ABSTRACT
With the wide application of computer network and intelligent terminal, the application of blockchain technology is rapidly popularized, and the corresponding information security issues become increasingly important. This paper introduces the data encryption standard DES of symmetric encryption algorithm, and discusses the public-key infrastructure system PKI. It is a third-party platform to ensure the security of information during transmission, mainly responsible for issuing certificates with digital signature of CA center and managing public and private-keys needed in RSA algorithm. Several asymmetric encryption algorithms are studied, focusing on RSA asymmetric encryption algorithm, and the method of encrypting public-key decryption with private-key is designed and implemented to solve the problem of information authenticity identification, i.e., identity authentication namely identity authentication. RSA public-key generation, information encryption and decryption are designed, and RSA key generator module, encryption module and decryption module are realized. The results show that RSA algorithm is feasible and safe in blockchain scene.
- RIVEST R L, SHAMIR A, ALDEMAN L. A method for obtaining digital signatures and public−key cryptosystems. Communications of the ACM, 1978, 21(2):120-126.Google ScholarDigital Library
- Zhang Xuefang. Optical fiber broadband access technology. Beijing: Beijing University of Posts and Telecommunications Press, 2016.Google Scholar
- Wang Lina, Guo Chi, Li Peng. Information Hiding Technology Experiment Course. Wuhan: Wuhan University Press, 2004.Google Scholar
- KIMUR A S, YONEYAMA K. Security proof of identity−based signature under RSA assumption, reconsidered/2016 international symposium on information theory and itsapplications. Monterey, CA: IEEE, 2016:86-90.Google Scholar
- Yang Xiaofeng, Zhang Ying, Deng Zhimin. Research on trusted QR code technology based on PKI. Science and Technology Innovation and Application, 2015(33): 89-90.Google Scholar
- Zhang Hua, Cui Huijuan, Tang Kun. A fast implementation scheme of digital signature system based on RSA algorithm. Computer Engineering, 2006, 32 (3): 156-157.Google Scholar
- Xu Shaobo, Yin Bo. An asymmetric encryption solution for form sensitive information based on PKI digital certificate. computer applications and software, 2010, 27 (10): 291-292.Google Scholar
- Chen Jun. Research on the security application of QR code technology in mobile terminals. Guangzhou: Guangdong University of Technology, 2015.Google Scholar
- Chen Jingwen, Xia Shiwen, Lin Yong. Application of. RSA encrypted QR code in security traceability system. Journal of Ningbo Institute of Technology, 2016, 28 (4): 31-36.Google Scholar
- YAJAM H A, AHMADABADI Y K, AKHAEE M. Deniable encryption based on standard RSA with OAEP//2016 8th international symposium on telecommunications. Tehran: IEEE, 2016:84-88.Google Scholar
- Han Lidong, Wang Xiaoyun, Xu Guangwu. Attack analysis of small CRT decryption index in. RSA cryptosystem. China Science: Information Science, 2011, 41(2): 173-180.Google Scholar
Index Terms
- Research on Application of Identity Authentication Encryption Technology in Blockchain Scene
Recommendations
Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
At ACNS 2007, Ateniese and Green proposed the concept of ID-based proxy re-encryption (IBPRE), where a semi-trusted proxy with some information (a.k.a. re-encryption key), can transform a ciphertext under an identity to another ciphertext under another ...
Proxy re-encryption systems for identity-based encryption
Pairing'07: Proceedings of the First international conference on Pairing-Based CryptographyA proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice's public key into the different ciphertexts that can be decrypted by Bob's secret key. In this paper, we propose new proxy re-encryption systems; one for the ...
Identity-based proxy re-encryption version 2
Proxy re-encryption (PRE) enables an authorized proxy to convert a ciphertext under Alice's public key into a ciphertext under Bob's public key without exposing the encrypted message. In existing PRE systems, the original ciphertexts and the re-...
Comments