为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

基于区块链通信签名平台有哪些,基于区块链通信签名平台的研究

发布时间:2023-12-06-06:00:00 来源:网络 区块链知识 区块   通信   平台

基于区块链通信签名平台有哪些,基于区块链通信签名平台的研究


请查看相关英文文档

A. What are the blockchain system development platforms?

Fabric blockchain development is explained in detail. This course is for beginners, and the content includes the code. HyperledgerFabric's core concepts such as identity certificates and MSP services, permission policies, channel configuration and startup, and chaincode communication interfaces also include operational practices of Fabric network design, chaincode, and application development. It is the best choice for learning Fabric blockchain development. .

Let me give you a free blockchain blog to check out.

B. IBM launches a blockchain pilot to simplify the bank guarantee process

Technology giant IBM launched a pilot of a blockchain platform aimed at simplifying the bank guarantee process.

In a press release shared with Cointelegraph on July 3, IBM said the pilot was launched in partnership with four Australian financial services companies.

The pilot, called Lygon, is backed by IBM, Australia and New Zealand Banking Group Ltd, Commonwealth Bank, property operator Scentre Group and Australia's first bank Westpac. Starting from the 4th, the pilot group’s retail property leasing customers will have a trial run for eight weeks.

Essentially, Lygon is a blockchain-based platform that digitizes the issuance and management of bank guarantees in the retail property leasing sector. According to the release, digitizing processes will reduce the risk of fraud, reduce potential errors, and increase transparency and security.

Once the pilot is complete, Lygon plans to expand the range of digital bank guarantees it supports and start offering these guarantees to other industries. Didier Van Not, general manager of corporate and institutional banking at Westpac, said: “We have created a blockchain-based platform to digitize the bank guarantee ecosystem. The pilot will use The distributed ledger is tested on real-time transactions to prove that the technology is commercially viable. This is a great example of digital transformation that improves customer experience."

So far, IBM has Many enterprise blockchain products have been launched. Last month, Brazilian bank and financial infrastructure service provider CIP officially launched a blockchain ID platform using Hyperledger Fabric in partnership with IBM. Its goal is to verify digital signatures using mobile devices.

In March this year, five Japanese banks collaborated to launch a financial services infrastructure based on IBM's distributed ledger technology.

C. How to interpret the digital signature of the blockchain

In the distributed network of the blockchain, communication and trust between nodes requireIt relies on digital signature technology, which mainly realizes identity confirmation and information authenticity and integrity verification.

Digital signature

Digital signature (also known as public key digital signature, electronic signature) is a kind of ordinary physical signature similar to written on paper, but uses public key encryption Technical implementation in the field, methods for identifying digital information. A set of digital signatures usually defines two complementary operations, one for signing and another for verification. It is a string of numbers that only the sender of the message can generate that cannot be forged by others. This string of numbers is also an effective proof of the authenticity of the message sent by the sender of the message. Simple proof that “I am who I am”.

D. How Yibaoquan uses blockchain technology to protect data security

Yibaoquan is the first in China to use blockchain technology for electronic data solidification and storage, and has been recognized by judicial authorities An electronic data storage and security institution, it has been committed to the technology research and development and innovative applications of blockchain since 2013, innovating the "blockchain + judicial + application" model and creating four major trusted blockchain basic applications and alliance areas. Blockchain "security chain open platform".
Use technologies such as blockchain, digital signatures, timestamps, encryption algorithms, and consensus algorithms to firmly build a data security base in terms of technical protection, management operations, and application practices, making data storage and interaction safer.
Ebaoquan connects with many authoritative CA institutions in China, allowing the platform to be directly connected to the CA system, providing users with "trusted digital identity services", using "face recognition, mobile phone number, bank card three elements" and other Identity authentication method provides digital trusted identity proof for each virtual account ID.
At the same time, it combines a variety of will authentication methods such as "signed password, SMS verification code, face recognition" to ensure that all operations of organizations and individuals in the system are supported by real identities and are based on true intentions, better It avoids risks such as account ID leakage, data leakage, and information misuse, and ensures that every piece of data information is authentic and trustworthy.
Since its establishment, Yibaoquan has attached great importance to the management and protection of user data security and privacy. When uploading to the chain, Yibaoquan uses technologies such as timestamps, encryption algorithms, and consensus algorithms to ensure the integrity of the data. and originality; after being uploaded to the chain, the "preservation chain" is used to solidify and store the electronic data to various judicial nodes from the moment it is generated, and back up the evidence in multiple parties to ensure that ordinary electronic data is upgraded to electronic evidence recognized by the judiciary, and Official verification can be carried out in real time at authoritative institutions to protect every piece of data on the chain so that rights and interests are not infringed upon.
Based on the principles of security, compliance, privacy and other principles, and under the strict supervision of the Ministry of Industry and Information Technology, the Cyberspace Administration of China and other competent authorities, Yibaoquan provides users with secure and trustworthy blockchain electronic data storage that meets the requirements of laws and regulations. Preservation services can be deeply integrated with electronic contracts, copyright protection, judicial services and other fields to ensure that the entire process of each user's electronic data can be recorded, the entire process can be traced, the entire data can be verified, and the entire link can be trusted to provide evidence.
In terms of qualification certification, Yibaoquan has obtained certification from the Ministry of Public Security and otherIt has Level 3 certification, ISO27001 certification, and ISO9001 certification. It has obtained information service registration from the National Cyberspace Administration of China for four times. It is also the 2018 Industrial Internet Pilot Demonstration Project of the Ministry of Industry and Information Technology (the only blockchain company selected). Blockchain technology and qualifications are highly recognized by the country. .

E. Which electronic signature platform is more professional? Are there any good cases at home and abroad?

For this, you can refer to the latest "iiMedia Report丨2018-2019 China" released by iiMedia Consulting Special Research Report on the Electronic Signature Industry", which compares the characteristics of several electronic signature platforms at home and abroad:

China Electronic Signature Platform Trends - Shangshangshu

Shangshangshu in 2018 It has performed well in service qualification certification, technological innovation, financing scale, corporate cooperation, etc., and has become an industry leader in many fields. iiMedia Consulting analysts believe that the Matthew Effect in the electronic signature industry is obvious. Leadership in technology, capital, and services will help Shangshangshuo quickly gain market share, enhance core competitiveness, and strengthen its own barriers.

F. The largest Mediterranean smart city project uses blockchain technology platform

According to the compilation by Huobi Blockchain Application Research Institute, Locus Chain Foundation ( LCF)’s MENA headquarters signed a strategic cooperation agreement with the Tunisian Economic City (TEC), the largest Mediterranean city project, to use Locus Chain blockchain technology as its settlement currency and service platform.

Locus Chain is the foundation of a next-generation blockchain platform headquartered in Singapore, with technology offices in South Korea and Japan. Locus Chain Foundation CEO Lee Sang Yoon and Tunis Economic City General Manager Dr. Riadh Khalifa Toukabri signed the agreement at the LCF Singapore headquarters in the presence of senior officials from both parties.

Jointly owned by Tunisia and Saudi Arabia, TEC is a large-scale project on the eastern peninsula of Tunisia. It covered a total area of ​​90 square kilometers and cost US$50 billion during its first ten years. The city consists of 14 large-scale thematic districts and is expected to become an international business and technology center connecting Europe, Africa and Asia. It will also serve as Africa's gateway to Europe and complement the economic growth of the GCC countries.

This cooperation agreement aims to apply the blockchain platform to entire urban construction projects as the basic technology and settlement currency for various industries such as finance, communications, medical care, shopping, autonomous vehicles, artificial intelligence, etc. The upcoming new collaboration is a gathering place for startup giants and fourth-generation tech gurus. It aims to digitize the business and public sectors by realizing a large-scale economic and urban development project on Tunisia's east coast.

Lee Sang Yoon said: “TEC is the world’s economicOne of the most advanced smart city projects the economy has ever experienced. When the 'Locus Chain' blockchain platform is applied to the TEC project, it will be used as a transaction and authentication method in various industries, and will provide an ideal management and service system to ensure high transparency and security throughout the industry. ”

Jackey Choi, Director of Middle East Operations at Locus Chain Foundation, said: “This agreement will increase TEC’s readiness for the future through technological precision and innovation, and enable all similar initiatives in the MENA region from a broad perspective project benefits. This purpose will be served through LCF’s Middle East headquarters in Dubai’s Silicon Oasis. ”

The concept of the smart city project was essentially founded by Prince Fahd Bin Muqrin Bin Ablaziz Al Saud of Saudi Arabia, Chairman of the Al Hermas Global Working Group, and Dr. Riadh Khalifa Toukabri. Dr. Riadh serves as President and the Prince serves as Chairman of TEC. Chong La

In September 2014, the TEC project announced a series of projects including seaports, airports, roads, power, etc. TEC is making progress to increase economic growth in North Africa. provides the much-needed impetus.

G. What you must know is the blockchain digital signature mechanism

The blockchain uses the Hash function to realize that transaction information and address information cannot be tampered with. The integrity of the data transmission process is guaranteed, but the Hash function cannot achieve non-repudiation of the transaction information (also known as denial of denial and non-repudiation). It means that during the information exchange process, both parties in the network communication are convinced that the participants themselves and the information provided The authenticity and identity of the information, that is, all participants cannot deny or deny their true identity, as well as the authenticity of the information provided and the completed operations and commitments). The blockchain uses the digital signature mechanism in public key encryption technology to ensure the non-repudiation of the information Characteristics.

Digital signatures mainly include signature algorithms and verification algorithms. In the signature algorithm, the signer uses his private key to perform a signature operation on the electronic file to obtain the signature ciphertext of the electronic file; in the verification algorithm In the process, the verifier uses the signer's public key to perform verification operations on the signature ciphertext of the electronic file, and determines the legality of the signed file based on the results of the verification algorithm. During the signature process, only the signer knows his own private key and does not know Any person whose private key cannot forge or correctly sign an electronic document; during the verification process, only legitimately signed electronic documents can effectively passVerification, any illegal signature file cannot satisfy its verification algorithm.

Commonly used digital signature algorithms include RSA digital signature, DSA digital signature, ECDSA digital signature, Schnorr digital signature and other algorithms.

We will introduce it with RSA digital signature: People may ask what is the difference between RSA signature and encryption? Encryption and signing are both for security reasons, but are slightly different. People often ask whether to use private keys or public keys for encryption and signatures? In fact, they are all confused about the role of encryption and signature. Simply put, encryption is to prevent information from being leaked, and signature is to prevent information from being tampered with.

Example: After A receives the message from B, it needs to reply "received" - RSA signature process:

First: A generates a pair of keys (public key and private key), the private key is not made public and A keeps it to himself. The public key is public and can be obtained by anyone.

Then: A signs the message with its own private key to form a signature, and passes the signed message and the message itself to B.

Finally: After B receives the message, it obtains A's public key to verify the signature. If the content of the signature is consistent with the message itself, it proves that the message is replied by A.

In this process, there are only two transfer processes. The first time is when A transfers the signed message and the message itself to B, and the second time is when B obtains A's public key, even if both are defeated by the enemy. There is no danger if Party A intercepts the message, because only A's private key can sign the message. Even if the message content is known, a signed reply cannot be forged to B, thus preventing the message content from being tampered with.

In summary, from books and the Internet, we have an intuitive understanding.

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 36245 文章总数
  • 3637265访问次数
  • 3078建站天数