Blockchain blind signature
transaction security technology includes anonymous technology, identity authentication technology, anti plicate transaction technology and anti-counterfeiting technology. Anonymity technology realizes controllable anonymity of digital assets through blind signature (including blind parameter signature, weak blind signature, strong blind signature, etc.) and zero knowledge proof; The identity authentication technology verifies the user's identity through the authentication center to ensure the validity of the digital asset trader's identity; The anti plicate transaction technology ensures that digital assets are not reused by means of digital signature, serial number and time stamp; Anti counterfeiting technology ensures the authenticity of digital assets and transactions by means of encryption and decryption, digital signature and identity authentication. Secondly, the online transaction and offline transaction of digital assets are realized by transaction technology. Digital asset trading technology mainly includes online trading technology and offline trading technology. As a legal currency, digital assets should not be rejected by any unit or indivial, and can be traded online or offline. Online transaction technology realizes online transaction of digital assets through online device interaction technology, online data transmission technology and online transaction processing; The off-line transaction technology realizes the off-line transaction of digital assets through the off-line device interaction technology, off-line data transmission technology and off-line transaction processing technology. Finally, trusted guarantee technology is used to provide a safe and reliable application environment for the issuance, circulation and transaction of digital assets in blockchain. Digital asset trustworthiness assurance technology mainly refers to trusted service management technology. Based on trusted service management platform (TSM), it ensures the security and trustworthiness of digital asset security mole and application data, and provides security chip (SE) and application life cycle management function for digital asset participants. Trusted service management technology can provide application registration, application download, security authentication, authentication management, security evaluation, trusted loading and other services for digital assets, which can effectively ensure the security and credibility of digital assets system
what is blockchain? Blockchain technology, also known as distributed ledger technology, is an Internet database technology, which is characterized by decentralization, openness and transparency, so that everyone can participate in database records. Blockchain technology development blockchain technology development what is a blockchain system? Blockchain system is a database system with integrity. The data written into the system will be automatically copied to the nodes of the blockchain, which can achieve transactional data preservation, support the management and development of databases in various instries, and be proced in combination with various needs. 294.497 billion US dollars, or 2.60%. This week, five new projects entered the top 100, namely FST, ZB, Wix, wax and MXM. On August 11, the price of bitcoin was $11523.58, up 3.20% from last week, and Ethereum was $216.09, down 3.86% from last week. The 24-hour turnover of this week increased by 2.63% over the same period last week; Among the top 100 projects, the total market value and average market value of currency projects increased significantly, and the classification composition of global blockchain assets top 100 projects was stable.
blockchain is not easy to do since 18 years ago. The instry is deceptive, professional cut leek. I remember that the blockchain network reported that Li Xiaolai was cutting leeks. Li Xiaolai was going to build a blockchain network, so that their second round of financing had stopped. It was said that they had sold it to a technology company in Guangzhou
I haven't heard of this exchange. Coin an, fire coin and OK are well-known exchanges in the currency circle, as shown in the figure below:
blockchain is the core supporting technology of the digital cryptocurrency system represented by bitcoin. The core advantage of blockchain technology is decentralization. It can realize point-to-point transaction, coordination and cooperation based on decentralized credit in a distributed system without mutual trust by means of data encryption, time stamp, distributed consensus and economic incentive, so as to solve the common high cost, low cost and low cost of centralized institutions Low efficiency and data storage insecurity provide solutions
the application fields of blockchain include digital currency, token, finance, anti-counterfeiting traceability, privacy protection, supply chain, entertainment, etc. with the popularity of blockchain and bitcoin, many related top domain names have been registered, which has a great impact on the domain name instry
the connotation of electronic signature is different from that of digital signature. Digital signature is one of the electronic signature technologies, but the relationship between them is also very close. At present, the signature mentioned in the electronic signature law generally refers to & quot; Digital Signature & quot
electronic signature
to understand what an electronic signature is, we need to start with the traditional manual signature or seal. In the traditional business activities, in order to ensure the security and authenticity of the transaction, a written contract or official document should be signed and sealed by the parties or the person in charge, so that the two parties can identify who signed the contract, and ensure that the person signing or sealing the contract recognizes the content of the contract. Only in law can the contract be recognized as valid. In the virtual world of e-commerce, contracts or documents are expressed and transmitted in the form of electronic documents. In electronic documents, the traditional handwritten signature and seal can not be carried out, which must be replaced by * technical means. Electronic signature is an electronic technical means that can identify the real identities of both parties in the electronic documents, ensure the security and authenticity of the transaction, and play the same role as handwritten signature or seal
legally speaking, a signature has two functions: identifying the signer and indicating the signer's approval of the content of the document. In the model law on electronic signature of the United Nations Conference on Trade and development, the definition of electronic signature is as follows: & quot; It can be used to identify the signer related to the data message and indicate the signer's approval of the information contained in the data message;; In the EU's common framework directive on electronic signatures, it is stipulated that? quot; Data attached in electronic form or logically related to other electronic data, as a method of discrimination; It's called electronic signature
there are many kinds of technical means to realize electronic signature, but the mature electronic signature technology commonly used in advanced countries in the world is still & quot; Digital Signature & quot; Technology. As maintaining the neutrality of technology is a basic principle of law making, there is no reason to say that public key cryptography is the only technology for signature making, so it is necessary to provide a more general concept to adapt to the development of technology in the future. However, the signature mentioned in the current electronic signature law generally refers to & quot; Digital Signature & quot
digital signature
so called & quot; Digital Signature & quot; It is to generate a series of symbols and codes to form an electronic password for signature through a certain cryptographic operation, instead of writing a signature or seal. For this kind of electronic signature, technical verification can also be carried out, and the accuracy of verification can not be compared with that of manual signature and stamp verification& quot; Digital Signature & quot; It is the most popular, mature and operable electronic signature method in e-commerce and e-government. It uses standardized proceres and scientific methods to identify the signer and recognize the content of an electronic data. It can also verify whether the original text of the document has changed in the process of transmission, and ensure the integrity, authenticity and non repudiation of the transmitted electronic document
digital signature is defined as & quot; Some data attached to the data unit, or the cipher transformation of the data unit, which allows the receiver of the data unit to confirm the source of the data unit and the integrity of the data unit, and protect the data from forgery;. The American electronic signature standard (DSS, fips186-2) explains digital signature as follows: & quot; Using a set of rules and a parameter to calculate the result of the data, this result can confirm the identity of the signer and the integrity of the data;. According to the above definition, PKI (public key infrastructure) can provide the cipher transformation of data unit, and enable the receiver to judge the data source and verify the data
the core executive organ of PKI is the electronic authentication service provider, which is commonly known as Ca (certificate authority). The core element of PKI signature is the digital certificate issued by ca. The PKI services it provides are authentication, data integrity, data confidentiality and non repudiation. It uses the certificate public key and the corresponding private key to encrypt / decrypt, and generates the signature and verification signature for the digital message. Digital signature is the use of public key cryptography and other cryptographic algorithms to generate a series of symbols and codes to form an electronic password for signature, instead of writing signature and seal; This kind of electronic signature can also be verified by technology, and its verification accuracy is incomparable to that of manual signature and stamp in the physical world. This signature method can be used for authentication in a large number of trusted PKI domains, or cross authentication in multiple trusted PKI domains. It is especially suitable for secure authentication and transmission in Internet and WAN
the biggest difference between "digital signature" and ordinary text signature is that it can use graphic files with distinct personality. As long as you use scanners or mapping tools to make your personal signature, seal and even photos into bmp files, you can use them as the material of "digital signature"
at present, there are many software that can provide "digital signature" function, and the usage and principle are similar, among which "onsign" is more commonly used. After "onsign" is installed, the shortcut button of "onsign" will appear on the toolbar of word, outlook and other programs. You need to enter your own password every time you use it to ensure that others can't embezzle it
for the files sent by using "onsign", the recipient also needs to install "onsign" or "onsign viewer" to have the function of identifying "digital signature". According to the design of "onsign", any tampering and interception of the content of a file will invalidate the signature. Therefore, when the other party identifies your "digital signature", it can be determined that the document was sent by you and has not been tampered or intercepted in the process. Of course, if the recipient is not at ease, you can also click the blue question mark on the "digital signature" and "onsign" will automatically check again. If there is a problem with the file, a red warning sign will appear on the "digital signature"
in the Internet age when e-mail is frequently used, the use of "digital signature" is just like the "registered letter" in traditional letters, which undoubtedly adds a protective barrier to the security of network transmission files<
respondent: gufanyy - Magician level 4 12-4 15:00
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Integrity and acceptability. The process is very secure, and some governments have legislated to give legal effect to digital signature
in collaboration with leading security providers including enter and VeriSign, Adobe enables all instries to embed digital signatures into Adobe & reg; Portable document format (PDF) file. With adobe solution, you can:
integrate digital signature into the round-trip workflow
send signed documents safely inside and outside the firewall
verify the digital identity of the signer
authenticate electronic documents by digital signature before sending
verify that documents have not been fraulently changed
rece costs and speed up the approval process
the connotation of electronic signature is different from that of digital signature. Digital signature is one of the electronic signature technologies, but the relationship between them is also very close. At present, the signature mentioned in the electronic signature law generally refers to & quot; Digital Signature & quot
electronic signature
to understand what an electronic signature is, we need to start with the traditional manual signature or seal. In the traditional business activities, in order to ensure the security and authenticity of the transaction, a written contract or official document should be signed and sealed by the parties or the person in charge, so that the two parties can identify who signed the contract, and ensure that the person signing or sealing the contract recognizes the content of the contract. Only in law can the contract be recognized as valid. In the virtual world of e-commerce, contracts or documents are expressed and transmitted in the form of electronic documents. In electronic documents, the traditional handwritten signature and seal can not be carried out, which must be replaced by * technical means. Electronic signature is an electronic technical means that can identify the real identities of both parties in the electronic documents, ensure the security and authenticity of the transaction, and play the same role as handwritten signature or seal
legally speaking, a signature has two functions: identifying the signer and indicating the signer's approval of the content of the document. In the model law on electronic signature of the United Nations Conference on Trade and development, the definition of electronic signature is as follows: & quot; It can be used to identify the signer related to the data message and indicate the signer's approval of the information contained in the data message;; In the EU's common framework directive on electronic signatures, it is stipulated that? quot; Data attached in electronic form or logically related to other electronic data, as a method of discrimination; It's called electronic signature
there are many kinds of technical means to realize electronic signature, but the mature electronic signature technology commonly used in advanced countries in the world is still & quot; Digital Signature & quot; Technology. As maintaining the neutrality of technology is a basic principle of law making, there is no reason to say that public key cryptography is the only technology for signature making, so it is necessary to provide a more general concept to adapt to the development of technology in the future. However, the signature mentioned in the current electronic signature law generally refers to & quot; Digital Signature & quot
digital signature
so called & quot; Digital Signature & quot; It is to generate a series of symbols and codes to form an electronic password for signature through a certain cryptographic operation, instead of writing a signature or seal. For this kind of electronic signature, technical verification can also be carried out, and the accuracy of verification can not be compared with that of manual signature and stamp verification& quot; Digital Signature & quot; It is the most popular, mature and operable electronic signature method in e-commerce and e-government. It uses standardized proceres and scientific methods to identify the signer and recognize the content of an electronic data. It can also verify whether the original text of the document has changed in the process of transmission, and ensure the integrity, authenticity and non repudiation of the transmitted electronic document
digital signature is defined as & quot; Some data attached to the data unit, or the cipher transformation of the data unit, which allows the receiver of the data unit to confirm the source of the data unit and the integrity of the data unit, and protect the data from forgery;. The American electronic signature standard (DSS, fips186-2) explains digital signature as follows: & quot; Using a set of rules and a parameter to calculate the result of the data, this result can confirm the identity of the signer and the integrity of the data;. According to the above definition, PKI (public key infrastructure) can provide the cipher transformation of data unit, and enable the receiver to judge the data source and verify the data
the core executive organ of PKI is the electronic authentication service provider, which is commonly known as the certificate authority (CA). The core element of PKI signature is the digital certificate issued by ca. The PKI services it provides are authentication, data integrity, data confidentiality and non repudiation. It uses the certificate public key and the corresponding private key to encrypt / decrypt, and generates the signature and verification signature for the digital message. Digital signature is the use of public key cryptography and other cryptographic algorithms to generate a series of symbols and codes to form an electronic password for signature, instead of writing signature and seal; This kind of electronic signature can also be verified by technology, and its verification accuracy is incomparable to that of manual signature and stamp in the physical world. This signature method can be used for authentication in a large number of trusted PKI domains, or cross authentication in multiple trusted PKI domains. It is especially suitable for secure authentication and transmission in Internet and WAN
the biggest difference between "digital signature" and ordinary text signature is that it can use graphic files with distinct personality. As long as you use scanners or mapping tools to make your personal signature, seal and even photos into bmp files, you can use them as the material of "digital signature"
at present, there are many software that can provide "digital signature" function, and the usage and principle are similar, among which "onsign" is more commonly used. After "onsign" is installed, the shortcut button of "onsign" will appear on the toolbar of word, outlook and other programs. You need to enter your own password every time you use it to ensure that others can't embezzle it
for the files sent by using "onsign", the recipient also needs to install "onsign" or "onsign viewer" to have the function of identifying "digital signature". According to the design of "onsign", any tampering and interception of the content of a file will invalidate the signature. Therefore, when the other party identifies your "digital signature", it can be determined that the document was sent by you and has not been tampered or intercepted in the process. Of course, if the recipient is not at ease, you can also click the blue question mark on the "digital signature" and "onsign" will automatically check again. If there is a problem with the file, a red warning sign will appear on the "digital signature"
in the Internet age when e-mail is frequently used, the use of "digital signature" is just like the "registered letter" in traditional letters, which undoubtedly adds a protective barrier to the security of network transmission files
respondent: gufanyy - Magician level 4 12-4 15:00
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Integrity and acceptability. The process is very secure, and some governments have legislated to give legal effect to digital signature
in collaboration with leading security providers including enter and VeriSign, Adobe enables all instries to embed digital signatures into Adobe & reg; Portable document format (PDF) file. With adobe solution, you can:
integrate digital signature into the round-trip workflow
send signed documents safely inside and outside the firewall
verify the digital identity of the signer
authenticate electronic documents by digital signature before sending
verify that documents have not been fraulently changed
rece costs and speed up the approval process
Chinese Name: digital signature English Name: digital signature definition: data that exists in the data information in electronic form, or as its attachment or logically associated with it, can be used to identify the identity of the data signer and indicate the signer's recognition of the information contained in the data information. Applied discipline: Communication Science and Technology (first level discipline); The content above network security (secondary discipline) is approved and published by the national science and technology terminology Approval Committee
help edit network business card
digital signature process digital signature (also known as public key digital signature, electronic signature) is a kind of common physical signature written on paper, but it uses the technology in the field of public key encryption, A method for identifying digital information. A digital signature usually defines two complementary operations, one for signature and the other for verification<
directory
basic introction
main functions
signature process
Personal Secure E-mail certificate
identify virus with digital signature
cause analysis
usage method
principle feature authentication
integrity
non repudiation
basic introction of how to implement
java digital signature steps
main functions
signature process
Personal Secure E-mail Certificate
identify virus with digital signature
cause analysis
usage method
principle and feature authentication
integrity
non repudiation
how to implement Java digital signature steps to start editing this paragraph basic introction
Digital signature does not mean to scan your signature into a digital image, or use the touchpad to obtain the signature, let alone your signature. Digital signature is a digital string that can only be generated by the sender of information, which can not be forged by others. This digital string is also an effective proof of the authenticity of the information sent by the sender. Digital signature is the application of asymmetric key encryption technology and digital digest technology. The integrity of the digital signature file is very easy to verify (no need for the seal, the signature and the handwriting expert), and the digital signature is non repudiation (no need for the handwriting expert to verify). In short, the so-called digital signature is some data attached to the data unit, or the password transformation of the data unit. This kind of data or transformation allows the receiver of the data unit to confirm the source of the data unit and the integrity of the data unit, and protect the data from forgery. It is a method of signing electronic messages. A signed message can be transmitted in a communication network. Digital signature can be obtained based on both public key cryptosystem and private key cryptosystem. At present, digital signature is mainly based on public key cryptosystem. Including ordinary digital signature and special digital signature. Common digital signature algorithms include RSA, ElGamal, Fiat Shamir, Guillou quisquater, Schnorr, ong Schnorr Shamir digital signature algorithm, DES / DSA, elliptic curve digital signature algorithm and finite automata Digital signature algorithm. Special digital signature includes blind signature, proxy signature, group signature, undeniable signature, fair blind signature, threshold signature, signature with message recovery function and so on. Obviously, the application of digital signature involves legal issues. The federal government of the United States has developed its own digital signature standard (DSS) based on the discrete logarithm problem over finite fields. Digital signature is a typical application of asymmetric encryption algorithm. The application process of digital signature is that the sender of data source uses its own private key to encrypt the data checksums or other variables related to the data content to complete the legal "signature" of the data. The receiver of data uses the public key of the other party to interpret the received "digital signature", and uses the interpretation results to test the integrity of the data, To confirm the validity of the signature. Digital signature technology is an important technology to confirm the identity in the virtual environment of network system. It can completely replace the "autograph" in the real process, which is guaranteed technically and legally. In digital signature applications, the sender's public key can be easily obtained, but his private key needs to be strictly confidential
edit the main functions of this paragraph
ensure the integrity of information transmission, the identity authentication of the sender, and prevent the occurrence of repudiation in the transaction. Digital signature technology is to encrypt the abstract information with the sender's private key and send it to the receiver together with the original. The receiver can decrypt the encrypted digest only with the public key, and then generate a digest for the received text with hash function, which is compared with the decrypted digest. If it is the same, it means that the received information is complete and has not been modified in the transmission process. Otherwise, it means that the information has been modified, so the digital signature can verify the integrity of the information. Digital signature is a process of encryption, and digital signature verification is a process of decryption< When sending a message, the sender uses a hash function to generate a message digest from the message text, and then encrypts the digest with his own private key. The encrypted digest will be sent to the receiver as the digital signature of the message, The receiver first calculates the message digest from the received original message with the same hash function as the sender, and then decrypts the digital signature attached to the message with the sender's public key. If the two digests are the same, the receiver can confirm that the digital signature belongs to the sender. Digital signature has two functions: one is to confirm that the message is actually signed by the sender, because others can't fake the sender's signature. Second, digital signature can confirm the integrity of the message. Because the characteristic of digital signature is that it represents the characteristics of the file, if the file changes, the value of digital signature will also change. Different files will get different digital signatures. A digital signature involves a hash function, the sender's public key and the sender's private key This is the description of message authentication! Digital signature is not that complicated. Digital signature: the sender performs e operation on message x with its own key to generate an unreadable ciphertext ESK, and then transmits the ESX to the receiver. In order to verify the signature, the receiver performs D operation on the sender's key to restore the message
Edit this section of personal security e-mail certificate
personal security e-mail certificate with digital signature function is a kind of user certificate, which refers to the certificate that the unit user must have to use the certificate mechanism to ensure security when sending and receiving e-mail. Personal security e-mail certificate is a digital security certificate conforming to X.509 standard. Combining digital certificate and S / MIME technology, it encrypts and signs ordinary e-mail to ensure the security, confidentiality, identity confirmation and non repudiation of e-mail content. The personal secure e-mail certificate with digital signature function includes the e-mail address of the certificate holder, the public key of the certificate holder, the Ca and the signature of the certificate. The realization of personal security e-mail certificate function depends on whether the user's e-mail system supports the corresponding functions. At present, MS Outlook, Outlook Express, Foxmail and Ca secure e-mail systems all support corresponding functions. Using personal secure e-mail certificate can send and receive encrypted and digitally signed e-mail, ensure the confidentiality, integrity and non repudiation of e-mail transmission, and ensure the authenticity of the identity of all parties in e-mail communication< How to distinguish digital signature attacks? There are two ways: 1. To view the details of the digital signature, we should view the details of the digital signature and click the "details" button. We will find the difference between the normal exe and the infected (or bundled Trojan) exe digital signature. The details of the normal exe digital signature are tampered with, and the EXE digital signature information is invalid. Method 2, use the digital signature verification program sigcheck.exe (you can find this tool on the network, one of the components of the famous system toolkit sysinternal suite.) The result of digital signature exception is: C: 92; Documents and Settings\ litiejun\?? 92; Modify.exe: verified: unsigned file date: 15:46 2008-5-23 Publisher: n / a description: n / a proct: n / a version: n / a file version: n / a normal result of digital signature is: C: 92; Documents and Settings\ litiejun\?? 92; Che.exe: verified: signed signing date: 16:28 2008-4-29 Publisher: n / a description: n / a proct: n / a version: n / a file version: n / A, If you don't destroy the digital signature in exe, the digital signature may look normal after infection. But carefully look at the file properties or check the hash value of the file, you will find that the EXE program is not the most original version. 2. If the digital signature file of the software publisher is stolen, the attacker can also package the EXE program that is bundled with Trojan horse or infected with virus with digital signature, which is more serious in this case. If an enterprise applies for a digital signature certificate, it must keep it properly, otherwise it will have endless troubles
Edit how to use this paragraph
you can digitally sign every email you send. This does not mean signing. It is generally mistaken for signature. In mainland China, digital signature has legal effect and is widely used. In 2000, the new contract law of the people's Republic of China confirmed the legal effect of electronic contract and electronic signature for the first time. Since April 1, 2005, the first law of the people's Republic of China on electronic signature has been formally implemented< Each person has a pair of "keys" (digital identity), one of which is known only by herself (key), and the other is public (public key). Use the key when signing and the public key when verifying the signature. And because anyone can sign to claim that she / he is you, the public key must be registered with the person trusted by the recipient (identity authentication authority). After registration, the authentication authority will send you a digital certificate. After signing the document, you will send the digital certificate together with the document and signature to the recipient. The recipient will verify with the identity authentication authority whether the document is really signed with your key. In communication, digital signature is generally used for the following reasons:
authentication
public key encryption system allows anyone to use the public key to encrypt when sending information, and digital signature enables the information receiver to confirm the identity of the sender. Of course, it is impossible for the receiver to be 100% sure of the sender's true identity, but only if the cryptosystem has not been deciphered. The importance of authentication is particularly prominent in financial data. For example, suppose a bank transmits instructions from its branches to its central management system. The format of the instructions is (a, b), where a is the account number of the account and B is the existing amount of the account. At this time, a remote client can first deposit 100 yuan, observe the transmission results, and then send instructions in the format of (a, b) one after another. This method is called
quisquarter, Schnorr, ong Schnorr Shamir digital signature algorithm, DES / DSA, elliptic curve digital signature algorithm and finite automata Digital signature algorithm. Special digital signature includes blind signature, proxy signature, group signature, undeniable signature, fair blind signature, threshold signature, signature with message recovery function and so on. Obviously, the application of digital signature involves legal issues. The federal government of the United States has developed its own digital signature standard (DSS) based on the discrete logarithm problem over finite fields. Some countries, such as France and Germany, have enacted digital signature laws
you can go to the official website of globalsign
for details!