Anti-quantum-attack electronic contract signing method and system

An anti-quantum attack and electronic contract technology, applied in data processing applications, instruments, digital data authentication, etc., can solve security risks, security risks and other issues, and achieve the effect of ensuring fairness and small amount of mathematical calculations

Pending Publication Date: 2022-07-01
QUANTUMCTEK +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As we all know, the RSA asymmetric key encryption algorithm is computationally secure. Facing the research and construction of foreseeable quantum computers, there are security risks in the cryptographic system based on computational complexity. Therefore, the current electronic contract signing method based on asymmetric key technology There are security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-quantum-attack electronic contract signing method and system
  • Anti-quantum-attack electronic contract signing method and system
  • Anti-quantum-attack electronic contract signing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047]Symmetric key algorithm is a cryptographic algorithm that uses the same secret key for encryption and decryption. The characteristics of this cryptosystem are that the amount of mathematical operations is small, the encryption speed is fast, and it is easy to handle, but the distribution of symmetric keys is difficult. The emergence of quantum cryptography network solves the problem of symmetric key distribution. Through quantum cryptography network, both encryption parties can easily obtain a shared symmetric key by means of quantum key distribution.

[0048] This embodiment relies on the abundant symmetric key resources of the quantum cryptography network to implement an electronic contract signing method that is resistant to quantum attacks. attached figure 1 For the relationship between the signatory and the trusted center, the functions of each component are detailed as follows:

[0049] The trusted center is a third-party trusted organization, which is used for d...

Embodiment 2

[0073] In this embodiment, a quantum-attack-resistant electronic contract signing system is provided, including:

[0074] The electronic contract signing server is configured as a trusted third party in the electronic contract signing process, distributes the shared key to the signers of each client through the quantum cryptography network, performs symmetric key signature on the electronic contract, and encrypts the digital signature Obtain the signature hidden information, divide the key of the true random number digital signature keystore according to the length used for each digital signature, and perform sequential labeling to verify the electronic contract signature;

[0075] Several clients are configured to provide each signer with information services in the process of contract signing, and use the shared key to communicate with the electronic contract signing server.

[0076] The electronic contract signing server distributes the shared key to the certified signers o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anti-quantum-attack electronic contract signing method and system. A trusted center distributes a shared key to each signing party through a quantum cryptographic network; the trusted center generates first signature information and signature hidden information according to a request generated by a first signing party by using the shared key, and sends the first signature information and the signature hidden information to the first signing party; the first signing party sends the signature hidden information to a second signing party, and the second signing party requests the trusted center for second signature information by using the shared key after verifying that the signature hidden information is correct to the trusted center; the first signing party receives second signature information sent by the second signing party, and after the credible center verifies that the second signature information is correct, the first signing party sends the first signature information to the second signing party; after the second signing party sends the received first signature information to the credible center to verify that the signature information is correct, the signing of the electronic contract is completed; the defect that the security of a traditional electronic contract signing method based on PKI is based on calculation security is fundamentally eliminated.

Description

technical field [0001] The present disclosure relates to the field of encrypted communication of quantum cryptography networks, in particular to a method and system for signing electronic contracts that are resistant to quantum attacks. Background technique [0002] The statements in this section merely provide background related to the present disclosure and do not necessarily constitute prior art. [0003] Electronic contracts, also known as e-commerce contracts, emerged with the development of computer technology and automatic office technology. Its essence is to transmit information through electronic pulses, which changes the traditional practice of using paper as the original certificate. A set of electronic messages. Under normal circumstances, an electronic contract can be defined as: an electronic contract is an agreement between two or more parties to establish, change, and terminate the relationship between property and civil rights and obligations in electronic ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46G06F21/64G06Q50/18
CPCG06F21/46G06F21/64G06Q50/18
Inventor 不公告发明人
Owner QUANTUMCTEK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products