Unlock instant, AI-driven research and patent intelligence for your innovation.

An encryption method of consortium chain based on bilinear mapping technology

A technology of bilinear mapping and encryption method, applied in key distribution, can solve problems such as efficiency and security defects, and achieve the effect of improving efficiency and improving efficiency

Active Publication Date: 2022-07-12
HANGZHOU YUNXIANG NETWORK TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, PKI technology includes symmetric cryptographic algorithms such as DES, AES, etc., asymmetric cryptographic algorithms such as RSA, ECC, etc., and hash or hash functions such as SHA, MD5, etc. The existing PKI technology can basically meet the security of communication on the chain, but There are still deficiencies in efficiency and safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An encryption method of consortium chain based on bilinear mapping technology
  • An encryption method of consortium chain based on bilinear mapping technology
  • An encryption method of consortium chain based on bilinear mapping technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to clearly illustrate the present invention and make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the following describes the technical solutions in the embodiments of the present invention clearly and completely with reference to the accompanying drawings in the embodiments of the present invention. It enables those skilled in the art to refer to the description text and implement accordingly. The technology of the present invention will be described in detail below with reference to the accompanying drawings and specific embodiments. Z n * means Z n Multiplicative group of invertible elements in Z, Z n is an integer set of n, user U i .

[0047] 1. figure 1 An implementation form of the overall model construction of the alliance chain encryption based on the bilinear mapping technology according to the present invention is shown, and the construction process is as follows:

[0048] Step 1: First ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a consortium chain encryption method based on bilinear mapping technology, including: (1) using the bilinear mapping technology to realize the construction of a consortium chain encryption system, including the generation and setting of public and private keys, encryption (2) Encrypt keys based on bilinear mapping technology, and key distribution is performed by key agreement; (3) Based on the above model and key distribution method, keys are implemented based on bilinear mapping technology Exchange, plaintext encryption and digital signature process. The bilinear mapping technology of the present invention is a commonly used encryption technology in cryptography. Combined with a hash function, a signature scheme with the characteristics of short signature, security and high efficiency can be constructed to encrypt and verify the signature, thereby improving the efficiency of encryption. , and then has the function of improving the overall work efficiency of the system.

Description

technical field [0001] The invention belongs to the technical field of blockchain, and in particular relates to a consortium chain encryption method based on bilinear mapping technology. Background technique [0002] Blockchain technology integrates various technologies and is an emerging technology nowadays. Encryption technology is one of the most important basic technologies of the blockchain, which ensures the security of communication and transactions on the blockchain. A consortium chain is a type of blockchain. The alliance chain uses PKI (Public Key Infrastructure) technology to ensure the security of the transaction process. PKI technology uses a combination of symmetric encryption and asymmetric encryption to encrypt and protect the communication process. Asymmetric encryption has high security, but usually has low computing performance and requires a large amount of data encryption and decryption. Therefore, asymmetric encryption methods are usually used to real...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08H04L9/40G06Q40/04
CPCH04L63/062H04L9/0838H04L9/3247H04L9/0825G06Q40/04H04L9/50
Inventor 黄步添罗春凤俞之贝周伟华刘振广陈建海
Owner HANGZHOU YUNXIANG NETWORK TECH