+

CN107147652A - A secure fusion authentication method for user multi-modal identity based on blockchain - Google Patents

A secure fusion authentication method for user multi-modal identity based on blockchain Download PDF

Info

Publication number
CN107147652A
CN107147652A CN201710352678.XA CN201710352678A CN107147652A CN 107147652 A CN107147652 A CN 107147652A CN 201710352678 A CN201710352678 A CN 201710352678A CN 107147652 A CN107147652 A CN 107147652A
Authority
CN
China
Prior art keywords
identity
user
server
identity characteristic
characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710352678.XA
Other languages
Chinese (zh)
Other versions
CN107147652B (en
Inventor
黄可
张小松
夏琦
陈瑞东
刘小垒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201710352678.XA priority Critical patent/CN107147652B/en
Publication of CN107147652A publication Critical patent/CN107147652A/en
Application granted granted Critical
Publication of CN107147652B publication Critical patent/CN107147652B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Collating Specific Patterns (AREA)

Abstract

本发明公开了一种基于区块链的用户多形态身份的安全融合认证方法,包括步骤:初始化、录入身份信息、身份特征提取、融合特征匹配。本发明特点在于:结合多形态的身份融合认证方法、区块链技术、公钥加密体制,提供一套完备的机制,来实现安全、高效、方便和可靠的身份认证。其中,用户可以自我选择身份信息进行录入,服务器对录入信息进行特征提取,并且通过解密区块链上的记录,对身份信息进行融合匹配,最终判断用户是否得到登录授权,本发明提出的方案能够实现安全、高效、方便和可靠的身份认证。

The invention discloses a block chain-based safe fusion authentication method of user multi-modal identity, comprising the steps of: initialization, entry of identity information, identity feature extraction, and fusion feature matching. The present invention is characterized in that it provides a complete set of mechanisms to realize safe, efficient, convenient and reliable identity authentication by combining multi-form identity fusion authentication methods, block chain technology, and public key encryption system. Among them, the user can self-select the identity information to enter, and the server performs feature extraction on the entered information, and performs fusion and matching on the identity information by decrypting the records on the block chain, and finally judges whether the user is authorized to log in. The scheme proposed by the present invention can Realize safe, efficient, convenient and reliable identity authentication.

Description

一种基于区块链的用户多形态身份的安全融合认证方法A secure fusion authentication method for user multi-modal identity based on blockchain

技术领域technical field

本发明涉及身份识别技术领域,尤其涉及一种基于区块链的用户多形态身份的安全融合认证方法。The present invention relates to the technical field of identity recognition, in particular to a secure fusion authentication method based on block chains for user multi-modal identities.

背景技术Background technique

目前,单一安全机制的身份认证技术带来的局限性也越来越明显,多种安全机制整合应用正在成为新的趋势。这是由于基于单一因子的认证技术(如账号密码登录),很容易存在被假冒、被窃取的风险,利用多重安全因子不仅提高系统的安全性,还可以提高认证的可靠性。即使用户缺失某一身份认证的要素,他仍然可以通过其他身份信息进行登录。此外,目前缺乏一套完善的机制,让用户可以自由的选择不同形态的身份信息以供验证,并且通过统一的模型存储和安、智能化的算法对上述信息整合、分析和匹配。最重要的是,目前身份特征信息集中式的存储在某一中心存在极大的安全隐患。一旦数据中心被攻破,用户的身份信息会遭到泄露和破坏,这是一种灾难性的后果。At present, the limitations brought by the identity authentication technology of a single security mechanism are becoming more and more obvious, and the integrated application of multiple security mechanisms is becoming a new trend. This is because the authentication technology based on a single factor (such as account password login) is prone to the risk of being counterfeited and stolen. The use of multiple security factors not only improves the security of the system, but also improves the reliability of authentication. Even if a user lacks an element of identity authentication, he can still log in with other identity information. In addition, there is currently a lack of a complete mechanism that allows users to freely choose different forms of identity information for verification, and integrate, analyze and match the above information through unified model storage and secure and intelligent algorithms. Most importantly, the current centralized storage of identity feature information in a certain center has great security risks. Once the data center is breached, user identity information will be leaked and destroyed, which is a disastrous consequence.

区块链是一种公开、透明的全民共识、共治和共享的新型基础设施,具有分布式数据存储、去中心化、不可篡改、可追溯、可信任等特征。虽然区块链的透明性与用户身份信息的隐私特互相冲突,但是我们可以结合公钥加密体制和区块链技术,实现用户身份信息的安全和可靠存储。通过将用户身份信息加密后记录在区块链中,结合公钥可搜索加密算法,我们能够实现用户身份信息安全、高效和可靠的存储和使用。Blockchain is an open and transparent public consensus, co-governance and sharing new infrastructure, which has the characteristics of distributed data storage, decentralization, non-tamperable, traceable and trustworthy. Although the transparency of the blockchain conflicts with the privacy of user identity information, we can combine the public key encryption system and blockchain technology to achieve safe and reliable storage of user identity information. By encrypting user identity information and recording it in the blockchain, combined with the public key searchable encryption algorithm, we can achieve safe, efficient and reliable storage and use of user identity information.

发明内容Contents of the invention

本发明的目的在于:针对上述现有单一因子认证技术的认证要素单一,很容易出现假冒、用户信息被窃取,从而导致用户认证中的安全性、可靠性低的问题,本发明提供一种基于区块链的用户多形态身份的安全融合认证方法。The purpose of the present invention is to: aim at the above-mentioned existing single-factor authentication technology with a single authentication element, which is prone to counterfeiting and user information being stolen, resulting in low security and reliability in user authentication. The present invention provides a method based on A secure fusion authentication method for multi-modal identity of blockchain users.

本发明采用的技术方案如下:The technical scheme that the present invention adopts is as follows:

一种基于区块链的用户多形态身份的安全融合认证方法,包括以下步骤:A blockchain-based security fusion authentication method for user multi-modal identity, comprising the following steps:

(1)初始化,生成服务器和可信节点的公钥和私钥,生成服务器的公开参数和服务器的公开算法,其中,公开参数包括:所支持的不同形态身份的数量(m)、每一个身份形态的特征分量的数量(n)、身份特征权值占比、相似度阈值等,公开算法包括:哈希函数、矩阵变换算法、身份特征提取算法、身份特征匹配算法等,具体含义在叙述过程中有描述;(1) Initialize, generate the public key and private key of the server and trusted nodes, generate the public parameters of the server and the public algorithm of the server, where the public parameters include: the number of identities supported in different forms (m), each identity The number (n) of morphological feature components, the proportion of identity feature weights, similarity threshold, etc., the public algorithms include: hash function, matrix transformation algorithm, identity feature extraction algorithm, identity feature matching algorithm, etc. The specific meaning is described in the process is described in;

(2)用户向服务器输入用户账号和不同形态的身份信息,不同形态的身份信息中包括用户身份名称;(2) The user inputs the user account and different forms of identity information to the server, and the different forms of identity information include the user's identity name;

接着服务器对用户输入的不同形态的身份信息分别进行特征提取,得到身份特征,将提取到的每个身份特征通过公开的哈希函数计算得到统一长度的身份特征向量,再通过公开的矩阵变换算法对身份特征向量进行矩阵变换,得到身份特征矩阵,计算身份特征矩阵的根;Then the server extracts the features of different forms of identity information input by the user to obtain identity features, calculates each extracted identity feature through a public hash function to obtain a uniform length identity feature vector, and then uses the public matrix transformation algorithm Perform matrix transformation on the identity feature vector to obtain the identity feature matrix, and calculate the root of the identity feature matrix;

(3)基于典型的公钥加密算法,对步骤(2)中的身份特征矩阵进行加密,得到身份特征矩阵密文;(3) Based on a typical public key encryption algorithm, the identity feature matrix in step (2) is encrypted to obtain the identity feature matrix ciphertext;

基于典型的公钥可搜索加密算法,将用户身份名称作为对象,使用服务器的公钥对用户身份名称进行加密并得到可搜索密文;Based on a typical public key searchable encryption algorithm, the user identity name is used as an object, and the server's public key is used to encrypt the user identity name and obtain a searchable ciphertext;

(4)服务器分别对用户账号、身份特征矩阵的根、特征矩阵密文和可搜索密文用进行私钥签名,并发送给可信节点;(4) The server signs the user account, the root of the identity feature matrix, the feature matrix ciphertext, and the searchable ciphertext with a private key, and sends them to the trusted node;

(5)可信节点根据用户账号在区块链上检索,如果用户首次登录,可信节点为用户颁发公钥,创建创始区块记录用户不同形态的身份信息并将用户账号、用户公钥、时间戳、特征矩阵的根、特征矩阵密文和可搜索密文写入创始区块,并且在网络中广播;首次登录用户的不同形态的身份信息即原始身份信息,原始身份信息变换后得到原始身份特征矩阵,原始身份特征矩阵的密文即原始身份特征矩阵密文;否则,执行步骤(6);(5) The trusted node searches the blockchain according to the user account. If the user logs in for the first time, the trusted node will issue a public key for the user, create a creation block to record the user's identity information in different forms and store the user account, user public key, The time stamp, the root of the feature matrix, the ciphertext of the feature matrix and the searchable ciphertext are written into the founding block and broadcast in the network; the identity information of different forms of the first login user is the original identity information, and the original identity information is transformed to obtain the original Identity feature matrix, the ciphertext of the original identity feature matrix is the original identity feature matrix ciphertext; otherwise, perform step (6);

(6)对用户不同形态的身份信息进行融合特征匹配和相似度判断。(6) Perform fusion feature matching and similarity judgment on different forms of identity information of users.

所述的一种基于区块链的用户多形态身份的安全融合认证方法,步骤(1)中,生成的公开参数包括:身份特征权值占比、相似度阈值、服务器所支持的不同形态身份的数量、每一个身份形态的特征分量的数量,生成的公开算法包括:公开的哈希算法、身份特征提取算法、身份特征匹配算法。In the described security fusion authentication method based on blockchain-based user multi-modal identity, in step (1), the public parameters generated include: identity feature weight ratio, similarity threshold, different forms of identity supported by the server The number of features, the number of feature components of each identity form, and the public algorithms generated include: public hash algorithms, identity feature extraction algorithms, and identity feature matching algorithms.

所述的一种基于区块链的用户多形态身份的安全融合认证方法,步骤(2)中,特征提取和特征变换具体步骤为:Described a kind of security fusion authentication method based on block chain user's polymorphic identity, in step (2), feature extraction and feature transformation specific steps are:

(21)服务器针对用户输入的不同形态的身份信息,依照步骤(1)生成的公开算法,提取出身份特征,使用公开的哈希算法计算提取出的每一个身份特征,得到所计算的身份特征对应的特征向量,所计算的身份特征对应的特征向量由n个分量组成;(21) The server extracts identity features according to the public algorithm generated in step (1) for different forms of identity information input by the user, and uses the public hash algorithm to calculate each extracted identity feature to obtain the calculated identity feature The corresponding eigenvector, the eigenvector corresponding to the calculated identity feature consists of n components;

(22)服务器将步骤(21)得到的统一格式的特征向量按照公开的矩阵变换算法组成特征矩阵。(22) The server forms the feature vectors in the unified format obtained in step (21) into a feature matrix according to the disclosed matrix transformation algorithm.

所述的一种基于区块链的用户多形态身份的安全融合认证方法,步骤(6)的具体步骤为:Described a kind of safe fusion authentication method based on block chain user's polymorphic identity, the specific steps of step (6) are:

(61)可信节点将原始的身份特征矩阵密文发送给服务器,服务器用自己的私钥解密后得到用户原始身份特征矩阵,并从用户原始身份特征矩阵中一一提取出用户的原始身份特征向量A1、…、Am;其中,m代表用户不同形态身份信息的数量;(61) The trusted node sends the original identity feature matrix ciphertext to the server, and the server decrypts it with its own private key to obtain the user's original identity feature matrix, and extracts the user's original identity feature matrix from the user's original identity feature matrix one by one Vectors A 1 ,..., A m ; among them, m represents the number of user identity information in different forms;

(62)服务器从用户录入的身份信息提取到身份特征向量A′1、…、A′m,其中,m代表用户不同形态身份信息的数量;(62) The server extracts identity feature vectors A' 1 , ..., A' m from the identity information entered by the user, where m represents the number of different forms of identity information of the user;

(63)服务器根据公开的特征匹配算法Match(),比对步骤(62)、步骤(63)中每一个身份特征的相似度,得到每一个身份特征的比对相似度,每一个身份特征的比对相似度计算公式为:(63) The server compares the similarity of each identity feature in step (62) and step (63) according to the public feature matching algorithm Match(), and obtains the comparison similarity of each identity feature, and the comparison similarity of each identity feature The formula for calculating similarity is:

r1=Match(A1、A′1)、…、rm=Match(Am、A′m);r 1 =Match(A 1 ,A' 1 ),...,r m =Match(A m ,A' m );

其中r1…rm为每一个身份特征的比对相似度;Where r 1 ... r m is the comparison similarity of each identity feature;

(64)服务器计算所有身份特征融合匹配相似度,融合特征匹配相似度计算公式为:(64) The server calculates the fusion and matching similarity of all identity features, and the calculation formula for the fusion matching similarity is:

R=ω1r1+…+ωnrmR=ω 1 r 1 +…+ω n r m ,

其中,ω1,…,ωn代表不同形态身份特征的权值占比;Among them, ω 1 ,...,ω n represent the weight ratio of different morphological identity features;

(65)服务器将R与给定的相似度阈值V比较,若R>V,则认证成功,授权登录,否则,返回失败标识符并结束。(65) The server compares R with a given similarity threshold V. If R>V, the authentication is successful and the login is authorized. Otherwise, the failure identifier is returned and the end is completed.

综上所述,由于采用了上述技术方案,本发明的有益效果是:In summary, owing to adopting above-mentioned technical scheme, the beneficial effect of the present invention is:

一、本发明的方案中,基于区块链公开、透明的全民共识、共治和共享的新型基础设施,具有分布式数据存储、去中心化、不可篡改、可追溯、可信任等特征,通过将用户身份信息加密后记录在区块链中,结合公钥可搜索加密算法,实现了用户身份信息安全、高效和可靠的存储和使用。1. In the solution of the present invention, a new type of infrastructure based on open and transparent public consensus, co-governance and sharing based on blockchain has the characteristics of distributed data storage, decentralization, non-tamperable, traceable, and trustworthy, etc., through The user identity information is encrypted and recorded in the blockchain, and combined with the public key searchable encryption algorithm, the user identity information is stored and used safely, efficiently and reliably.

二、由于采用多种形态的身份信息对客户进行认证,因此,不用担心某一身份信息缺失而造成的无法认证的问题。2. Since various forms of identity information are used to authenticate customers, there is no need to worry about the problem of inability to authenticate due to the lack of certain identity information.

三、由于本方案中,区块链中,可以记录同一个用户的多个不同形态身份信息,因此用户可以自由地选择不同形态的身份信息以供验证,并且通过统一的模型存储和安、智能化的算法对上述信息整合、分析和匹配。3. In this scheme, multiple different forms of identity information of the same user can be recorded in the blockchain, so users can freely choose different forms of identity information for verification, and store and secure and intelligent through a unified model The algorithm integrates, analyzes and matches the above information.

附图说明Description of drawings

图1是本发明一种基于区块链的用户多形态身份的安全融合认证方法的流程图;Fig. 1 is a flow chart of a security fusion authentication method based on blockchain-based user multi-modal identity in the present invention;

图2是为本发明中身份特征提取和特征矩阵的说明图;Fig. 2 is an explanatory diagram for identity feature extraction and feature matrix in the present invention;

图3是本为发明中记录身份特征信息的区块链结构图;Fig. 3 is a blockchain structure diagram for recording identity feature information in this invention;

具体实施方式detailed description

本说明书中公开的所有特征,除了互相排斥的特征和/或步骤以外,均可以以任何方式组合。All the features disclosed in this specification, except mutually exclusive features and/or steps, can be combined in any way.

下面结合图1、图2、图3对本发明作详细说明。The present invention will be described in detail below in conjunction with FIG. 1 , FIG. 2 and FIG. 3 .

一种基于区块链的用户多形态身份的安全融合认证方法,包括如下步骤:A blockchain-based security fusion authentication method for user multi-modal identity, comprising the following steps:

初始化,生成服务器和可信节点的公钥和私钥,生成服务器的公开参数和服务器的公开算法,其中公开参数包括:身份特征权值占比、相似度阈值、所支持的不同形态身份的数量、每一个身份形态的特征分量的数量,生成的公开算法包括:公开的哈希算法、身份特征提取算法、身份特征匹配算法。相似度阈值用于决定用户登录成功需要达到的相似度阈值,其中,身份特征权值占比为不同形态身份信息在验证过程中所占百分比,可以根据实际应用环境自由设定;Initialize, generate the public key and private key of the server and trusted nodes, generate the public parameters of the server and the public algorithm of the server, where the public parameters include: the proportion of identity feature weight, similarity threshold, and the number of different forms of identities supported , The number of feature components of each identity form, and the generated public algorithms include: public hash algorithm, identity feature extraction algorithm, and identity feature matching algorithm. The similarity threshold is used to determine the similarity threshold that needs to be achieved for the user to log in successfully. Among them, the identity feature weight ratio is the percentage of different forms of identity information in the verification process, which can be freely set according to the actual application environment;

用户通过安全途径(包括:安全信道,安全的设备,如:POS机等)将用户账号和(一种或多种形态的)用户身份信息输入给服务器,用户身份信息包括但不限于:密码、指纹、虹膜、人脸、声源。The user enters the user account and (one or more forms) user identity information into the server through a secure way (including: secure channel, secure equipment, such as: POS machine, etc.), user identity information includes but not limited to: password, Fingerprint, iris, face, sound source.

服务器针对用户输入的不同形态的身份信息,分别根据相应的公开算法,对不同形态的身份信息进行身份特征提取,并将每种不同形态的身份信息提取到的身份特征按照公开的哈希算法统一计算,得到由n个特征分量组成的身份特征向量;不同形态的身份信息中包括用户身份名称;For different forms of identity information input by the user, the server extracts the identity features of different forms of identity information according to the corresponding public algorithms, and unifies the identity features extracted from each different form of identity information according to the public hash algorithm Calculate to obtain an identity feature vector composed of n feature components; different forms of identity information include user identity names;

例如,对于人脸图像身份信息,记录人脸器官分布的坐标,并计算得到由n个分量组成身份特征向量,如:A1={a1,1,…,a1,n},这里,a1,i代表一个人脸特征向量里的特征分量;For example, for the identity information of the face image, record the coordinates of the distribution of the face organs, and calculate the identity feature vector composed of n components, such as: A 1 ={a 1,1 ,...,a 1,n }, here, a 1, i represents a feature component in a face feature vector;

例如,对于常规密码,根据公开的哈希算法得到由n个密码分量组成的设法特征向量,如:A2={a2,1,…,a2,n},此外,对于其他不同形态的身份信息,如虹膜、指纹等等,方法类似;For example, for conventional passwords, according to the public hash algorithm, a hash feature vector composed of n password components is obtained, such as: A 2 ={a 2,1 ,...,a 2,n }, in addition, for other different forms of Identity information, such as iris, fingerprints, etc., the method is similar;

服务器将这些特征向量按照公开的矩阵变换算法得到身份特征矩阵,并计算当前身份特征矩阵的根,身份特征矩阵是一个由用户多个身份特征向量组成的矩阵;The server uses these feature vectors to obtain the identity feature matrix according to the public matrix transformation algorithm, and calculates the root of the current identity feature matrix. The identity feature matrix is a matrix composed of multiple identity feature vectors of the user;

需要指出的是,我们在初始化过程通过公开参数提前设定用户具有m个不同形态身份,每一个形态的身份由一个具有n个特征分量的身份特征向量组成,我们可以简单的认为:身份特征矩阵是一个m×n的矩阵,其中每一个元素代表一种形态身份信息对应的特征分量;It should be pointed out that we pre-set the user to have m different forms of identities through public parameters in the initialization process, and each form of identity is composed of an identity feature vector with n feature components. We can simply think of it as: identity feature matrix is an m×n matrix, where each element represents a feature component corresponding to a form of identity information;

接着,服务器基于公钥加密算法,用自己的公钥加密用户身份特征矩阵,得到身份特征矩阵密文;公钥加密算法包括但不限于著名的RSA公钥加密算法。RSA公钥加密算法的特点是:发送者采用接收者的公钥进行加密,密文在公开渠道中传输,接收者在收到密文后采用自己的密钥进行解密。Then, based on the public key encryption algorithm, the server encrypts the user identity feature matrix with its own public key to obtain the identity feature matrix ciphertext; the public key encryption algorithm includes but is not limited to the well-known RSA public key encryption algorithm. The characteristics of the RSA public key encryption algorithm are: the sender uses the receiver's public key to encrypt, the ciphertext is transmitted in the public channel, and the receiver uses his own key to decrypt the ciphertext after receiving it.

服务器又基于公钥可搜索加密算法,将用户身份名称作为关键字,使用自己的公钥对其进行加密并得到关键字可搜索密文;公钥可搜索加密算法包括但不限于Boneh等人提出的PEKS公钥可搜索加密算法。PEKS公钥可搜索加密算法是将用户身份名称作为对象,使用自己的公钥对用户身份名称进行加密并得到可搜索密文;这里,公钥可搜索加密算法的特点是:将关键字用接受者的公钥加密后和密文一起发送给服务器存储,接受者使用自己的公钥和关键字生成陷门发送给服务器,服务器通过陷门匹配到包含该关键字的密文,并且发送回接受者;Based on the public key searchable encryption algorithm, the server uses the user's identity name as a keyword, encrypts it with its own public key and obtains the keyword searchable ciphertext; the public key searchable encryption algorithm includes but is not limited to Boneh et al. The PEKS public key searchable encryption algorithm. The PEKS public key searchable encryption algorithm takes the user identity name as an object, encrypts the user identity name with its own public key and obtains searchable ciphertext; here, the characteristics of the public key searchable encryption algorithm are: the keyword is used to accept The recipient's public key is encrypted and sent to the server together with the ciphertext for storage. The recipient uses his own public key and keyword to generate a trapdoor and sends it to the server. The server matches the ciphertext containing the keyword through the trapdoor and sends back the acceptance By;

服务器分别将用户账号、当前身份特征矩阵的根、身份特征矩阵密文和可搜索密文进行私钥签名后一起发送给可信节点,由可信节点负责记录到区块链中;The server respectively signs the user account, the root of the current identity feature matrix, the ciphertext of the identity feature matrix and the searchable ciphertext to the trusted node, and the trusted node is responsible for recording it into the blockchain;

需要注意的是,我们采用公钥算法对用户身份特征矩阵加密后记录在区块链上,是为了保护用户各种形态的身份信息不得到泄露,而采用公钥可搜索加密算法是为了把用户身份名称的密文作为用户特征矩阵密文的标识符,以便于查询,很显然,将用户身份名称的明文记录在区块链上容易泄露隐私,而采用公钥可搜索加密算法,可以让可信节点和其他所有用户在不知道用户身份名称的明文是什么的情况下,安全和高效的查询和传输记录在区块链上的身份信息,由此一来,用户身份信息得到了全方位的隐私保护,同时又便于可检索;It should be noted that we use the public key algorithm to encrypt the user identity feature matrix and record it on the blockchain, in order to protect the various forms of user identity information from being leaked, and the use of the public key searchable encryption algorithm is to The ciphertext of the identity name is used as the identifier of the ciphertext of the user feature matrix for easy query. Obviously, recording the plaintext of the user identity name on the blockchain is easy to leak privacy, and using the public key searchable encryption algorithm can make the Trust nodes and all other users can safely and efficiently query and transmit the identity information recorded on the blockchain without knowing what the plaintext of the user identity name is. Privacy-preserving, yet easily retrievable;

接着,可信节点根据服务器发送来的身份特征矩阵密文,根据用户的不同情况执行如下:Then, according to the identity feature matrix ciphertext sent by the server, the trusted node performs the following according to different situations of the user:

可信节点根据用户账号在区块链上进行检索,如果该用户首次登陆,即不存在任何记录该用户身份特征的区块链,可信节点首先为用户颁发公钥,同时创建创始区块(第一个区块),用于记录用户账号、创建时间等初始信息,接着,可信节点依次将用户用户多形态身份信息记录在一条区块链中,并将用户账号、用户公钥、特征矩阵的根、时间戳、特征矩阵密文和可搜索密文写入创始区块,并且在网络中广播;首次登录用户的不同形态的身份信息即原始身份信息,原始身份信息变换后得到原始身份特征矩阵,原始身份特征矩阵的密文即原始身份特征矩阵密文;The trusted node searches the blockchain according to the user account. If the user logs in for the first time, that is, there is no blockchain recording the user's identity characteristics, the trusted node first issues a public key to the user and creates a genesis block ( The first block) is used to record initial information such as user account number and creation time. Then, the trusted node records the multi-modal identity information of the user in a block chain in turn, and records the user account number, user public key, feature The root of the matrix, timestamp, feature matrix ciphertext and searchable ciphertext are written into the founding block and broadcast in the network; the identity information of different forms of the first login user is the original identity information, and the original identity information is transformed to obtain the original identity Feature matrix, the ciphertext of the original identity feature matrix is the ciphertext of the original identity feature matrix;

如果用户是已经注册的用户,则已经存在一条记录其身份特征的区块链。服务器基于公钥可搜索加密算法,用自己的私钥和用户身份名称,生成可搜索陷门,并且发送给可信节点,可信节点根据陷门进行检索,若检索不到到包含该新的用户身份名称的区块,则创建一个区块,并且将用户账号、用户公钥、最新的特征矩阵的根、时间戳、最新的特征矩阵密文、和身份名称的可搜索密文写入新的区块中,并且在网络中广播;If the user is already registered, there is already a blockchain recording his identity. Based on the public key searchable encryption algorithm, the server uses its own private key and user identity name to generate a searchable trapdoor and send it to the trusted node. The trusted node searches according to the trapdoor. If the user’s identity name is a block, create a block, and write the user account, user public key, the root of the latest feature matrix, timestamp, the latest feature matrix ciphertext, and the searchable ciphertext of the identity name into the new in the block and broadcast in the network;

否则,可信节点检索到的包含该用户身份名称信息的区块,并将该区块上记录的最新的身份特征矩阵密文返回给服务器,服务器用自己的私钥解密矩阵密文,并且从中提取出用户不同形态的原始身份特征向量:A1、…、Am,这里原始的身份特征即用户在第一次登陆时录入的身份特征;Otherwise, the trusted node retrieves the block containing the user's identity name information, and returns the latest identity feature matrix ciphertext recorded on the block to the server, and the server uses its own private key to decrypt the matrix ciphertext, and from it Extract the original identity feature vectors of different forms of the user: A 1 , ..., A m , where the original identity features are the identity features entered by the user when logging in for the first time;

服务器从用户录入的身份信息提取到身份特征向量A′1、…、A′m,服务器根据公开的特征匹配算法Match(),分别输入提取到的身份特征向量A′1、…、A′m和原始身份向量A1、…、Am,这里m代表不同形态身份的数量,最终计算得到每一个身份特征的比对相似度,每一个身份特征的相似度计算公式如下:The server extracts the identity feature vectors A′ 1 ,…, A′ m from the identity information entered by the user, and the server inputs the extracted identity feature vectors A′ 1 ,…, A′ m respectively according to the public feature matching algorithm Match() and the original identity vectors A 1 , ..., A m , where m represents the number of identities in different forms, and finally calculate the comparison similarity of each identity feature. The similarity calculation formula of each identity feature is as follows:

r1=Match(A1、A′1)、…、rm=Match(Am、A m);r 1 =Match(A 1 ,A' 1 ),...,r m =Match(A m ,A ' m );

其中,r1…rm为每一个身份特征的比对相似度。Among them, r 1 ... r m is the comparison similarity of each identity feature.

最终,服务器就公开的特征匹配算法,将用户和解密后的可信节点发回的身份特征进行比对,并计算得到匹配相似度:Finally, the server compares the identity features sent back by the user and the decrypted trusted node according to the public feature matching algorithm, and calculates the matching similarity:

R=ω1r1+…+ωnrnR=ω 1 r 1 +…+ω n r n ,

其中,ω1,…,ωn代表相应身份特征的权值占比(ω1,…,ωn根据公开参数进行设定),服务器将R与相似度阈值V比较,若R>V,则认证成功,授权登录,否则,返回失败标识符并结束。Among them, ω 1 ,…,ω n represent the weight ratio of the corresponding identity features (ω 1 ,…,ω n are set according to public parameters), the server compares R with the similarity threshold V, if R>V, then If the authentication is successful, the login is authorized, otherwise, return the failure identifier and end.

我们通过多形态身份的融合认证方法、区块链技术和公钥加密算法,设计了一套完整的体制,来实现安全、高效、方便和可靠的用户身份认证。Through the fusion authentication method of multi-modal identity, blockchain technology and public key encryption algorithm, we have designed a complete system to achieve safe, efficient, convenient and reliable user identity authentication.

以上所述,仅为本发明的具体实施方式,但本发明的保护范围并不局限于此,任何属于本领域的技术人员在本发明揭露的技术范围内,可轻易想到的变化或替换,都应涵盖在本发明的保护范围之内。The above is only a specific embodiment of the present invention, but the scope of protection of the present invention is not limited thereto. Any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope disclosed in the present invention are all Should be covered within the protection scope of the present invention.

Claims (4)

1. the safety fusion authentication method of the polymorphic identity of a kind of user based on block chain, it is characterised in that including following step Suddenly:
(1) initialize, the public key and private key of generation server and trusted node, generate the open parameter and server of server Public algorithm;
(2) identity information of user account and different shape is inputted with user orientation server, the identity information of different shape includes User identity title;
Then the identity information for the different shape that server is inputted to user carries out feature extraction respectively, obtains identity characteristic, will The each identity characteristic extracted calculates the identity characteristic vector for obtaining uniform length by disclosed hash function, then passes through public affairs The matrixing algorithm opened carries out matrixing to identity characteristic vector, obtains identity characteristic matrix, calculates identity characteristic matrix Root;
(3) typical public key encryption algorithm is based on, the identity characteristic matrix in step (2) is encrypted, identity characteristic is obtained Matrix ciphertext;
AES can search for based on typical public key, by user identity name be referred to as object, using server public key to Family identity name is encrypted and obtains searchable cryptograph;
(4) server is respectively to user account, the root of identity characteristic matrix, eigenmatrix ciphertext and searchable cryptograph with carrying out private Key is signed, and is sent to trusted node;
(5) trusted node is retrieved according to user account on block chain, if user first logs into, trusted node is issued for user Public key, creates the identity information of original block record user's different shape and by user account, client public key, timestamp, feature Root, eigenmatrix ciphertext and the original block of searchable cryptograph write-in of matrix, and broadcast in a network;First log into user's The identity information of different shape is original identity information, and original identity characteristic matrix is obtained after original identity information conversion, original The ciphertext of identity characteristic matrix is original identity characteristic matrix ciphertext;Otherwise, step (6) is performed;
(6) fusion feature matching is carried out to the identity information of user's different shape and similarity judges.
2. a kind of safety fusion authentication method of the polymorphic identity of user based on block chain according to claim 1, its It is characterised by, in step (1), the open parameter of generation includes:Identity characteristic weights accounting, similarity threshold, server are propped up The quantity of the different shape identity held, the quantity of the characteristic component of each identity form, the public algorithm of generation includes:It is public Hash algorithm, identity characteristic extraction algorithm, the identity characteristic matching algorithm opened.
3. a kind of safety fusion authentication method of the polymorphic identity of user based on block chain as claimed in claim 2, it is special Levy and be, in step (2), feature extraction and eigentransformation are concretely comprised the following steps:
(21) identity information for the different shape that server is inputted for user, the public algorithm generated according to step (1) is extracted Go out identity characteristic, each identity characteristic extracted is calculated using disclosed hash algorithm, calculated identity characteristic is obtained Corresponding characteristic vector, the corresponding characteristic vector of identity characteristic calculated is made up of n component;
(22) characteristic vector for the unified form that server obtains step (21) constitutes special according to disclosed matrixing algorithm Levy matrix.
4. a kind of safety fusion authentication method of the polymorphic identity of user based on block chain as claimed in claim 1, it is special Levy and be, step (6) are concretely comprised the following steps:
(61) original identity characteristic matrix ciphertext is sent to server by trusted node, after server is decrypted with the private key of oneself The original identity characteristic matrix of user is obtained, and it is special to extract from the original identity characteristic matrix of user the original identity of user one by one Levy vectorial A1、…、Am;Wherein, m represents the quantity of user's different shape identity information;
(62) server extracts identity characteristic vector A ' from the identity information of user's typing1、…、A′m, wherein, m represents user The quantity of different shape identity information;
(63) server compares each identity in step (62), step (63) according to disclosed Feature Correspondence Algorithm Match () The similarity of feature, obtains the alignment similarity of each identity characteristic, and the alignment similarity of each identity characteristic calculates public Formula is:
r1=Match (A1、A′1)、…、rm=Match (Am、A′m);
Wherein r1…rmFor the alignment similarity of each identity characteristic;
(64) server calculates all identity characteristic fusion matching similarities, and fusion feature matching similarity calculation formula is:
R=ω1r1+…+ωnrm,
Wherein, ω1,…,ωnRepresent the weights accounting of different shape identity characteristic;
(65) server is compared R with given similarity threshold V, if R>V, then certification success, authorizes and logs in, otherwise, returns Failure identifier simultaneously terminates.
CN201710352678.XA 2017-05-18 2017-05-18 A secure fusion authentication method for user multi-modal identity based on blockchain Active CN107147652B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710352678.XA CN107147652B (en) 2017-05-18 2017-05-18 A secure fusion authentication method for user multi-modal identity based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710352678.XA CN107147652B (en) 2017-05-18 2017-05-18 A secure fusion authentication method for user multi-modal identity based on blockchain

Publications (2)

Publication Number Publication Date
CN107147652A true CN107147652A (en) 2017-09-08
CN107147652B CN107147652B (en) 2019-08-09

Family

ID=59777759

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710352678.XA Active CN107147652B (en) 2017-05-18 2017-05-18 A secure fusion authentication method for user multi-modal identity based on blockchain

Country Status (1)

Country Link
CN (1) CN107147652B (en)

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107786547A (en) * 2017-09-30 2018-03-09 厦门快商通信息技术有限公司 A kind of auth method based on block chain, device and computer-readable recording medium
CN107786639A (en) * 2017-09-28 2018-03-09 山东鲁能智能技术有限公司 A kind of electric automobile networked system and its method of work based on block chain technology
CN108766509A (en) * 2018-05-16 2018-11-06 中国联合网络通信集团有限公司 Authenticating method, device, terminal based on block chain technology and storage medium
CN108805573A (en) * 2018-04-21 2018-11-13 深圳市元征科技股份有限公司 A kind of Information Authentication method, server and storage medium
CN108809952A (en) * 2018-05-22 2018-11-13 隆正信息科技有限公司 Object authentication method and system based on more mark general unique keepsake chains of sectional
CN108882230A (en) * 2018-06-01 2018-11-23 中国联合网络通信集团有限公司 Message registration management method, apparatus and system
CN108881287A (en) * 2018-07-18 2018-11-23 电子科技大学 A kind of Internet of things node identity identifying method based on block chain
CN108920908A (en) * 2018-06-28 2018-11-30 北京京东尚科信息技术有限公司 Date storage method, device and computer readable storage medium
CN108921555A (en) * 2018-06-30 2018-11-30 江苏恒宝智能系统技术有限公司 A kind of auth method and device combined based on block chain and iris recognition
CN108933667A (en) * 2018-05-03 2018-12-04 深圳市京兰健康医疗大数据有限公司 A kind of management method and management system of the public key certificate based on block chain
CN109039655A (en) * 2018-09-13 2018-12-18 全链通有限公司 Real name identity identifying method and device, identity block chain based on block chain
CN109063627A (en) * 2018-07-27 2018-12-21 文志 Digital Human artificial intelligence identity unique identification control method
CN109145543A (en) * 2018-09-03 2019-01-04 湖北文理学院 A kind of identity identifying method
CN109145703A (en) * 2018-06-14 2019-01-04 北京凌云智链科技有限公司 Intelligent identification method, device, equipment and medium
CN109194487A (en) * 2018-09-13 2019-01-11 全链通有限公司 Construction method and system are traded or communicated to my real name based on block chain
CN109495478A (en) * 2018-11-20 2019-03-19 桂林电子科技大学 A kind of distributed security communication means and system based on block chain
CN110365626A (en) * 2018-04-09 2019-10-22 厦门雅迅网络股份有限公司 The user in anticollision library logs in safety certifying method, terminal device and storage medium
CN110569658A (en) * 2019-09-12 2019-12-13 腾讯科技(深圳)有限公司 User information processing method, device, electronic equipment and storage medium based on block chain network
CN110674180A (en) * 2019-09-26 2020-01-10 腾讯科技(深圳)有限公司 Business data processing method and device and readable storage medium
CN111131444A (en) * 2019-12-23 2020-05-08 广州公评科技有限公司 Network course processing system based on block chain technology
CN111353903A (en) * 2020-02-26 2020-06-30 广东工业大学 Network identity protection method and device, electronic equipment and storage medium
CN111680327A (en) * 2020-06-10 2020-09-18 中国银行股份有限公司 Block chain-based customer information integration method, device, equipment and storage medium
CN112465635A (en) * 2019-09-09 2021-03-09 上海旺链信息科技有限公司 Block chain public encryption algorithm processing method, block chain wallet and storage medium
CN113162768A (en) * 2021-02-24 2021-07-23 北京科技大学 Intelligent Internet of things equipment authentication method and system based on block chain
CN113449336A (en) * 2021-06-11 2021-09-28 电子科技大学 Shared data processing method based on safe multi-party privacy protection in block chain
CN117494221A (en) * 2024-01-03 2024-02-02 齐鲁工业大学(山东省科学院) Internet of things data sharing method for block chain assisted search
CN119603075A (en) * 2025-02-05 2025-03-11 杭州宇泛智能科技股份有限公司 Multi-factor security authentication method and device based on AI adaptive recognition and blockchain

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084070B (en) * 2019-04-21 2020-12-29 中国科学院信息工程研究所 A method for identity construction and traceability of cross-domain heterogeneous data in manufacturing based on blockchain

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794266A (en) * 2005-12-31 2006-06-28 清华大学 Biocharacteristics fusioned identity distinguishing and identification method
CN101170405A (en) * 2006-10-25 2008-04-30 富士通株式会社 Biometric authentication method
CN101931947A (en) * 2010-07-28 2010-12-29 南京航空航天大学 WSN data security processing method based on searchable ciphertext
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
US20160330035A1 (en) * 2015-05-05 2016-11-10 ShoCard, Inc. User Identification Management System and Method
CN106534160A (en) * 2016-12-02 2017-03-22 江苏通付盾科技有限公司 Identity authentication method and system based on block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1794266A (en) * 2005-12-31 2006-06-28 清华大学 Biocharacteristics fusioned identity distinguishing and identification method
CN101170405A (en) * 2006-10-25 2008-04-30 富士通株式会社 Biometric authentication method
CN101931947A (en) * 2010-07-28 2010-12-29 南京航空航天大学 WSN data security processing method based on searchable ciphertext
US20160330035A1 (en) * 2015-05-05 2016-11-10 ShoCard, Inc. User Identification Management System and Method
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN106534160A (en) * 2016-12-02 2017-03-22 江苏通付盾科技有限公司 Identity authentication method and system based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
庹小忠: "区块链在身份认证中的应用", 《科技经济导刊》 *

Cited By (39)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107786639A (en) * 2017-09-28 2018-03-09 山东鲁能智能技术有限公司 A kind of electric automobile networked system and its method of work based on block chain technology
CN107786547A (en) * 2017-09-30 2018-03-09 厦门快商通信息技术有限公司 A kind of auth method based on block chain, device and computer-readable recording medium
CN110365626A (en) * 2018-04-09 2019-10-22 厦门雅迅网络股份有限公司 The user in anticollision library logs in safety certifying method, terminal device and storage medium
CN110365626B (en) * 2018-04-09 2022-12-06 厦门雅迅网络股份有限公司 User login security authentication method for anti-collision library, terminal equipment and storage medium
CN108805573A (en) * 2018-04-21 2018-11-13 深圳市元征科技股份有限公司 A kind of Information Authentication method, server and storage medium
CN108805573B (en) * 2018-04-21 2022-04-15 深圳市元征科技股份有限公司 Information verification method, server and storage medium
CN108933667B (en) * 2018-05-03 2021-08-10 深圳市京兰健康医疗大数据有限公司 Management method and management system of public key certificate based on block chain
CN108933667A (en) * 2018-05-03 2018-12-04 深圳市京兰健康医疗大数据有限公司 A kind of management method and management system of the public key certificate based on block chain
CN108766509A (en) * 2018-05-16 2018-11-06 中国联合网络通信集团有限公司 Authenticating method, device, terminal based on block chain technology and storage medium
CN108809952A (en) * 2018-05-22 2018-11-13 隆正信息科技有限公司 Object authentication method and system based on more mark general unique keepsake chains of sectional
CN108882230A (en) * 2018-06-01 2018-11-23 中国联合网络通信集团有限公司 Message registration management method, apparatus and system
CN109145703A (en) * 2018-06-14 2019-01-04 北京凌云智链科技有限公司 Intelligent identification method, device, equipment and medium
CN108920908A (en) * 2018-06-28 2018-11-30 北京京东尚科信息技术有限公司 Date storage method, device and computer readable storage medium
CN108921555A (en) * 2018-06-30 2018-11-30 江苏恒宝智能系统技术有限公司 A kind of auth method and device combined based on block chain and iris recognition
CN108881287A (en) * 2018-07-18 2018-11-23 电子科技大学 A kind of Internet of things node identity identifying method based on block chain
CN109063627A (en) * 2018-07-27 2018-12-21 文志 Digital Human artificial intelligence identity unique identification control method
CN109145543A (en) * 2018-09-03 2019-01-04 湖北文理学院 A kind of identity identifying method
CN109145543B (en) * 2018-09-03 2020-12-04 湖北文理学院 an identity authentication method
CN109194487A (en) * 2018-09-13 2019-01-11 全链通有限公司 Construction method and system are traded or communicated to my real name based on block chain
CN109039655A (en) * 2018-09-13 2018-12-18 全链通有限公司 Real name identity identifying method and device, identity block chain based on block chain
CN109495478A (en) * 2018-11-20 2019-03-19 桂林电子科技大学 A kind of distributed security communication means and system based on block chain
CN109495478B (en) * 2018-11-20 2021-05-04 桂林电子科技大学 A distributed secure communication method and system based on blockchain
CN112465635A (en) * 2019-09-09 2021-03-09 上海旺链信息科技有限公司 Block chain public encryption algorithm processing method, block chain wallet and storage medium
CN110569658A (en) * 2019-09-12 2019-12-13 腾讯科技(深圳)有限公司 User information processing method, device, electronic equipment and storage medium based on block chain network
CN110674180A (en) * 2019-09-26 2020-01-10 腾讯科技(深圳)有限公司 Business data processing method and device and readable storage medium
CN110674180B (en) * 2019-09-26 2021-07-27 腾讯科技(深圳)有限公司 Business data processing method and device and readable storage medium
CN111131444B (en) * 2019-12-23 2020-09-29 广州公评科技有限公司 Network course processing system based on block chain technology
CN111131444A (en) * 2019-12-23 2020-05-08 广州公评科技有限公司 Network course processing system based on block chain technology
CN111353903A (en) * 2020-02-26 2020-06-30 广东工业大学 Network identity protection method and device, electronic equipment and storage medium
US12250209B2 (en) 2020-02-26 2025-03-11 Guangdong University Of Technology Network identity protection method and device, and electronic equipment and storage medium
CN111680327B (en) * 2020-06-10 2024-02-23 中国银行股份有限公司 Block chain-based client information integration method, device, equipment and storage medium
CN111680327A (en) * 2020-06-10 2020-09-18 中国银行股份有限公司 Block chain-based customer information integration method, device, equipment and storage medium
CN113162768B (en) * 2021-02-24 2022-07-22 北京科技大学 A blockchain-based smart IoT device authentication method and system
CN113162768A (en) * 2021-02-24 2021-07-23 北京科技大学 Intelligent Internet of things equipment authentication method and system based on block chain
CN113449336A (en) * 2021-06-11 2021-09-28 电子科技大学 Shared data processing method based on safe multi-party privacy protection in block chain
CN117494221A (en) * 2024-01-03 2024-02-02 齐鲁工业大学(山东省科学院) Internet of things data sharing method for block chain assisted search
CN117494221B (en) * 2024-01-03 2024-04-02 齐鲁工业大学(山东省科学院) A blockchain-assisted search method for sharing Internet of Things data
CN119603075A (en) * 2025-02-05 2025-03-11 杭州宇泛智能科技股份有限公司 Multi-factor security authentication method and device based on AI adaptive recognition and blockchain
CN119603075B (en) * 2025-02-05 2025-05-02 杭州宇泛智能科技股份有限公司 Multi-factor security authentication method and device based on AI self-adaptive identification and blockchain

Also Published As

Publication number Publication date
CN107147652B (en) 2019-08-09

Similar Documents

Publication Publication Date Title
CN107147652B (en) A secure fusion authentication method for user multi-modal identity based on blockchain
CN108234515B (en) Self-authentication digital identity management system and method based on intelligent contract
US10680808B2 (en) 1:N biometric authentication, encryption, signature system
CN106529327B (en) Mix the data access arrangement and method below cloud environment to encrypting database
CN103281377B (en) A kind of encrypt data storage and querying method of facing cloud
CN106612320B (en) A kind of De-weight method of encryption data in cloud storage
CN104021157B (en) Keyword in cloud storage based on Bilinear map can search for encryption method
CN107948146B (en) Connection keyword retrieval method based on attribute encryption in hybrid cloud
CN104158827B (en) Ciphertext data sharing method, device, inquiry server and upload data client
CN110602099B (en) Privacy protection method based on verifiable symmetric searchable encryption
CN107395568A (en) A kind of cipher text retrieval method of more data owner's certifications
JP2014002365A (en) Encrypted data inquiry method and system which can protect privacy
CN105745861A (en) Information delivery system
CN107359998A (en) A kind of foundation of portable intelligent password management system and operating method
CN106713508A (en) Data access method and system based on cloud server
Sun et al. Research on logistics information blockchain data query algorithm based on searchable encryption
CN106599719A (en) Ciphertext retrieval method supporting efficient key management
CN108171066A (en) The cross-domain searching method of keyword and system in a kind of medical treatment cloud under secret protection
CN101924739A (en) Method for encrypting, storing and retrieving software certificate and private key
CN109992994A (en) A method and system for personnel file management based on blockchain
CN108632385A (en) Multiway tree data directory structure cloud storage method for secret protection based on time series
CN117240452A (en) A blockchain-based secure sharing method for plateau data
CN113868715A (en) Signature method and system based on quantum key
CN106059761A (en) Encrypted image search method in support of group sharing and key update in cloud storage environment
CN107094075A (en) A kind of data block dynamic operation method based on convergent encryption

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载