new execution file sample to form a new signature file. The invention solves the technical problem that the prior art can not realize convenient and effective signature by multiple parties.

Description

Key series method for solving multi-party digital signature, timestamp and encryption
Technical Field
The invention relates to the field of secret and secure communication, in particular to a key serial method for solving multi-party digital signature, timestamp and encryption.
Background
Digital signature (also called public key digital signature, electronic signature) is a common physical signature similar to that written on paper, but is implemented by using the technology in the field of public key encryption, and is used as a method for identifying digital information. A set of digital signatures typically defines two complementary operations, one for signing and the other for verification. The digital signature is a digital string which can be generated only by a sender of the information and cannot be forged by others, and the digital string is also a valid proof of the authenticity of the information sent by the sender of the information.
In short, a digital signature is some data appended to a data unit or a cryptographic transformation performed on a data unit. Such data or transformations allow the recipient of the data unit to verify the source of the data unit and the integrity of the data unit and to protect the data against counterfeiting by a person (e.g., the recipient). Which is a method of signing a message in electronic form, a signed message being capable of being transmitted in a communication network. The digital signature can be obtained based on both a public key cryptosystem and a private key cryptosystem, and is mainly based on the public key cryptosystem. Including ordinary digital signatures and special digital signatures. Common digital signature algorithms include RSA, ElGamal, Fiat-Shamir, Guillou-Quisquarter, Schnorr, Ong-Schnorr-Shamir digital signature algorithm, Des/DSA, elliptic curve digital signature algorithm, finite automaton digital signature algorithm and the like. The special digital signature includes blind signature, proxy signature, group signature, undeniable signature, fair blind signature, threshold signature, signature with message recovery function, etc., and is closely related to a specific application environment.
Specifically, the digital signature technique is to encrypt digest information with a private key of a sender and transmit the encrypted digest information to a receiver together with an original text. The receiver can decrypt the encrypted digest information only by using the public key of the sender, and then generates a digest information for the received original text by using the HASH function, and compares the digest information with the decrypted digest information. If the two information are the same, the received information is complete and is not modified in the transmission process, otherwise, the information is modified, and therefore the digital signature can verify the integrity of the information. Digital signature is an encryption process and digital signature verification is a decryption process.
The digital signature has non-repudiation, is a core technology in the field of electronic contracts, and realizes data encryption of the electronic contracts by using the digital signature in different links so as to ensure that the electronic contracts are not falsified and are legal and credible. The digital signature has two functions, namely, the digital signature can determine whether the message is really signed and sent out by a sender, and the digital signature can determine whether the content of the data message is tampered or not, so that the integrity of the message is ensured. The digital signature can ensure the integrity of information transmission and the identity authentication of a sender, and prevent the repudiation in transaction.
A group signature (group signature) is a signature that satisfies such a requirement: in a group signature scheme, any member of a group can sign messages anonymously on behalf of the entire group. Like other digital signatures, group signatures are publicly verifiable and can be verified with only a single group public key. The main purpose, kind, etc. of the group can also be displayed as a group mark. At present, whether the signature is a single signature or a group signature, the signature is basically signed by a pair of secret keys, namely public key decryption and a private key. And the problem of convenient and effective signature by multiple parties can not be solved.
Therefore, there is a need for improvement of the prior art to solve the above technical problems.
Disclosure of Invention
In view of the above, the present invention provides a key concatenation method for solving multi-party digital signature, timestamp and encryption, and solves the technical problem in the prior art that multi-party convenient and effective signature cannot be realized. The method is realized by the following technical scheme:
a key series method for solving the problems of multi-party digital signature, timestamp and encryption is designed, and comprises a private key and a public key for decrypting the private key; the specific process comprises the following steps of,
a. calling a function module to operate the execution file sample to generate operation information, wherein the function module can use a time function module or other function modules and the like to generate operation information for verification in the step e;
b. a user uses a signature module to digitally sign an execution file sample and the operation information thereof to generate a signature file;
c. encrypting the signature file by using a private key to generate an encrypted file;
d. the encrypted file is transmitted, the encrypted file can be transmitted on the Internet or other networks, the encrypted file is transmitted to another user needing digital signature, and the user can directionally transmit the encrypted file to another user needing digital signature and can also group the encrypted file to other users needing digital signature;
d. the second user receives the encrypted file, decrypts the encrypted file by using the public key, calls the function module to verify the operation information, and takes the successfully verified encrypted file as a new execution file sample;
f. and (c) repeating the steps a and b on the new execution file sample to form a new signature file.
Further, the key concatenation method for solving the multi-party digital signature, the timestamp and the encryption further comprises the step of repeating c, d, e, f, a and b for the new signature file in the step f, the private keys and the public keys for decrypting the private keys comprise a plurality of private keys, the private keys used for encrypting the execution file sample and the operation information of the execution file sample are different, the private keys are respectively used by a plurality of users for encrypting the execution file sample and the operation information and then transmitting the encrypted execution file sample and the operation information, each user receiving the encrypted file can decrypt the encrypted file through the public key and can call a function module to verify the operation information, and the file is determined to be transmitted by a specific user with the private key.
Further, the function module is a time function module, the operation information is a timestamp generated after the operation is performed on the executed file sample, the operation information is verified in a mode that whether the timestamp is generated in a specific time interval is verified, when the file needs to be sequentially transmitted to multiple users, whether the timestamp is generated in the specific time interval can be verified, the time sequence of the timestamp generation meets a specific sequence, the time function module can adopt a time module which can adopt Python to represent the timestamp, can represent the offset which is calculated from No. 1/1: 00:00 in 1970 to the current time in seconds, and tick units (relative time of the system, floating point numbers with intervals in seconds) are most suitable for performing date operation.
Further, the step b further includes a process of performing an operation on the executed file sample to generate the digest information and encrypting the digest information, and the step e further includes a process of performing a digest information verification after decryption, and the digest information generated and verified by performing the operation on the executed file sample by using a hash function can further ensure that the file is not tampered.
Furthermore, the process of generating the summary information and verifying the summary is operated by using a HASH function, and since the operation speed of the asymmetric algorithm is low, the operation speed can be ensured by adopting a one-way HASH function in the digital signature protocol on the premise that the file data is mapped to generate the summary information.
The invention has the beneficial effects that: during group signature, multiple parties can realize respective signature without meeting each other; the group signature is a digital signature with a time stamp, so that the group signature is legal and effective and cannot be changed; other advantageous effects of the present invention will be further described in conjunction with the following specific examples.
Drawings
The invention is further described below with reference to the following figures and examples:
FIG. 1 is a process diagram of the present invention.
Detailed Description
Example (b): as shown in fig. 1, a key concatenation method for solving multi-party digital signature, timestamp and encryption comprises a private key and a public key for decrypting the private key; the specific process comprises the following steps of,
a. calling a function module to operate the execution file sample to generate operation information, wherein the function module can use a time function module or other function modules and the like to generate operation information for verification in the step e;
b. a user uses a signature module to digitally sign an execution file sample and the operation information thereof to generate a signature file;
c. encrypting the signature file by using a private key to generate an encrypted file;
d. the encrypted file is transmitted, the encrypted file can be transmitted on the Internet or other networks, the encrypted file is transmitted to another user needing to be digitally signed, and the user can directionally transmit the encrypted file to another user or group-transmit the encrypted file to other users;
d. the second user receives the encrypted file, decrypts the encrypted file by using the public key, calls the function module to verify the operation information, and takes the successfully verified encrypted file as a new execution file sample;
f. and (c) repeating the steps a and b on the new execution file sample to form a new signature file.
In this embodiment, the key concatenation method for solving the multi-party digital signature, the timestamp and the encryption further includes the step of repeating c, d, e, f, a and b for the new signature file in the step f, the private keys and the public keys for decrypting the private keys include a plurality of private keys, the private keys used for encrypting the execution file sample and the operation information are different, the private keys used for encrypting the execution file sample and the operation information by the private keys of the users are respectively used for transmitting the execution file sample and the operation information after the encryption by the private keys of the users, each user receiving the encrypted file can decrypt the encrypted file through the public key and can call the function module to verify the operation information, and the file is determined to be transmitted by a specific user with the private key.
In this embodiment, the function module is a time function module, the operation information is a timestamp generated after an operation is performed on an execution file sample, the operation information is verified in a manner that whether the timestamp is generated in a specific time interval is verified, when a file needs to be sequentially transmitted to multiple users, whether the timestamp is generated in the specific time interval is verified, and a time sequence of generating the timestamp meets a specific sequence, the time function module adopts a time module which can adopt Python to represent the timestamp, can represent an offset calculated from 1/00: 00:00:00 in 1970 to the current time in seconds, and tick units (relative time of the system, floating point numbers with intervals in seconds) are most suitable for performing date operation.
In this embodiment, the step b further includes a process of performing an operation on the sample of the file to generate the digest information and encrypting the digest information, and the step e further includes a process of performing a digest information verification after decryption, and the digest information generated and verified by performing the operation on the sample of the file may be generated by using a hash function, so that the file is further ensured not to be tampered with.
In this embodiment, the process of generating the digest information and verifying the digest is performed by using a HASH function, and since the asymmetric algorithm has a relatively slow operation speed, in the digital signature protocol, the operation speed can be ensured on the premise that the file data is mapped to generate the digest information by using the one-way HASH function.
The specific implementation process comprises the following steps: the invention mainly comprises four modules, namely time function modules which are used for generating and adding timestamps; the signature module is used for digitally signing; the decryption module is used for decrypting; the key superposition module is used for multi-party signature; for example, an electronic document D requires the A, B, C parties to complete within a specific time interval [ t1, t2 ]; a initiates a signature, A calculates time through a time function module, determines that a timestamp is generated in a time interval [ t1, t2], adds the content of D, calls a signature module, encrypts the D 'by using a private key of A, and sends the D' to B or C, and for convenience of description, descriptions are transmitted in the sequence of A, B, C; b, after receiving D ', calling a decryption module, decrypting by using a public key of A, calling a time function module, verifying that the signature of A is valid, calculating time by using the time function module, determining that a timestamp is participated in a time interval [ t1, t2], adding the content of D', calling the signature module, encrypting by using a private key of B to generate D 'and sending the D' to C; repeating the steps until the A, B and C complete the signature; or directly grouping the D 'to B and C, then respectively calling a decryption module by B and C, decrypting by using a public key of A, then calling a time function module to verify the signature of A to be valid, then calculating time by the time function module, determining that a timestamp participates in a time interval [ t1, t2], adding the content of D', calling the signature module, encrypting by using a private key of B to generate D '(B), generating D' (C) by using a private key of C, transmitting the file D '(B) to C by B, transmitting the file D' (C) to B by C, and finishing multi-party signature; when the electronic file D needs more than three users to sign, the multi-party users can decrypt, sign the timestamp, encrypt, send or group send according to the steps.
Finally, the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made to the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention, and all of them should be covered in the claims of the present invention.

Claims (4)

1. A key concatenation method for solving multi-party digital signature, time stamp and encryption is characterized in that: comprises a private key and a public key for decrypting the private key; the specific process comprises the following steps of,
a. calling a function module to operate an execution file sample to generate operation information;
b. performing digital signature on the execution file sample and the operation information thereof by using a signature module to generate a signature file;
c. encrypting the signature file by using a private key to generate an encrypted file;
d. transmitting the encrypted file;
e. receiving the encrypted file, decrypting the encrypted file by using a public key, calling a function module to verify operation information, and taking the successfully verified encrypted file as a new execution file sample;
f. repeating the steps a and b on a new execution file sample to form a new signature file;
the function module is a time function module, the operation information is a timestamp generated after the operation is performed on the execution file sample, and the operation information is verified in a mode that whether the timestamp is generated in a specific time interval is verified and the time sequence of generating the timestamp meets a specific sequence.
2. The key concatenation method for resolving multi-party digital signatures, timestamps and encryptions of claim 1, wherein: the method also comprises the step of repeating c, d, e, f, a and b for the new signature file in the step f, wherein a plurality of private keys and public keys for decrypting the private keys are included, and the private keys used for encrypting the executed file sample and the operation information of the executed file sample are different.
3. The key concatenation method for resolving multi-party digital signatures, timestamps and encryptions of claim 1, wherein: the step b also comprises the processes of operating the executed file samples to generate the summary information and encrypting the summary information, and the step e also comprises the process of verifying the summary information after decryption.
4. The key concatenation method for resolving multi-party digital signatures, timestamps and encryptions of claim 3, wherein: the process of generating the summary information and verifying the summary is operated by a HASH function.
CN201811485865.6A 2018-12-06 2018-12-06 Key series method for solving multi-party digital signature, timestamp and encryption Active CN109743171B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811485865.6A CN109743171B (en) 2018-12-06 2018-12-06 Key series method for solving multi-party digital signature, timestamp and encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811485865.6A CN109743171B (en) 2018-12-06 2018-12-06 Key series method for solving multi-party digital signature, timestamp and encryption

Publications (2)

Publication Number Publication Date
CN109743171A CN109743171A (en) 2019-05-10
CN109743171B true CN109743171B (en) 2022-04-12

Family

ID=66358501

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811485865.6A Active CN109743171B (en) 2018-12-06 2018-12-06 Key series method for solving multi-party digital signature, timestamp and encryption

Country Status (1)

Country Link
CN (1) CN109743171B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110233736B (en) * 2019-06-19 2020-05-08 核芯互联(北京)科技有限公司 Digital signature generation method, verification method, device, equipment and medium
US10790990B2 (en) 2019-06-26 2020-09-29 Alibaba Group Holding Limited Ring signature-based anonymous transaction
CN110189131B (en) * 2019-06-26 2020-11-06 创新先进技术有限公司 Method and device for realizing confidential blockchain transaction by adopting ring signature
US11238447B2 (en) 2019-06-26 2022-02-01 Advanced New Technologies Co., Ltd. Blockchain transactions with ring signatures
CN112488703B (en) * 2019-06-26 2025-02-21 蚂蚁链技术有限公司 Anonymous transaction method and device based on ring signature
CN110620780B (en) * 2019-09-26 2021-10-22 如般量子科技有限公司 Anti-quantum computation two-dimensional code authentication method and system based on asymmetric key pool and timestamp
CN110955918A (en) * 2019-10-29 2020-04-03 浙江工业大学 A contract text protection method based on RSA encryption sha-256 digital signature
CN112926974B (en) * 2019-12-06 2024-02-13 环球数科集团有限公司 An offline ticket anti-counterfeiting method based on the principle of distributed ledger
CN112052435B (en) * 2020-09-30 2023-11-28 杭州尚尚签网络科技有限公司 CAD drawing multiuser electronic signature method
CN112580110A (en) * 2020-12-23 2021-03-30 国家电网有限公司大数据中心 Data resource sharing safety method based on watermark technology
CN113190834B (en) * 2021-01-29 2024-09-24 统信软件技术有限公司 File signing method, computing device and storage medium
CN112906041B (en) * 2021-03-31 2025-01-24 上海简苏网络科技有限公司 A dynamic multi-party signature encryption and decryption method and system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1672358A (en) * 2002-07-29 2005-09-21 国际商业机器公司 Groups signature scheme

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9276749B2 (en) * 2012-07-31 2016-03-01 Adobe Systems Incorporated Distributed validation of digitally signed electronic documents
US20170220999A1 (en) * 2016-02-02 2017-08-03 Adobe Systems Incorporated Techniques for document management workflows
CN106533698A (en) * 2016-12-15 2017-03-22 北京三未信安科技发展有限公司 RSA-based distributed threshold signature method and system
CN107017993B (en) * 2017-04-01 2020-05-05 北京江南天安科技有限公司 Multi-party combined key generation and digital signature method and system
CN108199835B (en) * 2018-01-19 2021-11-30 北京江南天安科技有限公司 Multi-party combined private key decryption method
CN108833115B (en) * 2018-06-15 2021-01-26 中山大学 Multi-party fair PDF (Portable document Format) contract signing method based on block chain

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1672358A (en) * 2002-07-29 2005-09-21 国际商业机器公司 Groups signature scheme

Also Published As

Publication number Publication date
CN109743171A (en) 2019-05-10

Similar Documents

Publication Publication Date Title
CN109743171B (en) Key series method for solving multi-party digital signature, timestamp and encryption
US12375304B2 (en) Mutual authentication of confidential communication
EP3642997B1 (en) Secure communications providing forward secrecy
JP4593533B2 (en) System and method for updating keys used for public key cryptography
JP3858527B2 (en) Data generation apparatus, data verification apparatus and method
US11870891B2 (en) Certificateless public key encryption using pairings
US7146500B2 (en) System for obtaining signatures on a single authoritative copy of an electronic record
US8661240B2 (en) Joint encryption of data
EP1063813A2 (en) Public key encryption with digital signature scheme
US9705683B2 (en) Verifiable implicit certificates
CN110113150B (en) Encryption method and system based on non-certificate environment and capable of repudiation authentication
US9088419B2 (en) Keyed PV signatures
CA2819211C (en) Data encryption
GB2603495A (en) Generating shared keys
US20150006900A1 (en) Signature protocol
US6507656B1 (en) Non malleable encryption apparatus and method
CN117955688A (en) Tamper-resistant network data encryption method and device
CN111641494A (en) Method and device for realizing global block chain
US7035403B2 (en) Encryption method and apparatus with escrow guarantees
JP3796528B2 (en) Communication system for performing content certification and content certification site device
Witzke et al. Key management for large scale end-to-end encryption
KR20010096036A (en) Method for constructing domain-verifiable signcryption
JP3862397B2 (en) Information communication system
CN120034390A (en) Multi-link data security verification method based on homomorphic encryption and asymmetric encryption
JP3668138B2 (en) Signed ciphertext conversion method, verification method thereof, and apparatus thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB03 Change of inventor or designer information
CB03 Change of inventor or designer information

Inventor after: Yin Jianwen

Inventor after: Ni Xiangdong

Inventor after: Xu Xufeng

Inventor after: Hu Jianmin

Inventor before: Yin Jianwen

Inventor before: Ni Xiangdong

GR01 Patent grant
GR01 Patent grant