为广大币圈朋友提供币圈基础入门专业知识!
当前位置首页 > 区块链知识> 正文

微分密码分析法与区块链的关系,区块链密码学算法包含哪些算法

发布时间:2023-12-21-20:24:00 来源:网络 区块链知识 区块   微分   分析法

微分密码分析法与区块链的关系,区块链密码学算法包含哪些算法

微分密码分析法与区块链是紧密相连的,区块链密码学算法可以说是构成区块链的核心技术,其中包含了哈希函数、公钥加密、椭圆曲线加密等算法。今天,我们就来深入了解一下这些算法,看看它们是如何保护我们的数据安全的。

哈希函数:哈希函数是一种将任意长度的消息压缩到某一固定长度的消息摘要的函数,其中摘要的长度固定,而输入消息的长度则没有限制。哈希函数可以用来验证信息的完整性,即检查输入的消息是否被篡改,从而保护数据安全。哈希函数的特点是计算的速度快,而且不可逆,即无法根据计算出的哈希值推断出原始消息。因此,哈希函数可以用来验证消息的完整性,保护数据安全。

公钥加密:公钥加密是一种非对称加密算法,它使用一对密钥,即公钥和私钥,其中公钥用于加密信息,而私钥则用于解密信息。使用公钥加密可以有效地保护信息安全,因为即使攻击者破解了加密信息,也无法解密信息,因为他们无法获得私钥。此外,公钥加密还可以防止数据被篡改,因为只有拥有私钥的人才能解密加密信息。

椭圆曲线加密:椭圆曲线加密是一种非对称加密算法,它利用椭圆曲线上的点来进行加密。它的特点是计算速度快,而且可以产生很长的密钥,因此可以有效地保护信息安全。此外,椭圆曲线加密还可以防止信息被篡改,因为只有拥有私钥的人才能解密加密信息。

以上就是哈希函数、公钥加密和椭圆曲线加密这三种区块链密码学算法的介绍,它们可以有效地保护我们的数据安全,防止信息被篡改。因此,在使用区块链的过程中,我们应该重视这些密码学算法,以保护我们的数据安全。


请查看相关英文文档

① Risk control under the blockchain paradigm: reducing strategic risks and foreseeable risks



< /p>

Marco Iansiti Karim Lakhani, "Harvard Business Review" Chinese version, January 2017, article "The Truth about Blockchain"

Research experience in the field of technological innovation tells us that only by eliminating obstacles in technology, government control, organization and society, can the blockchain revolution truly occur. If you don’t know how blockchain will occupy the high ground, it would be a mistake to rush into blockchain innovation.

Systemic risk. Speaking of systemic risks, we have to mention dramatic global economic downturns such as the credit crunch that followed the financial crisis of 2008-2009. For most companies, that is an external event that cannot be predicted or controlled. Global regulators are reshaping the financial world to avoid similar crises, and an important step in their strategy is to enhance the role of central counterparties (CCPs). A CCP is an entity that is inserted between the two parties in a financial transaction. After both parties agree to a transaction, CCP becomes a seller to any buyer and a buyer to any seller. In this process, CCP reduces counterparty credit and liquidity risk exposure through networking, reducing the risk of direct contact between the two parties when one party defaults, but the risk of doing so is still concentrated. The main roles of CCP are: 1. Manage settlement operation tasks and reduce settlement risks; 2. Monitor individual credit risks through membership approval and implementation of margins (initial and changed) to provide transparent risk management; 3. Deal with defaulting parties ;4. Supervise systemic risks in the market.

In financial markets managed based on blockchain, many CCP principles may be eliminated. It is conceivable that functions 1 and 2 of CCP will be replaced by smart contracts. DAOs are designed to create a relationship between two parties in a transaction. Once certain terms embedded in the smart contract are touched, the receivables can be automatically transferred from one party to the other. Functions 3 and 4 of CCP can also be improved by blockchain technology, but it is unlikely to be fully automated because it requires a high degree of directionality and large-scale scene analysis capabilities. Relevant blockchain startups such as Digital Asset Holding and D-Pactum are working with CCP to redesign their technology in the direction of distributed ledgers and smart contracts without changing the role given to CCP by recent laws and regulations. This could develop into fundamental measures to increase the resilience of the financial system. On the distributed ledger, a transparent and standardized transaction process can be designed, and the relationship between capital and margin can occur automatically, thus reducing the risk burden of intermediary managers.. By encoding smart contracts signed by each participant, the rules for managing crisis events can be as certain as possible.

Cyber ​​risks. This is the last external risk we will analyze, but not the least. Indeed, a lack of understanding or attention to the risks associated with cyber risks or critical infrastructure failures such as control systems, energy, transportation, telecommunications and financial infrastructure has the potential to have far-reaching consequences for national economies, multiple economic sectors and global businesses . The responsibility for conducting risk assessments and setting up risk management systems now falls on each business, but their internal practices and processes vary widely, and small businesses with immature risk management systems are more vulnerable to cyberattacks in this context.

Is blockchain a viable solution? no doubt. The development of digital currencies extends the secure use of cryptography and creates a business model with new types of resilience against cyberattacks. A complete system on a distributed ledger could provide a higher level of cybersecurity than a company's standard firewall technology. Because the distributed ledger is automated, and because of the principles of information sharing and the robustness of the consensus protocol, the ledger history is omnipresent and unchangeable. Therefore, in this system, high-tech cyber attacks can be prevented before they occur.

However, at the end of the analysis of external risks, it is worth noting that the emergence of digital currency has created for the first time a circulating currency that is not related to national, multinational government decisions or any real economy. In reality, the value of digital currency fluctuates greatly, but its direction and time are different from the market, thus maintaining non-correlation with a certain country's currency or stock market. As a result, Bitcoin has been called “digital gold,” and like gold, digital currencies have been used as safe-haven assets to limit the impact of macroeconomic risks.

In conclusion, before we delve into the amazing utility of blockchain in risk management, it is important to understand that blockchain is not a panacea. It should be viewed as one of many technologies building the next generation of risk management infrastructure.

② Briefly explain what is blockchain

Blockchain is a term in the field of information technology. In essence, it is a shared database, and the data or information stored in it has the characteristics of "unforgeable", "full traces left", "traceable", "open and transparent" and "collectively maintained". Based on these characteristics, blockchain technology has laid a solid foundation of "trust" and created a reliable "cooperation" mechanism, which has broad application prospects.

On January 10, 2019, the Cyberspace Administration of China issued the "Blockchain Information Service Management Regulations". On October 24, 2019, during the 18th collective study session of the Political Bureau of the CPC Central Committee, General Secretary Xi Jinping emphasized, “use blockchain as an important breakthrough for independent innovation of core technologies” and “accelerate the development of blockchain technology and industrial innovation.” . "Blockchain" has entered the public eye and become the focus of society.

On December 2, 2019, theThe words were selected into the top ten buzzwords in 2019 by "Yi Wen Qi Zi".

(2) Extended reading on blockchain differential cryptanalysis:

Blockchain financial applications:

Since 2016 , major financial giants have also caught wind of this and launched blockchain innovation projects one after another to explore the possibility of applying blockchain technology in various financial scenarios. In particular, Puyin Group took the lead in pioneering the “blockchain+” standard digital currency.

The standard digital currency is an asset that has been identified, evaluated, confirmed, insured, etc. by a third-party organization and written into the blockchain through rigorous digital algorithms to form a standard correspondence between the asset and the digital currency. relationship, called a standard digital currency.

In order to realize the great leap forward development of blockchain finance, in order to promote the new development of China's economy, accelerate the circulation of global assets, and realize the dream of rejuvenation that generations of people have been striving for, Puyin Group will Puyin Blockchain Finance Guiyang Strategy Release Ceremony was held in Guizhou on the 9th;

At the meeting, the digital circulation of assets through blockchain, the blockchain financial transaction model, and the relationship between blockchain services and blockchain services will be discussed. The application of social public industries will be discussed. This conference will mark the beginning of the application of blockchain finance and the transformation and development of a new financial ecosystem.

③ The Story of Blockchain - 9 - RSA Algorithm

RSA

Diffie and Herman perfectly solved the problem of key distribution. From then on, exchanging keys is very simple. Alice and Bob can exchange a key by shouting on the loudspeaker at the end of the village. But the encryption method is still symmetric encryption.

Although the DH protocol is convenient for exchanging keys, it still has some unsatisfactory troubles. Alice still has to yell with Bob for a long time before they can generate the key. When Alice wants to exchange keys, if Bob is sleeping, Alice's love letter still cannot be sent.

In their paper, Diffie and Herman pointed out the direction for future encryption methods. Designing asymmetric encryption through one-way functions is the ultimate solution. The so-called asymmetric encryption means that one key is used to close the lock and another key is used to open the lock. The two keys are different. A locked key cannot open the lock. The key to unlock the lock cannot close the lock.

Three MIT scientists, they are Ron Rivest, Adi Shamir and Leonard Adleman , they read the paper by Diffie and Herman, were deeply interested, and began to study it. The algorithm that Diffie and Herman failed to figure out was born from the hands of the three of them.

In 2002, these three masters won the Turing Award for the invention of RSA. But don’t think that RSA is all they have. These three are real masters, and each of them has a fruitful academic career. Let us look up and explore the heights of the masters.

Leviste also invented the RC2, RC4, RC 5, RC 6 algorithms, as well as the famous MD2, MD3, MD4, and MD5 algorithms. He also wrote a book called "Introduction to Algorithms". Programmers have worn out countless brain cells on this book.

Shamir invented the Feige-Fiat-Shamir authentication protocol and also discovered differential cryptanalysis.

Aardman is even more legendary. He pioneered the DNA computing theory and used DNA computers to solve the "traveling salesman" problem. His student Cohen invented the computer virus, so he is considered the grandfather of computer viruses. He is also a master-level expert in AIDS immunology and has made outstanding contributions in every aspect such as mathematics, computer science, molecular biology, and AIDS research.

In 1976, all three were working at MIT's Computer Science Laboratory, and they formed a perfect team. Leviste and Summer are computer scientists who constantly come up with new ideas, and Aardman is an extremely skilled mathematician who can always find problems for Leviste and Summer.

A year later, in 1977, Leviste was lying on the sofa sobering up after a party. He tossed and turned, unable to fall asleep. Half asleep and half awake, before vomiting, a bolt of lightning suddenly struck his mind, and he found a way. Overnight, he wrote the paper. The next morning, he handed the paper to Aardman, and Aardman could no longer find any mistakes this time.

In terms of the name of the paper, these three people were really gentlemen and modest. Rivest named it Adleman-Rivest-Shamir, and the great Adleman asked that his name be removed, as it was Rivest's invention. The final result of the dispute was that Aardman's name was listed third, so the algorithm became RSA.

The RSA algorithm is based on a very simple fact of number theory: it is very easy to multiply two large prime numbers, but it is extremely difficult to factor the product, so the product can be made public and used as Encryption key.

For example, if you choose two prime numbers, one is 17159 and the other is 10247, the product of the two numbers is 175828273. The product 175828273 is the encrypted public key, and (17159, 10247) is the decrypted private key.key.

The public key 175828273 is available to everyone, but to crack the ciphertext, you need to decompose 175828273 into 17159 and 10247, which is very difficult.

When RSA was announced in 1977, mathematician and popular science writer Martin Gardner published a public key in Scientific American magazine:

114 381 625 757 888 867 669 235 779 976 146 612 010 218 296 721 242 362 562 842 935 706 935 245 733 897 830 597 123 563 958 705 058 989 075 147 599 290 026 879 543 541

Martin offers readers a reward for This public key is used to crack. It took 17 long years, but on April 26, 1994, a group of 600 enthusiasts claimed to have found the private key. The private key is:

p: 3 490 529 510 847 650 949 147 849 619 903 898 133 417 764 638 493 387 843 990 820 577

q: 32 769 132 993 266 709 549 961 988 190 834 461 413 177 642 967 992 942 539 798 288 533

This 17-year cracking only targets 129-bit public keys. Today RSA already uses 2048-bit public keys. Public key, which requires almost all the computing power of computers around the world and takes billions of years to crack.

The security of RSA relies on large number decomposition, but whether its cracking difficulty is equivalent to large number decomposition has not been theoretically proven, because it has never been proven that cracking RSA requires large numbers. Number decomposition.

RSA still has weaknesses. Because it performs large number calculations, the fastest RSA is many times slower than ordinary symmetric encryption, whether implemented in software or hardware. Speed ​​has always been a drawback of RSA. Generally only used for small amounts of data encryption.

RSA also has a weakness, which will be mentioned below.

In cryptography, American scholars are very busy and have achieved results one after another.But Britain, the old empire, was not without its achievements in cryptography. After all, it was the hometown of Turing, the country where Turing led cryptographers to defeat the German Ingmar encryption machine at Bletchery Park.

The British also invented RSA, but it was buried.

In the 1960s, the British military was also troubled by the problem of code distribution. In 1969, cryptographer James Ellis was working for the military when he was approached about the problem of key distribution. He came up with an idea to use a one-way function to implement asymmetric encryption, but he couldn't find the function. Many talented people from GCHQ joined in to find the one-way function. But three years have passed, and these smart heads have not gained much. Everyone is a little frustrated. Does such a single function exist?

Often at this time, a newborn calf is needed to save the day. Cox is a brave calf. He is a young mathematician, very pure, the kind who is determined to devote himself to the Muse. Although he was young, he had a huge advantage. At that time, he knew nothing about the one-way function problem and had no idea that his teachers had achieved nothing in three years. So he rushed into the mine formation ignorantly.

Faced with such a dangerous mine array, Cox almost jumped over it. It only took half an hour to solve the problem. Then he went home from get off work. He didn't take it too seriously. It was just a job assigned by the leader. It was nothing more than serving tea, pouring water, sweeping the floor and solving math problems. Finish it early. You can also buy freshly baked bread on the way home. He had no idea he was making history. Cox was such a pure mathematician that he later felt a little embarrassed when he heard the praise from his colleagues. In his eyes, mathematics should be, as Hardy said, a useless knowledge, but he used mathematics to solve specific problems, which is shameful.

Unfortunately, Cox's invention was too early. The computing power of computers at that time was too weak and could not realize asymmetric encryption and decryption. Therefore, the military does not apply asymmetric encryption algorithms. James and Cox developed the theory of asymmetric encryption to perfection, but they could not tell it. The military required that all work must be kept secret, and they could not even apply for a patent.

Although the military has very strict confidentiality requirements on work results, it does not care much about the work results themselves. Later, the British Communications Headquarters discovered the American RSA algorithm and thought it was great. They simply forgot about the James-Cox RSA. While the communications headquarters was amazed, they dug through their knowledge base and discovered that their employee Cox had already invented an algorithm similar to RSA. Bureaucracy is really a good friend of mankind. It can always create all kinds of jokes for people, although its original intention is to create authoritarianism.

Cox didn’t mind this, he even said: “Just bury it, I don’t want to be an internet celebrity.Why do you need fans? Can those fans eat it? "The original words are not like this, but the meaning is basically the same.

Diffie made a special trip to England to meet James in 1982. The two cherished each other. It's really a time when heroes meet. It's a pity that James still can't reveal them. Regarding RSA’s research, he only told Diffie: “You are doing better than us. "Scientists from all over the world can compete to see who is better, but it is difficult for bureaucrats from all over the world to compete with others. They do not distinguish between superior and inferior.

The Story of Blockchain - 1

The Story of Blockchain - 2

The Story of Blockchain - 3

The Story of Blockchain - 4

The Story of Blockchain - 5

The Story of Blockchain - 6

The Story of Blockchain - 7

The story of blockchain - 8

④ Popular explanation of what blockchain is

Question 1: What is blockchain? Can you explain the 10 partitions in plain language? The principle of blockchain: decentralized distributed accounting system
The core of blockchain technology is that all currently participating nodes jointly maintain transactions and databases. It makes transactions based on cryptographic principles rather than trust, making any The two parties who have reached an agreement can directly conduct payment transactions without the participation of a third party.
?
Technically speaking, a block is a data structure that records transactions, reflecting the funds of a transaction. Flow direction. The blocks of transactions that have been reached in the system are connected together to form a main chain. All nodes participating in the calculation record the main chain or part of the main chain. A block contains the following three parts: transaction information, previous area The hash and random number formed by the block. Transaction information is the task data carried by the block, including the private keys of both parties to the transaction, the number of transactions, the digital signature of electronic currency, etc.; the hash formed by the previous block Columns are used to connect blocks to achieve the order of past transactions; random numbers are the core of transaction completion. All miner nodes compete to calculate the answer to the random number. The node that gets the answer the fastest generates a new block and broadcasts it to All nodes are updated and a transaction is completed.
1.1 What is Blockchain
Blockchain (BlockChain) refers to a technical solution that collectively maintains a reliable database through decentralization and trustlessness. . This technical solution mainly allows any number of nodes participating in the system to associate through a series of data blocks (blocks) generated using cryptographic methods. Each data block contains all the information exchange data of the system within a certain period of time, and Generate data fingerprints to verify their credentialsValidity of information and chain to the next database block.
?
In layman’s terms, blockchain technology refers to a way for all people to participate in accounting. Behind all systems there is a database, which is a big ledger. Then who will keep this ledger becomes very important. At present, it is whoever owns the system who keeps the accounts. Each bank’s account books are kept by each bank, and Alipay’s account books are kept by Alibaba. But now in the blockchain system, everyone in the system has the opportunity to participate in accounting. If there are new transaction data changes within a certain period of time, everyone in the system can do accounting. The system will judge the person who has the fastest and best accounting during this period, write the recorded content to the ledger, and Send the contents of the ledger during this period to all other people in the system for backup. In this way, everyone in the system has a complete ledger. Therefore, this data becomes very safe. A tamperer needs to modify more than half of the system node data at the same time to truly tamper with the data. Such tampering would be extremely costly, making it nearly impossible. For example, Bitcoin has been running for more than 7 years. Countless hackers around the world have tried to attack Bitcoin, but so far there have been no transaction errors. It can be considered that the Bitcoin blockchain has been proven to be a safe and reliable system.
?
1.2 Why is there blockchain innovation?
Human beings need to communicate during their activities, and communication is based on information. In the past, information circulation was not convenient enough to satisfy market participants. There is a demand for information, so intermediaries and centers are born. This centralized system has problems such as high cost, low efficiency, value dispersion, "information islands" and insecure data storage. However, due to technical and environmental factors, this system continued to operate for many years until the emergence of the Internet. The starting point of the first generation of the Internet is the TCP/IP protocol, which is an open code that implements a unified format for peer-to-peer transmission of information by all nodes on the network, and brings the basic values ​​of freedom and equality required by a global unified market into programmed, protocol-based, and reliably Execution. The Internet eliminates low-value, high-cost intermediate chains and achieves low-cost and high-efficiency global information transmission in a decentralized manner.
?
However, the first generation of the Internet did not solve the problem of information credibility. Activities that can be decentralized on the Internet must be activities that do not require credit endorsement, and activities that require credit guarantee must be activities involving centralized third-party intermediaries. Therefore, Internet technology that cannot establish global credit has encountered great obstacles in its progress - people cannot participate in any value exchange activities on the Internet in a decentralized manner. To realize value exchange, people still need third-party intermediaries based on credit (such as banks, clearing agencies, exchanges). The global centralized credit system still has problems such as high operating costs, low efficiency, and vulnerability to attacks and damage. For example, each country's legal currency has different credit values ​​and incompatible clearing systems, which adds a lot of cost to global trade.
?
Therefore, what the second generation Internet must break through is: how to establish global credit in a decentralized manner? Let...>>

Question 2: What is blockchain? What does it mean in layman’s terms? What is China’s attitude towards blockchain? What can blockchain do? Blockchain, a great technology that accompanied the birth of Bitcoin, is currently being used in the financial field to significantly reduce transaction costs and improve efficiency, which is enough to excite Wall Street. However, this is just the tip of the iceberg. Its potential applications are very broad and will subvert every aspect of our lives in the future.
Blockchain is an important concept of Bitcoin. It is essentially a decentralized database and serves as the underlying technology of Bitcoin. One of the most basic characteristics of Bitcoin is decentralization. In recent months, financial giants have gradually begun to pay attention to Bitcoin's technology and used it in non-monetary fields, such as stock trading, election voting, etc. (1) Art Industry
Artists can use blockchain technology to declare ownership and issue numberable, 100% edition works in digital form for any type of artwork. It even includes a marketplace where artists can buy and sell through their website without the need for any intermediary services.
(2), Real estate industry
Use blockchain technology to solve various problems faced by everyone involved in real estate, including the naming process, land registration, agency intermediaries, etc.
(3), Insurance Industry
The financial industry has always been the most sensitive to advanced technology. Traditional banking and securities industry giants have been involved in the booming blockchain venture capital investment since 2014, with the total global investment reaching US$1 billion within two years.
(4) P2P wallet
Personal assets can be traded through this P2P wallet in the future without going through any central institution, such as Bitcoin.
Most blockchains are in their infancy, mainly overseas. There are very few good domestic blockchain projects, so it is not recommended for any non-professionals to invest in blockchain projects. If you are very interested in blockchain technology and have a technical or financial background, it is recommended that you consider starting a business in this area. In terms of the blockchain protocol system, the lowest layer is the underlying technology of the blockchain, including the technical protocols of the blockchain, as well as some platform routing and basic algorithms; in the middle layer, some application interfaces and some credentials must be solved Issuance and verification, including some industry platform services, big data analysis, etc. This is a very rough classification, and there should be more detailed classifications; the top ones are some applications of blockchain, including finance Some applications and some applications in other aspects, the Internet of Things and so on.
Introduction to Bubi Blockchain
Bubi Blockchain has been focusing on the R&D and innovation of blockchain technology and products since its establishment. It has a number of core technologies and has made substantial innovations in many aspects, forming a number of core technical achievements, such as: Mathematically proven distributed consensus technology, fast large-scale ledger access technology, multi-chain general ledger technology that supports business expansion, interconnection technology between heterogeneous blockchains, etc. On April 25, "Gege Points" introduced the concept of blockchain into the points system, jointly opened it up with multiple parties, issued and redeemed points, and promoted the circulation of points. Each cooperative institution can jointly participate in transaction verification, ledger storage, and real-time settlement; the third-party payment platform of the enterprise points issuer makes the entry and exit of points more flexible. Bubi has developed its own basic blockchain service platform, which has been applied in equity, supply chain, points, credit and other fields. Bubi has been committed to building an open value circulation network with decentralized trust as the core, allowing digital assets to flow freely.
A simple understanding of blockchain is a technology underlying Bitcoin, which is also a peer-to-peer electronic cash system that can realize peer-to-peer value delivery. We should distinguish between Bitcoin, Bitcoin blockchain, blockchain and blockchain. Blockchain technology and other concepts. In countries with relatively developed finance in the past, finance and blockchain technology have a long history, and the legislation of digital currencies and blockchain networks is also very important. With the advent of the financial era, large financial institutions are studying blockchain technology. They have their own teams and conceptual technologies. Slowly, banks in various regions are also participating in digital currency discussions. The application and support of this technology are not only that. The influence of blockchain on enterprises is also huge. For larger domestic enterprises, Bubi Blockchain is also used in various equity, supply chain, points and other fields. Major domestic financial institutions and enterprises have taken a fancy to the new industry. value, they have developed their own blockchain platforms, and blockchain has instantly become a new innovative industry in China. In terms of overseas internationalization, the United States has already obtained 15 blockchain patents at the end of last year compared to China. Blockchain financial applications are entering a new stage in an all-round way. Various applications will become more and more in-depth, and related changes will also become more and more profound. It has attracted more and more attention and will form a huge new trend... >>

Question 3: What is blockchain technology? What exactly is blockchain? What is blockchain? 1. Data blockchain is an important concept in the Bitcoin financial system. It records transaction record data on the entire Bitcoin network, and these data are shared by all Bitcoin nodes. Through the data block, we can query each transaction record. A look at the history of Bitcoin transactions. 2. Example: There are three persons A, B, and C. All funds of A and B are kept by C. And every financial transaction must be recorded by C. Now assume that A and B each have 1 million in custody of C. Then: A spends 80,000 yuan to B, then C's account book record will subtract 80,000 yuan from A's name, and add 80,000 yuan to B's name. B transfers 50,000 to A, then C will add 50,000 to A's name in the account book record.Yuan, and deduct 50,000 Yuan in B’s name. A spends 50,000 yuan to B, then C's account book record will subtract 50,000 yuan from A's name, and add 50,000 yuan to B's name. 3. The role of the data blockchain is similar to that of C’s account record book. It records the user’s ownership of Bitcoin and the records of all users’ Bitcoin transactions. It’s just that this “account record book” is recorded by the mining software of every Bitcoin miner on the network. If a Bitcoin transaction is confirmed by the data blockchain, the relevant information will be recorded in the data blockchain. Bitcoin’s “account record book” is called the data blockchain. All data blockchains on the network form Bitcoin’s distributed network database system. 4. The essence of data blockchain technology is a decentralized and distributed structure of data storage, transmission and certification methods. It uses data blocks to replace the current Internet's dependence on central servers, so that all data changes or transaction items are recorded. On a cloud system, the self-certification of data during data transmission is theoretically realized. In a far-reaching sense, this transcends the traditional and conventional information verification paradigm that relies on a center and reduces the cost of establishing global "credit." This point-to-point verification will produce a "basic protocol", a new form of distributed artificial intelligence, and will establish a new interface and shared interface for human brain intelligence and machine intelligence.

Question 4: What is blockchain: This explanation of blockchain is more understandable. Blockchain refers to a technology that collectively maintains a reliable database through decentralization and trustlessness. plan.
In layman’s terms, blockchain technology refers to a way for all people to participate in accounting. There is a database behind all systems. You can think of the database as a big ledger. Then who will keep this ledger becomes very important. Currently, whoever owns the system keeps the accounts. Tencent keeps the accounts of WeChat, and Alibaba keeps the accounts of Taobao. But now in the blockchain system, everyone in the system has the opportunity to participate in accounting. If there are any data changes within a certain period of time, everyone in the system can do accounting. The system will judge the person who has the fastest and best accounting during this period, write his recorded content into the ledger, and record this Within a period of time, the contents of the ledger are sent to all other people in the system for backup. In this way, everyone in the system has a complete ledger. In this way, we call it blockchain technology.
Blockchain technology has become the darling of the financial community in China and has become a hot topic. Domestic Puyin Group has launched Puyin, a tea-based digital currency.

Question 5: Explain in an easy-to-understand manner what blockchain is. Blockchain can be understood as a database system in a sense. The development of blockchain can be divided into 1.0 and 2.0
1.0 is represented by Bitcoin, and its main application is virtual currency or digital currency application. At this time, the blockchain can onlyFor simple digital currency transactions.
2.0 is represented by the now popular ethereum (Ethereum) and the upcoming hyperledger. The blockchain at this stage can not only meet the corresponding digital currency transactions, but also use smart contracts to customize currency or asset transactions. If we use the database analogy, the emergence of smart contracts can be understood as allowing users to define functions or stored procedures in the database and call and execute them.
Different from traditional databases, the blockchain introduces consensus mechanism, incentive mechanism, p2p (network), hash and other specific elements, making it open, decentralized and non-tamperable. characteristic.

Question 6: What is blockchain? Can anyone explain it in simple terms? Blockchain is the underlying technology of Bitcoin. It is like a ledger that records all transactions. It is decentralized. What is decentralization? For example, when you buy something on Taobao, you place an order and pay it to Alipay. Alipay will not transfer the money to the seller until you receive the goods. Alipay is the third party in that center. Without it, it means decentralization, just like buying things offline. If you pay with one hand and get the goods with the other hand, there is no third party.
The blockchain itself is a series of cryptographically related data blocks generated.
Look carefully to see if it looks like a ledger. The pieces one by one are blocks, and connected together they are the blockchain.
Many companies are developing this technology, including ours, and its prospects are incredible. For details, you can go to our official website and hope to adopt it, thank you

Question 7: What is blockchain technology? What is blockchain? How to explain the concept of blockchain? People in each industry have different understandings, and relevant explanations are gradually emerging due to more and more real-life applications. With the popularization of this blockchain technology, the related results are getting bigger and bigger. If we want to understand this technology, we must have an in-depth understanding of reality.
In the past six months, the concept of blockchain has gradually become popular in China, and a blockchain whirlwind has taken off in the financial circle. Blockchain has attracted the attention and favor of more and more people in the industry due to its unique technical advantages. Blockchain technology, which is decentralized (or multi-centered), highly transparent, cannot be tampered with, and has no single point of failure, is entering the field of vision of financial institutions and enterprises. It has at least been used in digital currency, payment exchange, registration and settlement, Digital assets, traceability and anti-counterfeiting, supply chain, Internet of Things and many other fields have moved from theoretical discussions to practical applications.
"Blockchain" was first introduced with "Bitcoin" released in early 2009. Blockchain has become the basic protocol and technical application for the launch, recording, and circulation of Bitcoin. Although Bitcoin has been controversial since its introduction, it is still not even considered a "currency" by governments and monetary authorities.", but the blockchain technology used in Bitcoin has received widespread attention, including from governments and monetary authorities.
Why has blockchain become a rapidly heating up hot technology and topic?
Perhaps the most important of these is that Bitcoin, launched on the basis of blockchain technology, has opened up a kind of Internet user identity verification that has little connection with traditional society (offline) and is fully applied in the online world (online). The exploration and attempt of new technologies and rule systems such as wealth confirmation, transaction records, notarization and verification, etc., provide people with optional paths and unlimited imagination to adapt to the development of the Internet society.
From its application in Bitcoin Look, blockchain, intuitively speaking, is a set of new network block (BLOCK, also called community) establishment, Bitcoin configuration, netizen identity verification, and mining process formed by combining encryption technology with Internet technology. The formed Bitcoin (value) confirmation, Bitcoin transaction records, and the extended encryption of Bitcoin cross-block flow (value transfer) (added factors such as block and transaction time marks) registration and verification, etc. Blockchain (Blockchain), fully encrypted, mutually authenticated Internet protocol rules and accounting (Ledger) system. Precisely because Bitcoin is not a substitute for offline legal currency, but a non-legal currency authority issued and Managed, mainly imitating the model of gold, a new, decentralized online currency (virtual currency) completely protected and supported by Internet basic protocols and strict encryption technology, thus forming a set of different and unrestricted It is a new currency rule and system based on real social laws, and can be bought, sold or exchanged with legal currency. It has been more than 8 years since Bitcoin was launched, and there has been no record of funds or user information being stolen, and its security has been verified , and its efficiency and cost of fund clearing also have obvious advantages. This makes people's confidence in the blockchain technology used by Bitcoin continue to increase, and people are increasingly aware that although the blockchain is Bitcoin A technology and protocol pioneered and applied by Bitcoin, but blockchain is not the same as Bitcoin, and its application will never be limited to Bitcoin. The application of blockchain can be decentralized or It is centralized; it can be a public chain model or a private chain model. Therefore, after Bitcoin, blockchain technology is also constantly developing and innovating, and constantly exploring new application areas, especially in the financial field. .
The reason why blockchain is highly valued by more and more people is because the development and widespread application of the Internet have caused more and more economic exchanges and transaction activities to be conducted online, and the online world (or Online society) is rapidly expanding, enriching and active, and online transactions must solve the efficiency and security protection issues of the parties' identity verification, value verification, transaction records, inspection and verification, etc., and require strict intermediaries and agreements (rules or constitutions) .In this regard, traditional thinking and customary practices are to adapt to offline transactions and move towards online transactions.The shifting development trajectory has pushed the prevailing rules and practices of the real (offline) society to the online (online) society, but in practice it has become increasingly difficult to adapt to the needs of online transactions.
For example, for the identity verification of the parties, the natural choice is to use the information on the identity documents protected by the laws of various countries as the basis, and then add account or transaction passwords, as well as facial recognition, iris, fingerprints and other biometrics to conduct online transactions. Verification, but this method first makes the citizen identity information in the cross-border interconnected online world subject to the administrative jurisdiction of real society... >>

Question 8: Easy to understand Explain clearly what is blockchain. The English name of blockchain is Blockchain. Block literally means block, block, and chain means chain, chain. Therefore, together they are translated into blockchain.
1. Use cryptography technology to encrypt and decrypt so that records cannot be tampered with. Common blockchain encryption methods include hash algorithm, RSA algorithm, elliptic curve algorithm, etc.;
2. The huge amount of calculation needs to be supported by a reasonable reward mechanism. Because every transaction must be recorded, Bitcoin’s blockchain has more than 60 gigabytes so far. Every new transaction requires confirmation of the information related to the trading account to ensure that the transaction is valid. The huge amount of calculation requires a computer with powerful computing power to complete.
In order to encourage the participation of powerful computing power, Bitcoin provides two rewards: one is to issue a certain number of bitcoins to these computers every day; instead, all transfer fees are awarded to these computers. (The technical term for these computers is "mining machines", and the people who hold the mining machines are called "miners".)
Biying China is working hard on asset digitization and launched the digital currency crowdfunding platform Biying China.

Question 9: What is the so-called "blockchain"? Blockchain itself is a tool called decentralization and trustlessness. For example, when you graduate from university, the current practice is to have a certificate recognized and issued by an authoritative agency as your certificate. This setting is more troublesome, because this is a piece of paper, and paper can be forged, so there will be various gaps. The issuing authority is also a person, and there will be various gaps in the middle. As long as it is related to people, whoever There are various possibilities related to media. The blockchain provides a great opportunity. As soon as you graduate, you will have a record on the blockchain. No one can change this record. This thing exists objectively. You, as a physical existence , and then as a data existence, the blockchain was born. In this case, anyone who wants to check where you graduated can easily solve the problem. This is similar to the big data often involved in social networking (WeChat) and payment platforms (Alipay, Yibao).

Question 10: What does blockchain mean? Regarding blockchain, I think you have already seen the concept on the Internet. Let me explain it based on my understanding!
First, let’s talk about its characteristics: 1. Openness and transparency 2. Decentralization 3. Anonymity 4. Information cannot be tampered with and eliminated 5. No trust cost
Blockchain is like a public ledger , everyone has the right to record and read, and everyone will jointly supervise to ensure its accuracy, and the recorded content will be permanently saved, and can only be added but not deleted! However, as the number of blocks continues to increase, costs will increase and efficiency will decrease. (I’m not sure whether technology can be used to make up for this. I hope someone who understands technology can point it out.)
Blockchain is divided into public chain, private chain, and alliance chain. Public chain: accessible to everyone, everyone has read and write permissions, completely open, transparent and decentralized. Private chain: Open to individuals or institutions, in which the owner of the private chain can set various permissions to make it partially centralized. Alliance chain: Open to specific organizations or groups, it is also "partially decentralized". According to the ledger at the beginning, members can view and transact, but cannot record and confirm bills, or require permission from the alliance. (The latter two do not have cost and efficiency issues)
Regarding blockchain, countries have begun to recruit talents in this area. For this, you can search online for "Central Bank Recruiting Digital Currency R&D Personnel". In addition, you can increase your understanding of blockchain by understanding its existing applications. What we usually refer to generally refers to public chains. Currently, those used abroad include Bitcoin, Ethereum and other domestic blockchains. Chain
1. Open and transparent: Every piece of data is verified by everyone and can be viewed by everyone at any time.
2. Decentralization: For example, when we shop on Taobao, we conduct transactions through the intermediary Taobao, and blockchain allows both supply and demand parties to directly contact each other for direct transactions through blockchain technology.
3. Anonymity: No personal privacy information is required to complete transactions on the blockchain, only your unique alphanumeric signature is required.
4. Information cannot be tampered with or deleted: Once the data has been verified and recorded, no one has the authority to modify it, let alone delete it!
5. No trust cost: The trust crisis in reality will not appear in the blockchain. Transactions in the blockchain do not require you to trust the other party. Only when both of you have enough "digital assets" to trade can it be carried out, and Under the supervision of the entire network, transactions will not be broken. If you have no idea about the cost of trust, just think about how many intermediaries there are in your city, or just think about Jack Ma, and you will know how big the cost of trust is.
I am still learning more about blockchain. I am Li Ailin. If you have any questions, you can discuss and learn together!

⑤ What does blockchain mean and what are the characteristics of blockchain?


As for the technology of blockchain, I believe many friends have already paid attention to it.Blockchain is a hot topic right now, with news media reporting heavily on it claiming it will create the future. So what does blockchain mean? What are the characteristics of blockchain? Today we will introduce the blockchain to you in detail, and hope that you will have a deep understanding after reading it.
What does blockchain mean?
Blockchain is a new application model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithms. The so-called consensus mechanism is a mathematical algorithm that establishes trust and obtains rights and interests between different nodes in the blockchain system.
Blockchain is also an important concept of Bitcoin. The "2014-2016 Global Bitcoin Development Research Report" released by the Internet Finance Laboratory of Tsinghua University PBC School of Finance and Sina Technology mentioned that blockchain is Bitcoin's underlying technology and infrastructure.
Blockchain is essentially a decentralized database and serves as the underlying technology of Bitcoin. The blockchain is a series of data blocks generated using cryptographic methods. Each data block contains information about a Bitcoin network transaction and is used to verify the validity of the information (anti-counterfeiting) and generate the next block.
In a narrow sense, blockchain is a chain data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be non-tamperable and non-forgeable. Ledger.
Broadly speaking, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, uses cryptography to ensure the security of data transmission and access, and uses A new distributed infrastructure and computing paradigm that uses smart contracts composed of automated script code to program and manipulate data.
What are the characteristics of blockchain?
Through the summary and analysis of the blockchain, it is concluded that the characteristics of the blockchain have the following four main points: Open Yingpai
1. The first is the disintermediation of trust, which has been repeatedly emphasized and praised. What Weihe said yesterday is not decentralization but disintermediation, which coincides with each other.
2. The second feature is its stability, reliability, and sustainability. Because it is a distributed network architecture, no central node can be hit or attacked, so in the overall technical layout It has stronger stability, reliability and sustainability.
3. Third, its strong security and consensus mechanism do not require the entry of a third party, but are achieved through a technology, a previously scheduled technology to complete the entire transaction.
4. The fourth is the openness, transparency and non-tamperability of transactions. Many practitioners in the industry have shared these characteristics with you, so these are the four characteristics of the blockchain.
Because of these characteristics, blockchain can receive huge attention from many financial institutions and many industries in the future or now.
The above is what the editor brings to you. What does blockchain mean? What are the characteristics of blockchain? all content.

⑥ What exactly is blockchain technology

Blockchainchain) is an important concept of Bitcoin. It is essentially a decentralized database. Blockchain is a new application of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. model. Blockchain, as the underlying technology of Bitcoin, is a series of data blocks generated using cryptographic methods. Each data block contains a batch of Bitcoin network transaction information, which is used to verify the validity of the information. (anti-counterfeiting) and generate the next block.
The content of this article comes from: China Law Press "Financial Code of the People's Republic of China: Application Edition"

⑦ The development of blockchain applications has gone through several stages

Blockchain Principle of chain technology

From a definition point of view, blockchain is a traceable chain data structure that combines continuously generated information blocks in chronological order. A distributed ledger that uses cryptography to ensure that data cannot be tampered with or forged.

Blockchain is an innovative application formed by combining asymmetric encryption algorithms, consensus mechanisms, distributed storage, point-to-point transmission and other related technologies in new ways. The biggest advantage and direction of blockchain technology is "decentralization". By using cryptography, consensus mechanisms, game theory and other technologies and methods, decentralized credit-based decentralization can be realized in a distributed system where network nodes do not need to trust each other. Peer-to-peer trading.

The excellent characteristics of blockchain come from its unique technical foundation. A basic blockchain must at least consist of three parts: data layer, network layer and consensus layer.

The data layer provides a unique data structure to ensure security, and uses asymmetric encryption, hash function, Merkle tree and other technologies to encrypt data to ensure data security and provide the basis for blockchain applications;

p>

The network layer realizes the core idea of ​​decentralization through the P2P network. In the BitTorrent network, each node is both a data receiver and a data sender.

In blockchain technology, the public key is similar to a seed. With the public key, you have an identity that can speak in the network. At present, the consensus mechanisms mainly include PoW, PoS and DPoS consensus mechanisms. If you want to attack the blockchain, you must provide greater computing power than Zhu Lian. The benefits obtained are far less than the cost of the attack. The PoW consensus mechanism competes through computing power. Ensure the security and decentralization of the system.



——For more data and analysis, please refer to the "Forward-looking Industry Research Institute" China Blockchain Industry Market Prospects and Investment Strategic Planning Analysis Report".

⑧ What is the knowledge related to blockchain? Can you please help me explain it?

Shared from District View Network
1. Basic Concepts
District There are many definitions of blockchain. Here, I will analyze the opinions of various experts, eliminate the complex and simplify, and adopt a more easy-to-understand explanation:
English name of blockchain: Blockchain is also called Block chain, which is a chain data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be an untamperable and unforgeable distributed ledger.
Blockchain is essentially a distributed database, a series of data blocks generated using cryptographic methods. Each data block contains information about a network transaction, which is used to verify the validity of its information. (anti-counterfeiting) and generate the next block.
2. Working principle
The core potential of blockchain lies in the characteristics of distributed databases and how it can contribute to transparency, security and efficiency.
In the past, institutions used centralized databases to support transaction processes and calculations. Control of the database rests with its owner, who manages access and update permissions to the database, limiting transparency and scalability and making it difficult for outsiders to ensure that data records have not been manipulated.
At the same time, due to technical limitations, distributed databases are basically impossible to implement. But with advances in software, communications and encryption technology, a distributed database across an organization is now possible. Blockchain gradually emerged.
3. Core ideological connotation
The basic idea of ​​blockchain is to establish a network-based public ledger (data block), and each block contains information about a network transaction. All participating users in the network jointly record and verify accounts on the ledger. All data is open and transparent and can be used to verify the validity of the information. In this way, the authenticity and non-tamperability of information can be guaranteed at the technical level without the need for a central server to act as a trust intermediary.

⑨ Modern cryptography in blockchain

1983 - Blind signature described by David Chaum
1997 - HashCash invented by Adam Back (an example of a proof-of-work system )
2001 - Ron Rivest, Adi Shamir and Yael Tauman proposed ring signatures to the crypto community
2004 - Patrick P. Tsang and Victor K. proposed using a ring signature system for voting and electronic cash;< br /> 2008 - Bitcoin White Paper published by Satoshi Nakamoto
2011 - Analysis of Anonymity in the Bitcoin System, Fergal Reid and Martin Harrigan
2012 - Destination Address Bitcoin Anonymity (Disposable in CryptoNote address).

Secure multi-party computation originated from Yao Qizhi’s millionaire problem in 1982. Later Oded Goldreich had a more detailed and systematic discussion.

The Yao Millionaire Problem was first raised by Professor Yao Qizhi, a Chinese computer scientist and Turing Award winner. The problem is formulated as follows: Two millionaires, Alice and Bob, want to know who of them is richer, but neither of them wants the other to know any information about their wealth. This problem has some practical applications: Suppose Alice wants to buy some goods from Bob, but the maximum amount she is willing to pay is x yuan; the minimum price Bob wants to sell for is y yuan. Both Alice and Bob really want to know which is bigger, x or y. If x>y, they can all start bargaining; if z
This scheme is used to compare two numbers to determine which one is larger. Alice knows an integer i; Bob knows an integer j. Alice and B0b want to know whether i>=j or j>i, but neither wants the other party to know their own numbers. For simplicity, assume that the range of j and i is [1, 100]. Bob has a public key Eb and a private key Db.

The research on Secure Multi-Party Computation is mainly aimed at the problem of how to safely calculate an agreed function without a trusted third party. Secure multi-party computation is used in electronic elections, electronic It plays an important role in scenarios such as voting, electronic auctions, secret sharing, and threshold signatures.

Homomorphic Encryption is an Open Problem proposed in the cryptography community a long time ago. As early as 1978, Ron Rivest, Leonard Adleman, and Michael L. Dertouzos proposed this concept in the context of banking [RAD78]. Yes, you read that right, Ron Rivest and Leonard Adleman are R and A respectively in the famous RSA algorithm.

What is homomorphic encryption? Craig Gentry, who proposed the first construction of Fully Homomorphic Encryption [Gen09], gave the best intuitive definition: A way to delegate processing of your data, without giving away access to it.
< br /> What does this mean? General encryption schemes focus on data storage security. That is, I want to send an encrypted thing to other people, or I want to store something on a computer or other server, and I want to process the data.Lines are encrypted before being sent or stored. Without the key, it is impossible for the user to obtain any information about the original data from the encrypted result. Only users with the key can correctly decrypt and obtain the original content. We noticed that during this process, users cannot do any operations on the encryption results, they can only store and transmit them. Any operation on the encryption result will result in incorrect decryption or even decryption failure.

The most interesting thing about the homomorphic encryption scheme is that it focuses on data processing security. Homomorphic encryption provides a function for processing encrypted data. That is, others can process the encrypted data, but the processing will not reveal any of the original content. At the same time, the user who has the key decrypts the processed data and gets exactly the processed result.

A bit abstract? Let’s take a real-life example. A user named Alice bought a large piece of gold, and she wanted workers to make it into a necklace. But workers may steal gold during the building process. After all, even one gram of gold is worth a lot of money... So is there a way for workers to process the gold nuggets (delegate processing of your data), but Not getting any gold (without giving away access to it)? Of course there is a way, Alice can do this: Alice locks the gold in a sealed box, and this box is equipped with a glove. Workers can wear this glove to handle the gold inside the box. But the box was locked, so not only could the workers not get to the gold nuggets, but they also couldn't get to any gold that fell out during handling. After processing is completed. Alice took the box back, opened the lock, and got the gold.

The correspondence here is: Box: Encryption algorithm Lock on the box: User key Put the gold nugget in the box and lock it with a lock: Encrypt the data using a homomorphic encryption scheme : Apply the homomorphic feature to directly process the encryption result under the condition that the data cannot be obtained. Unlock: Decrypt the result and directly obtain the processed result. Where can homomorphic encryption be used? Hasn’t the concept of cloud computing been mentioned in recent years? Homomorphic encryption is almost tailor-made for cloud computing! Let's consider the following scenario: a user wants to process a piece of data, but his computer's computing power is weak. This user can use the concept of cloud computing and let the cloud help him process and get the results. But if the data is handed over directly to the cloud, security cannot be guaranteed! Therefore, he can use homomorphic encryption, and then let the cloud process the encrypted data directly and return the processing results to him. In this way: the user pays the cloud service provider and gets the processing results; the cloud service provider earns the fee and correctly processes the data without knowing the user's data;

Aggregated signatureProposed by Boneh et al., it mainly improves the efficiency of signature and verification by aggregating multiple signatures into one signature. To sign data of multiple users, aggregate signatures can greatly reduce the complexity of signature calculations. CL is the aggregate signature.

There are two participants in the zero-knowledge proof process, one is called the prover and the other is called the verifier. The prover holds a secret, and he wants the verifier to believe that he holds the secret, but he does not want to reveal the secret to the verifier.

Both parties follow an agreement and through a series of interactions, the verifier will eventually draw a clear conclusion that the prover does or does not know the secret.

For the example of Bitcoin, whether a transfer transaction is legal or not actually only needs to prove three things:

The money sent belongs to the person who sent the transaction
Send The amount sent by the sender is equal to the amount received by the receiver
The sender's money was indeed destroyed
During the entire proof process, the miners do not actually care about the specific amount of money spent, who the sender is, and the recipient Who exactly is it? Miners only care about whether the system's money is conserved.

zcash uses this idea to implement private transactions.

The three properties of zero-knowledge proof correspond to:

(1) Completeness. If both the prover and the verifier are honest, follow every step of the proof process, and perform correct calculations, then the proof must be successful and the verifier must be able to accept the prover.
(2) Rationality. No one can impersonate the prover and make this proof successful.
(3) Zero knowledge. After the proof process is completed, the verifier only obtains the information that "the prover possesses this knowledge", but does not obtain any information about the knowledge itself.

There are only ring members, no managers, and no cooperation between ring members is required. The signer can sign independently by using his own private key and the public keys of other members in the set, without the need for other members. With the help of people, other members of the set may not be aware that they are included.
Ring signatures can be used as a way to reveal secrets, for example, a ring signature can be used to provide an anonymous signature from a "senior White House official" without revealing which official signed the message. Ring signatures are suitable for this application because the anonymity of a ring signature cannot be revoked and because the group used for the ring signature can be created on the fly.

1) Key generation. Generate a key pair (public key PKi, private key SKi)
2) signature for each member in the ring. The signer uses his own private key and the public keys of any n ring members to generate a signature a
for message m
3) Signature verification. SignerBased on the ring signature and message m, verify whether the signature is signed by a member of the ring. If valid, receive it; if invalid, discard it.

General process of group signature

Blind digital signature (Blind Signature), referred to as blind signature - is a digital signature method. Before the message content is signed, the signature The content of the message is invisible to the user. In 1982, David Chaum first proposed the concept of blind signature. Because of its blindness, blind signature can effectively protect the specific content of the signed message, so it is widely used in fields such as e-commerce and electronic elections.

Analogy example: To sign a document is to put a piece of carbon paper in the envelope. When the signer signs the envelope, his signature is signed on the document through the carbon paper.

The so-called blind signature is to first put the concealed document into an envelope, and the process of removing the blind factor is to open the envelope. When the document is in an envelope, no one can read it. Signing a document is done by placing a piece of carbon paper in the envelope. When the signer signs the envelope, his or her signature is transferred to the document through the carbon paper.

Generally speaking, a good blind signature should have the following properties:

Unforgeable. No one can generate a valid blind signature in his name except the signer himself. This is the most basic property.
Non-repudiation. Once a signer signs a message, he cannot deny his signature on the message.
Blindness. Although the signer signs a message, he cannot obtain the specific content of the message.
Untraceability. Once the signature of a message is made public, the signer cannot be sure when he or she signed the message.
Blind signatures that meet the above properties are considered safe. These four properties are not only the standards we should follow when designing blind signatures, but also the basis for us to judge the performance of blind signatures.

In addition, the operability and implementation efficiency of the solution are also important

factors that we must consider when designing blind signatures. The operability and implementation speed of a blind signature depend on the following aspects:

1. The length of the key;
2. The length of the blind signature;
3. Blind Signature algorithm and verification algorithm.
Specific steps of blind signature
1. The recipient first blindly transforms the data to be signed, and sends the transformed blind data to the signer.
2. After being signed by the signer, it will be sent to the recipient.
3. The recipient’s signatureAfter performing the blinding transformation, the result is the blind signature of the original data by the signer.
4. This meets the condition ①. To satisfy condition ②, the signer must not be able to associate the blind signature with the blind data when he sees it afterwards. This is usually achieved by relying on some kind of protocol.

博客主人唯心底涂
男,单身,无聊上班族,闲着没事喜欢研究股票,无时无刻分享股票入门基础知识,资深技术宅。
  • 39805 文章总数
  • 3637507访问次数
  • 3093建站天数