Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Message hash chain construction method and device

A technology of a message hash chain and a construction method, applied in the field of message hash chain construction, can solve the problems of low data transmission performance, inability to guarantee the non-repudiation of the message, and high overhead, so as to improve security and ensure Integrity and non-repudiation, the effect of improving efficiency

Pending Publication Date: 2021-07-13
BEIJING INFORMATION SCI & TECH UNIV
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the current network data transmission process, the message authentication code can be used to verify the integrity of the message, and the shared key method can be used to improve the security of data transmission, but the non-repudiation of the message cannot be guaranteed.
The method of using public and private keys to sign and authenticate the message can ensure the non-repudiation of the message, but the overhead of this method is large, resulting in low performance of data transmission

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message hash chain construction method and device
  • Message hash chain construction method and device
  • Message hash chain construction method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0028] figure 1 A flowchart showing a method for constructing a message hash chain provided by an embodiment of the present invention, see figure 1 , the method for constructing the message hash chain provided by the embodiment of the present invention includes:

[0029] S1, build a hash chain, the hash chain includes: the first node value connected in sequence, the intermediate node value and the chain tail node value, where the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and a device for constructing a message hash chain, which can form a hash chain about a message sequence by using a hash value of a transmitted message through iterative hash. The integrity, authenticity and synchronism of a message sequence can be ensured by both communication parties through a hash chain, so that the security of message transmission is greatly improved; when data signature authentication is carried out, two communication parties only need to carry out signature authentication according to data messages at certain intervals, signature authentication does not need to be carried out on each data message, the integrity and non-repudiation of a plurality of messages can be ensured, the overhead of signature authentication is reduced, and thus the message transmission efficiency is effectively improved.

Description

technical field [0001] The invention relates to the field of computers, in particular to a method and device for constructing message hash chains. Background technique [0002] In the current network data transmission process, the integrity of the message can be verified by the message authentication code, and the security of data transmission can be improved by using the shared key method, but the non-repudiation of the message cannot be guaranteed. The method of using the public and private keys to sign and authenticate the message can ensure the non-repudiation of the message, but the overhead of this method is large, resulting in low performance of data transmission. Contents of the invention [0003] The present invention aims to provide a method and device for constructing a message hash chain that overcomes the above problems or at least partially solves the above problems. [0004] In order to achieve the above object, the technical solution of the present inventi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
CPCH04L9/3247H04L9/3242Y02D10/00
Inventor 蒋文保韩明轩
Owner BEIJING INFORMATION SCI & TECH UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products