Data processing method and device, computer equipment and storage medium

A data processing and binary number technology, which is applied in the field of information security and can solve the problem of high certificate management overhead.

Active Publication Date: 2019-10-08
JUZIX TECH SHENZHEN CO LTD +1
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a data processing method, device, computer equipment, and storage medium to solve the problem of high certificate management overhead in the scheme of verifying the target object in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device, computer equipment and storage medium
  • Data processing method and device, computer equipment and storage medium
  • Data processing method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] The principle and spirit of the present application will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are given only to enable those skilled in the art to better understand and implement the present application, rather than to limit the scope of the present application in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of this disclosure to those skilled in the art.

[0073]Those skilled in the art know that the embodiments of the present application may be realized as a system, device, method or computer program product. Therefore, the disclosure of the present application can be specifically implemented in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0074] Considering that the current method of data verific...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a data processing method and device, computer equipment and a storage medium, and the method comprises the steps: sending the identity information of a first user side to a keygeneration system, receiving a user private key returned by the key generation system, wherein the key generation system generates the user private key according to the identity information and a system main private key; obtaining a preset system number, signing each natural number which is smaller than the preset system number according to an SM9 signature algorithm and a user private key, and sending the obtained signatures to a second user side; receiving a commitment value sent by a second user side, the commitment value being generated by the second user side according to the target object; receiving a blind value returned by the second user side, the blind value being generated by the second user side according to the plurality of signatures and the target object, and the system mainpublic key being generated by the key generation system; and verifying the target object according to the commitment value and the blind value. According to the scheme, high certificate management expenditure is avoided, and the cost is effectively reduced.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a data processing method, device, computer equipment and storage medium. Background technique [0002] The zero-knowledge proof protocol can verify the target object without providing any useful information to the verifier, so that the verifier believes that a certain assertion is correct. This protocol is widely used in blockchain privacy protection, electronic cash Systems, group signature schemes, public verification secret sharing schemes, etc. [0003] At present, the most widely used method of verifying the target object is the signature blind method, but at present, this method uses a cryptographic system based on the PKI (Public Key Infrastructure, public key infrastructure) system, which requires CA ( Certificate Authority (Certificate Authorization Center) maintains and manages user public key certificates, mainly including the issuance, renewal,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08H04L9/32H04L9/06
CPCH04L9/0863H04L9/3247H04L9/0643
Inventor 何德彪林超谢翔李升林孙立林
Owner JUZIX TECH SHENZHEN CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products