Cryptographic communication system and cryptographic communication method based on blockchain
11722316 · 2023-08-08
Assignee
Inventors
Cpc classification
H04L9/3239
ELECTRICITY
H04L9/3268
ELECTRICITY
H04L9/0891
ELECTRICITY
H04L9/3263
ELECTRICITY
International classification
H04L9/32
ELECTRICITY
Abstract
A cryptographic communication system includes an electronic device configured to output a certificate and a transaction including a first hash value in which a certificate is hashed certificate, and a node configured to first determine whether the electronic device generated the transaction based on the transaction and the certificate, to second determine whether information included in the transaction and information included in the certificate coincide, and to third add a block to a distributed ledger depending on the result of the first determining and the second determining. The block includes the transaction, and the electronic device is configured to generate the certificate such that the certificate includes an ID of the electronic device and a public key of the electronic device.
Claims
1. A cryptographic communication system comprising: an electronic device configured to output a certificate and a transaction including a public key, a signature, and a first hash value of the certificate; and a node configured to first determine whether the electronic device generated the transaction based on the transaction and the certificate by comparing a second hash value generated by hashing of the certificate to a third hash value generated by decrypting the signature with the public key, to second determine whether information included in the transaction and information included in the certificate coincide by comparing the first hash value to the second hash value, and to third add a block to a distributed ledger depending on the result of the first determining and the second determining, wherein the block includes the transaction, wherein the electronic device is configured to generate the certificate such that the certificate includes an ID of the electronic device and the public key of the electronic device, wherein the electronic device is configured to execute a blockchain wallet and to generate the ID, the public key, and a private key corresponding to the public key, and wherein, in response to the electronic device intending to register identity information on the distributed ledger, the electronic device is configured to generate a transaction such that the transaction includes a message including the ID, a registration command, the public key, and the first hash value, the signature being a result of an encryption of the message based on the private key.
2. The cryptographic communication system of claim 1, wherein the electronic device is configured to generate the certificate such that each of an issuer field and a subject field of the certificate includes information about the ID.
3. The cryptographic communication system of claim 1, wherein the node is configured to determine that information included in the transaction and information included in the certificate coincide, in response to (a) the ID included in the transaction and an ID that the certificate coinciding, and (b) the public key included in the transaction and a public key that the certificate coinciding.
4. The cryptographic communication system of claim 1, wherein, in response to the electronic device intending to revoke identity information registered at the distributed ledger after the identity information is registered at the distributed ledger, the electronic device is configured to generate a transaction such that the transaction includes a signature and a message including the ID, a revoke command, the public key, and the first hash value, the signature being a result of an encryption of the message based on the private key.
5. The cryptographic communication system of claim 1, wherein, in response to the electronic device intending to update the identity information registered at the distributed ledger, the electronic device is configured to generate a new private key and a new public key corresponding to the new private key, to generate a new certificate including the new public key, and to generate a new transaction including (1) a first signature, (2) a second signature, and (3) a new message including (a) the ID, (b) an update command, (c) the public key, and (d) the new public key, and (e) a fourth hash value of a hashing of the new certificate, the first signature corresponding to an encryption of the message and the first hash value based on the private key, and the second signature corresponding to an encryption of the new message based on the new private key.
6. The cryptographic communication system of claim 5, wherein the node is configured to determine that the electronic device generated the new transaction in response to (a) a hash value of a hashing of the certificate received from the electronic device and the fourth hash value being match with a value of a decryption of the first signature based on the public key included in the transaction, and (b) a fifth hash value of a hashing of the new certificate received from the electronic device being matched with a value of a decryption of the second signature based on the new public key included in the new transaction, and the node is configured to determine that information included in the new transaction and information included in the new certificate coincide, in response to the ID included in the new transaction and an ID associated with the new certificate coincide, the new public key included in the new transaction and a new public key included in the new certificate coincide, and the fourth hash value and the fifth hash value coincide.
7. The cryptographic communication system of claim 1, further comprising: an extended electronic device having an extended public key and an extended private key, wherein, in response to the electronic device intending to share the ID with the extended electronic device, the electronic device is configured to generate an extended certificate including the extended public key, and is configured to generate an extended transaction including (1) a first signature, (2) a second signature, and (3) an extended message including (a) the ID, (b) an extension command, (c) the public key, (d) the extended public key, and (e) a fourth hash value of a hashing of the extended certificate, the first signature corresponding to an encryption of the message and the first hash value based on the private key, and (f) the second signature corresponding to an encryption of the extended message based on the extended private key.
8. The cryptographic communication system of claim 7, wherein the node is configured to determine that the electronic device generated the extended transaction, in response to (a) a hash value of a hashing of the certificate received from the electronic device and the third hash value matching with a value of a decryption of the first signature based on the public key included in the transaction, and (b) a fifth hash value of a hashing of the extended certificate received from the electronic device matching with a value of a decryption of the second signature based on the extended public key included in the extended transaction, and the node is configured to determine that information included in the extended transaction and information included in the extended certificate coincide, in response to the ID included in the extended transaction and an ID included in the extended certificate coinciding, the extended public key included in the extended transaction and an extended public key included in the extended certificate coinciding, and the fourth hash value and the fifth hash value coinciding.
9. An electronic device of a cryptographic communication system, comprising: an interface; processing circuitry; and a memory configured to store instructions executable by the processing circuitry, wherein the instructions, when executed by the processing circuitry, cause the processing circuitry to, generate a first certificate including an ID and a public key, the ID and the public key being associated with the electronic device, generate a first transaction including a public key, a signature and a first hash value of a hashing of the first certificate, output the first certificate and the first transaction to a distributed ledger through the interface, obtain a second transaction including an identity of an external electronic device from the distributed ledger in response to a second certificate indicating the external electronic device received the identity of the external electronic device, and verify the identity of the external electronic device based on the second certificate and the second transaction by comparing a second hash value generated by hashing of the certificate to a third hash value generated by decrypting the signature with the public key, wherein the electronic device is confirmed to execute a blockchain wallet and to generate the ID, the public key, and a private key corresponding to the public key, and wherein, in response to the electronic device intending to register identity information on the distributed ledger, the electronic device is configured to generate a transaction such that the transaction includes a message including the ID, a registration command, the public key, and the first hash value, the signature being a result of an encryption of the message based on the private key.
10. The electronic device of claim 9, wherein the instructions, when executed by the processing circuitry, cause the processing circuitry to: generate the first certificate that the first certificate complies with an X.509 certificate format.
11. The electronic device of claim 9, wherein the certificate includes a serial number field, a signature algorithm ID field, an issuer field, a validity period field, a subject field, a public key information field, an issuer unique ID field, an extension field, and a certificate signature field, wherein the signature algorithm ID field includes information about a hash algorithm is used by the electronic device, and wherein the issuer field and the subject field include information about the ID of the electronic device.
12. The electronic device of claim 9, wherein a communication between the electronic device and the external electronic device is based on a structure compatible with a TLS 1.2 handshake protocol.
13. A cryptographic communication method comprising: receiving a first certificate of a first electronic device and a first transaction including a signature, a public key, and a first hash value of the certificate; comparing a first result value corresponding to a decryption of the signature of the first transaction, the decryption being of the signature and based on the first public key included in the first transaction, the comparison being with a second hash value of a hashing of the first certificate received from the first electronic device; comparing information included in the first transaction with information included in the first certificate; and registering the first transaction at a distributed ledger in response to the first result value and the second hash value coinciding, and the information included in the first transaction and the information included in the first certificate coinciding, wherein the method comprises executing a blockchain wallet and generating the public key, and a private key corresponding to the public key, and wherein, in response to the electronic device intending to register identity information on the distribute ledger, the method comprises generating a transaction such that the transaction includes a message including the ID, a registration command, the public key, and the first hash value, the signature being a result of an encryption of the message based on the private key.
14. The cryptographic communication method of claim 13, further comprising: receiving a second certificate of a second electronic device and a second transaction including a third hash value of the second certificate; comparing a second result value corresponding to a decryption of a portion of the second transaction based on a second public key included in the second transaction with a fourth hash value of a hashing of the second certificate received from the second electronic device; comparing information included in the second transaction with information included in the second certificate; and registering the second transaction at the distributed ledger in response to the second result value and the fourth hash value coinciding and the information included in the second transaction and the information included in the second certificate coinciding.
15. The cryptographic communication method of claim 14, further comprising: verifying an identity of the second electronic device by receiving the second certificate from the second electronic device, obtaining the second transaction registered at the distributed ledger, and performing a verification operation on the second transaction obtained from the distributed ledger and the second certificate received from the second electronic device.
16. The cryptographic communication method of claim 14, further comprising: verifying an identity of the second electronic device by receiving the second certificate from the second electronic device, looking up blocks stored in the first electronic device to obtain the second transaction, and performing a verification operation on the second transaction obtained from the first electronic device and the second certificate received from the second electronic device.
17. The cryptographic communication method of claim 16, further comprising: downloading blocks registered prior to the blocks from the distributed ledger in response to the second transaction not being obtained from the blocks stored in the first electronic device; and looking up the blocks registered prior to the blocks to obtain the second transaction.
18. The cryptographic communication system of claim 1, wherein the node corresponds to a second electronic device.
19. The cryptographic communication system of claim 1, wherein the first hash value is generated based on a SHA256 hash.
20. The cryptographic communication system of claim 1, wherein the encryption corresponds to at least one of a Diffie-Hellman key exchange encryption, a RSA encryption, a Rabin encryption, an ElGamal encryption, a DSA encryption, or an elliptic-curve encryption.
Description
BRIEF DESCRIPTION OF THE FIGURES
(1) The above and other objects and features of inventive concepts will become apparent by describing in detail example embodiments thereof with reference to the accompanying drawings.
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
(13)
(14)
(15)
(16)
(17)
(18)
(19)
(20)
(21)
(22)
(23)
(24)
DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS
(25) Below, some example embodiments of inventive concepts may be described in detail and clearly to such an extent that an ordinary one in the art easily implements inventive concepts.
(26) Inventive concepts may provide a cryptographic communication system and/or a cryptographic communication method based on blockchain.
(27) As used herein, a “blockchain” may mean and/or correspond to a distributed ledger technology that allows nodes in a network to record and manage a ledger, e.g. a common ledger, recording transaction information. The distributed ledger may mean that a ledger is distributed into a peer-to-peer (P2P) network, and is not at a central server of a specific authority. All nodes in the P2P network may provide resources such as processing capability, storage space, data, network bandwidth, etc., to each other without interference of and/or communication with a central node. There may be some mechanism, such as a proof-of-work and/or a proof-of-stake mechanism, wherein nodes of the P2P network securely update the distributed blockchain network; however, example embodiments are not limited thereto.
(28) In general, a “blockchain wallet” may mean and/or correspond to a mechanism that stores a value in an electronic device by an electronic method and enables online and/or offline transactions without an exchange of a commodity money. In particular, the “blockchain wallet” mentioned herein may be and/or correspond to and/or include a program that is used to generate a transaction and a certificate, the certificate being based on a public key and/or a private key, etc. The blockchain wallet may be implemented through software including program codes and/or may be implemented through hardware storing program codes.
(29) As used herein, a “hash” may mean and/or correspond to a function mapping data of any length onto data of a fixed length. A “hash value” may mean a value that is obtained by a hash function.
(30) As used herein, an “electronic device” may mean and/or correspond and/or include a device that is supplied with electric energy and operates. For example, an electronic device may be or include, but is not limited to, a smartphone, a tablet personal computer (PC), a smart TV, a mobile phone, a personal digital assistant (PDA), a laptop, a stationary computing device, etc.
(31) As used herein, a “node” may mean and/or correspond to and/or include a component in a blockchain network. For example, the node may be or include, but is not limited to, a special-purpose computer, a general-purpose computer, a supercomputer, a mainframe computer, a personal computer, a smartphone, a tablet PC, etc.
(32)
(33) Based on a blockchain, a cryptographic communication system 10 may verify electronic devices 100, 200, and 300, and may verify transactions between the electronic devices 100, 200, and 300. The cryptographic communication system 10 may include the first electronic device 100, the second electronic device 200, the third electronic device 300, and a blockchain network 400. Below, for convenience of description, nodes 410 to 440 of the blockchain network 400 and the electronic devices 100 to 300 are illustrated to be independent of each other, but the electronic devices 100 to 300 may provide the same or substantially the same operations as the nodes 410 to 440. For example, the electronic devices 100 to 300 may also operate as a client of the blockchain network 400 like the nodes 410 to 440.
(34) The electronic devices 100, 200, and 300 may provide the same or substantially the same operations. Accordingly, in the following descriptions, operations of the first electronic device 100 will be mainly described.
(35) The first electronic device 100 may execute a blockchain wallet. The first electronic device 100 may generate a private key SK.sub.1, a public key PK.sub.1, a transaction 110, and a certificate 120, by using/based on the blockchain wallet. The private key SK.sub.1 may be known only to the first electronic device 100 and may not be known or publicly accessible to other external components such as electronic devices 200, 300, and 410 to 440. The public key PK.sub.1 may be known to/accessible by all the components/electronic devices 200, 300, and 410 to 440 in the cryptographic communication system 10.
(36) The first electronic device 100 may encrypt a message by using the private key SK.sub.1. The remaining components 200, 300, and 410 to 440 may decrypt the encrypted message by using the public key PK.sub.1. Encrypting a message with the private key SK.sub.1 may mean or correspond to signing the message with the private key SK.sub.1. A method in which the first electronic device 100 encrypts a message may be at least one of a Diffie-Hellman key exchange method, a RSA method, a Rabin method, an ElGamal method, a DSA method, and/or an elliptic-curve method. However, example embodiments are not limited thereto. For example, the first electronic device 100 may encrypt a message by using any other method other than methods described herein, such as post-quantum encryption method.
(37) The transaction 110 may be, include, or correspond to a character string in which there is contained information of a transaction, e.g. an update transaction, that the first electronic device 100 requests from the blockchain network 400. The transaction 110 may include information about an identity of the first electronic device 100 and a command that the first electronic device 100 requests from/of the blockchain network 400. The transaction 110 will be more fully described with reference to
(38) The certificate 120 may be, include, or correspond to a document and/or string indicating the identity of the first electronic device 100. The certificate 120 may include at least the following information: an ID of the first electronic device 100 and the public key PK.sub.1 of the first electronic device 100. The certificate 120 will be more fully described with reference to
(39) The first electronic device 100 may output the transaction 110 and the certificate 120 to the blockchain network 400, e.g. may output the transaction 110 and the certificate 120 over a P2P network corresponding to the blockchain network 400.
(40) The blockchain network 400 may receive the transaction 110 and the certificate 120 output from the first electronic device 100. The blockchain network 400 may include the nodes 410 to 440. The node 410 may perform a verification operation on the transaction 110 and the certificate 120. However, example embodiments are not limited thereto. For example, at least one of the remaining nodes 420 to 440 may perform an operation of verifying a transaction and a certificate. For example, the operation of verifying the transaction 110 and the certificate 120 may include an operation of determining whether the transaction 110 and the certificate 120 are generated from the first electronic device 100, and an operation of determining whether information about the first electronic device 100 included in the certificate 120 and information about the first electronic device 100 included in the transaction 110 coincide.
(41) After the transaction 110 and the certificate 120 have been fully verified, the node 410 may generate a block including the transaction 110. The node 410 may output the generated block to the remaining nodes 420 to 440, for example over the P2P network. In this case, the generated block may be recorded at a distributed ledger on the blockchain network 400. For example, the transaction 110 may be registered at the distributed ledger on the blockchain network 400.
(42)
(43) The transaction 110 may include a message 111 (e.g. a payload) and a signature σ.sub.1.
(44) The message 111 may include an identification, e.g. an ID DID.sub.1 of the first electronic device 100 of
(45) The signature σ.sub.1 may be a result of encrypting the message 111 by using the private key SK.sub.1 of
(46) The node 410 of
(47)
(48) Referring to
(49) A command may include “REG”, “UPD”, and “REV”, and may correspond to commands to be performed within the blockchain 400 of
(50) The electronic device “x” may use the “REG” command when intending to register identity information of the electronic device “x” at or within a distributed ledger such as the blockchain 400 of
(51) The electronic device “x” may use the “UPD” command when intending to update the identity information of the electronic device “x” registered at or within the distributed ledger. In a case of using the “UPD” command, the electronic device “x” may generate a message Mx including “DIDx”, “REG”, “{PKx.sub.0, PKx.sub.1}”, and “HCx”. The electronic device “x” may request the node 410 to update a public key of the “DIDx” registered at the distributed ledger from “PKx.sub.0” to “PKx.sub.1”, by using the message Mx. For example, after the electronic device “x” updates the public key of the “DIDx” registered at the distributed ledger from “PKx.sub.0” to “PKx.sub.1”, in a case where the electronic device “x” again updates the public key of the “DIDx” registered at the distributed ledger from “PKx.sub.1” to “PKx.sub.2”, the electronic device “x” may generate a message Mx including “DIDx”, “REG”, “{PKx.sub.0, PKx.sub.2}”, and “HCx”. For example, the message Mx may be generated to include information about the public key PKx.sub.0 registered for the first time and information about the public key PKx.sub.2 to be registered at a distributed ledger. When a transaction and a certificate of the electronic device “x” are completely verified, the node 410 may generate a block including the message Mx and may register the block at the distributed ledger.
(52) The electronic device “x” may use the “REV” command when intending to revoke the identity information of the electronic device “x” registered at the distributed ledger. In a case of using the “REV” command, the electronic device “x” may generate a message Mx including “DIDx”, “REV”, “PKx”, and “HCx”. The electronic device “x” may request the node 410 to revoke the public key of the “DIDx” registered at the distributed ledger, by using the message Mx.
(53)
(54) The first electronic device 100 of
(55)
(56) The first electronic device 100 of
(57) Each field of the certificate 120a complying with the X.509 certificate format is described with reference to
(58) A version field indicates a version of a certificate.
(59) A serial number field indicates a unique serial number of a certificate, which the certification authority (CA) specifies. Because the CA does not exist in the cryptographic communication system 10 of inventive concepts, the serial number field of the certificate 120a may indicate a number that the first electronic device 100 randomly generates. Alternatively and/or additionally, the serial number field of the certificate 120a may be filled with random and/or meaningless information, and/or may be reserved for future use.
(60) A signature algorithm ID field may indicate an algorithm and an algorithm identifier that the CA uses when signing a certificate. The signature algorithm ID field of the certificate 120a may indicate a hash algorithm and/or a hash function that the first electronic device 100 uses. For example, the first electronic device 100 may use an ECDSA (Elliptic Curve Digital Signature Algorithm) and/or an SHA-256 algorithm. In this case, the signature algorithm ID field of the certificate 120a may indicate the ECDSA and/or the SHA-256 algorithm.
(61) An issuer field may indicate information about the certification authority (CA) that issues a certificate. Because an issuer of the certificate 120a is the first electronic device 100, the issuer field of the certificate 120a may indicate the ID DID.sub.1 of the first electronic device 100.
(62) A validity period field may indicate a start date and an end date of a validity period, e.g. a period of time corresponding to the validity of the digital certificate 120a.
(63) A subject field may indicate a name of a certificate owner. For example, the subject field of the certificate 120a may indicate the ID DID.sub.1 of the first electronic device 100.
(64) A public key information field may include a public key algorithm field and a public key value field. The public key value field of the certificate 120a may indicate the public key PK.sub.1 of the first electronic device 100.
(65) An issuer unique ID field and a subject unique ID field may indicate an ID of a certification authority and the ID DID.sub.1 of the first electronic device 100, respectively. The fields may be selectively included in the certificate 120a. Because a certification authority does not exist in the cryptographic communication system 10 of inventive concepts, the issuer unique ID field of the certificate 120a may include a random and/or meaningless bit string, and/or may be reserved for future use.
(66) The first electronic device 100 may additionally include private information in an extension field of the certificate 120a.
(67) A certificate signature field may indicate a certificate signature 122a. The certificate signature 122a may correspond to a result of encrypting a hash value by using the private key SK.sub.1 with the hash value being a result of hashing identity information 121a included in the certificate 120a.
(68) For example, the first electronic device 100 may fill fields associated with a certification authority from among the fields of the X.509 certificate with information about the first electronic device 100. The first electronic device 100 may generate the certificate 120a complying with the X.509 certificate format. This may mean or may indicate that the first electronic device 100 is capable of being used in an X.509 system.
(69)
(70) The first electronic device 100 of
(71) The node 410 of
(72) The node 410 may perform a verification operation on the transaction 110a_1 and the certificate 120a_1. The verification operation associated with the transaction 110a_1 and the certificate 120a_1 may include an operation of determining whether the transaction 110a_1 and the certificate 120a_1 are generated from the first electronic device 100, and an operation of determining whether information of the transaction 110a_1 and information of the certificate 120a_1 coincide. The operation of determining whether the transaction 110a_1 and the certificate 120a_1 are generated from the first electronic device 100 may mean or correspond to an operation of determining whether the transaction 110a and the certificate 120a are or have been attacked/corrupted by an attacker while being transferred from the first electronic device 100 to the node 410.
(73) When the verification succeeds, the node 410 may generate a block including the transaction 110a_1. When the verification fails, the node 410 may revoke the transaction 110a_1 and the certificate 120a_1 received from the first electronic device 100. In the following descriptions, “verification success” may mean or correspond to the transaction 110a_1 and the certificate 120a_1 being generated from the first electronic device 100 and the information of the transaction 110a_1 and the information of the certificate 120a_1 coinciding. Also, “verification fail” may mean or correspond to the transaction 110a_1 and the certificate 120a_1 not being generated from the first electronic device 100, and/or the information of the transaction 110a_1 and the information of the certificate 120a_1 not coinciding.
(74) An operation in which the node 410 determines whether the transaction 110a_1 and the certificate 120a_1 are generated from the first electronic device 100 is described with reference to operation (a) to operation (c) of
(75) The node 410 may compare the hash value generated in operation (a) with the hash value generated in operation (b). That the hash value generated in operation (a) and the hash value generated in operation (b) coincide may mean, indicate, or correspond to the transaction 110a_1 and the certificate 120a_1 being generated from the first electronic device 100. That the hash value generated in operation (a) and the hash value generated in operation (b) do not coincide may mean, indicate, or correspond to the transaction 110a_1 and the certificate 120a_1 not being generated from the first electronic device 100.
(76) When the node 410 determines that the transaction 110a_1 is generated from the first electronic device 100, the node 410 may determine whether the information of the transaction 110a_1 and the information of the certificate 120a_1 coincide, through operation (a) and operation (d) to operation (g).
(77) In operation (d) and operation (e), the node 410 may determine whether an ID DID.sub.10 and an ID DID.sub.11 coincide, by comparing the ID DID.sub.10 of the transaction 110a_1 with the ID DID.sub.11 of the certificate 120a_1. In detail, operation (d) may be or include an operation of comparing the ID DID.sub.10 of the transaction 110a_1 and the ID DID.sub.11 included in the issuer field of the certificate 120a_1. Operation (e) may be or include an operation of comparing the ID DID.sub.10 of the transaction 110a_1 and the ID DID.sub.11 included in the subject field of the certificate 120a_1. The node 410 may selectively perform one of operation (d) or operation (e) or may perform both operation (d) and operation (e).
(78) In operation (f), the node 410 may determine whether a public key PK.sub.10 and a public key PK.sub.11 coincide, by comparing the public key PK.sub.10 of the transaction 110a_1 and the public key PK.sub.11 of the certificate 120a_1.
(79) In operation (g), the node 410 may determine whether a hash value HC.sub.10 included in the transaction 110a_1 and the hash value generated in operation (a) coincide, by comparing the hash value HC.sub.10 and the hash value generated in operation (a).
(80) When is the node 410 determine through operation (a) and operation (d) to operation (g) that the information of the transaction 110a_1 and the information of the certificate 120a_1 coincide, the node 410 may generate a block including the transaction 110a_1. The node 410 may broadcast the block on the P2P network, and may broadcast other information such as a proof-of-work; however, example embodiments are not limited thereto.
(81) The order of operation (a) to operation (g) is not limited to the above description. The first electronic device 100 may perform operation (a) to operation (g) in any order. However, operation (a) may be performed before operation (c) and operation (g) are performed.
(82)
(83) The node 410 of
(84) In operation S110, the node 410 may receive the transaction 110a_1 and the certificate 120a_1 from the first electronic device 100 of
(85) In operation S120, the node 410 may obtain/calculate a hash value of the certificate 120a_1. Operation S120 may correspond to operation (a) of
(86) In operation S130, the node 410 may obtain a hash value by decrypting the signature σ.sub.10 by using the public key PK.sub.10. Operation S130 may correspond to operation (b) of
(87) In operation S140, the node 410 may compare the hash value obtained in operation S120 and the hash value obtained in operation S130. Operation S140 may correspond to operation (c) of
(88) When the hash value obtained in operation S120 and the hash value obtained in operation S130 do not coincide, the node 410 may perform operation S190. When the hash value obtained in operation S120 and the hash value obtained in operation S130 do not coincide, there may be an indication that an attacker has attacked/corrupted the transaction 110a_1 and/or the certificate 120a_1 In operation S190, the node 410 may revoke the transaction 110a_1 and the certificate 120a_1 received from the first electronic device 100 of
(89) When the hash value obtained in operation S120 and the hash value obtained in operation S130 coincide, the node 410 may perform operation S150. In operation S150, the node 410 may compare the ID DID.sub.10 included in the transaction 110a_1 and an ID DID.sub.11 included in the certificate 120a_1. Operation S140 may correspond to operation (d) and operation (e) of
(90) When the ID DID.sub.10 included in the transaction 110a_1 and the ID DID.sub.11 included in the certificate 120a_1 do not coincide, the node 410 may perform operation S190.
(91) When the ID DID.sub.10 included in the transaction 110a_1 and the ID DID.sub.11 included in the certificate 120a_1 coincide, the node 410 may perform operation S160. In operation S160, the node 410 may compare the public key PK.sub.10 included in the transaction 110a_1 and the public key PK.sub.11 included in the certificate 120a_1. Operation S160 may correspond to operation (f) of
(92) When the public key PK.sub.10 included in the transaction 110a_1 and the public key PK.sub.11 included in the certificate 120a_1 do not coincide, the node 410 may perform operation S190.
(93) When the public key PK.sub.10 included in the transaction 110a_1 and the public key PK.sub.11 included in the certificate 120a_1 coincide, the node 410 may perform operation S170. In operation S170, the node 410 may compare the hash value HC.sub.10 included in the transaction 110a_1 and the hash value obtained in operation S120. Operation S170 may correspond to operation (g) of
(94) When the hash value HC.sub.10 included in the transaction 110a_1 and the hash value obtained in operation S120 do not coincide, the node 410 may perform operation S190.
(95) When the hash value HC.sub.10 included in the transaction 110a_1 and the hash value obtained in operation S120 coincide, the node 410 may perform operation S180. In operation S180, the node 410 may generate a block including the transaction 110a_1. The node 410 may register the generated block at the distributed ledger, for example by broadcasting the block on the P2P network, or broadcasting the block and a proof-of-work on the P2P network. For example, a block indicating that a public key of the first electronic device 100 having the ID DID.sub.10 is “PK.sub.10” may be registered at the distributed ledger.
(96)
(97)
(98) The block 510 may indicate that a public key of the first electronic device 100 having the ID DID.sub.1 is “PK.sub.1”. The block 520 may indicate that a public key of the second electronic device 200 having an ID DID.sub.2 is “PK.sub.2”. The block 530 may indicate that a public key of the third electronic device 300 having an ID DID.sub.3 is “PK.sub.3”.
(99) Accordingly, the distributed ledger where the blocks 510 to 530 are registered may secure the following: a public key of the first electronic device 100 having the ID DID.sub.1 is “PK.sub.1”, a public key of the second electronic device 200 having the ID DID.sub.2 is “PK.sub.2”, and a public key of the third electronic device 300 having an ID DID.sub.3 is “PK.sub.3”.
(100) There may be other information included in each of the blocks 510 to 530; however, example embodiments are not limited thereto. For example, there may include a proof-of-work included in each of the blocks 510 to 530; however, example embodiments are not limited thereto. Furthermore, the transaction data may be organized as a tree, for example as Merkle tree; however, example embodiments are not limited thereto.
(101)
(102) The first electronic device 100 of
(103) The transaction 110b may include a message 111b and a signature σ.sub.01. The message 111b may include “DID.sub.1”, “UPD”, “{PK.sub.1, PK.sub.01}”, and “HC.sub.01”. Herein “DID.sub.1”, “PK.sub.1”, “PK.sub.01”, and “HC.sub.01” indicate an ID of the first electronic device 100, a public key of the first electronic device 100 registered at the distributed ledger, a public key of the first electronic device 100 to be registered at the distributed ledger, and a hash value being a result of hashing a new certificate of the first electronic device 100, respectively.
(104) The signature σ.sub.01 may be or include a signature σ.sub.01_1 and a signature σ.sub.01_2. The signature σ.sub.01_1 may be or include a result of encrypting a hash value of hashing the message 111a registered at the distributed ledger and a hash value HC.sub.01 of the message 111b, with the encryption being by using the private key SK.sub.1. The message 111a may be or include a message indicating a current identity of the first electronic device 100 from among messages registered at the distributed ledger. The private key SK.sub.1 may be or include a private key that has been used to generate the message 111a. The signature σ.sub.01_2 may be a result of encrypting a hash value of hashing the message 111b, with the encryption being by using the new private key. Functional formulas of the signature σ.sub.01_1 and the signature σ.sub.01_2 are illustrated in
(105)
(106) The first electronic device 100 of
(107) The public key value field of the certificate 120b may indicate “PK.sub.01”, and not “PK.sub.1”. Because identity information 121b included in the certificate 120b is changed, a certificate signature 122b may also be changed.
(108)
(109) As described with reference to
(110)
(111) The first electronic device 100 of
(112) In operation S210, the node 410 may receive the new transaction and the new certificate.
(113) In operation S220, the node 410 may determine whether the signature σ.sub.01_1 of the transaction 110b is valid. The node 410 may decrypt the signature σ.sub.01_1 by using a public key PK.sub.1. The node 410 may obtain the public key PK.sub.1 from the transaction 110b. The node 410 may hash both the message 111a of the transaction 110a registered at the distributed ledger and the hash value HC.sub.01. The node 410 may obtain the hash value HC.sub.01 from the transaction 110b. The node 410 may compare the decrypted signature σ.sub.01_1 and the hash value, with the hash value being a result of hashing the message 111a and the hash value HC.sub.01. When the decrypted signature σ.sub.01_1 and the hash value being a result of hashing the message 111a and the hash value HC.sub.01 coincide, the node 410 may determine that the signature σ.sub.01_1 is valid.
(114) When the node 410 determines that the signature σ.sub.01_1 is invalid, operation S260 may be performed. In operation S260, the node 410 may revoke the new transaction and the new certificate.
(115) When the node 410 determines that the signature σ.sub.01_1 is valid, operation S230 may be performed. In operation S230, the node 410 may determine whether the signature σ.sub.01_2 of the transaction 110b is valid. The node 410 may decrypt the signature σ.sub.01_2 by using a public key PK.sub.01. The node 410 may obtain the public key PK.sub.01 from the transaction 110b. An operation in which the node 410 determines whether the signature σ.sub.01_2 is valid is substantially identical to operation (a) to operation (c) of
(116) When the node 410 determines that the signature σ.sub.01_2 is invalid, operation S260 may be performed. In operation S260, the node 410 may revoke the new transaction and the new certificate.
(117) When the node 410 determines that the signature σ.sub.01_2 is valid, operation S240 may be performed. In operation S240, the node 410 may determine whether information included in the message 111b and information included in the certificate 120b coincide. An operation in which the node 410 determines whether information included in the message 111b and information included in the certificate 120b coincide is substantially identical to operation (a) and operation (d) to operation (g) of
(118) When the information included in the message 111b and the information included in the certificate 120b do not coincide, operation S260 may be performed. In operation S260, the node 410 may revoke the new transaction and the new certificate.
(119) When the information included in the message 111b and the information included in the certificate 120b coincide, operation S250 may be performed. That the signature σ.sub.01_1 and the signature σ.sub.01_2 are valid and the information included in the message 111b and the information included in the certificate 120b coincide means/corresponds to at least the following: (1) the electronic device 100 generating the transaction 110a generates the transaction 110b, and (2) the transaction 110b and the certificate 120b are not attacked/corrupted while transmitted from the electronic device 100 to the node 410.
(120) In operation S250, the node 410 may generate a block including the new transaction. The node 410 may register the generated block at the distributed ledger. For example, a block indicating that a public key of the first electronic device 100 having the ID DID.sub.1 is “PK.sub.01” may be registered at the distributed ledger.
(121)
(122) As described with reference to
(123) The block 540 may indicate that a public key of the first electronic device 100 having the ID DID.sub.1 is changed from “PK.sub.1” to “PK.sub.01”.
(124) There may be other information included in each of the blocks 510 to 530; however, example embodiments are not limited thereto. For example, there may include a proof-of-work included in each of the blocks 510 to 530; however, example embodiments are not limited thereto. Furthermore, the transaction data may be organized as a tree, for example as Merkle tree; however, example embodiments are not limited thereto.
(125) Accordingly, the distributed ledger where the blocks 510 to 540 are registered may secure the following: a public key of the first electronic device 100 having the ID DID.sub.1 is “PK.sub.01”, a public key of the second electronic device 200 having the ID DID.sub.2 is “PK.sub.2”, and a public key of the third electronic device 300 having an ID DID.sub.3 is “PK.sub.3”.
(126)
(127) The first electronic device 100 of
(128) The transaction 110c may include a message 111c and a signature σ.sub.01. The message 111c may include “DID.sub.1”, “REV”, “PK.sub.01”, and “HC.sub.01”. “DID.sub.1”, “PK.sub.01”, and “HC.sub.01” indicate an ID of the first electronic device 100, a public key of the first electronic device 100 registered at the distributed ledger, and a hash value being a result of hashing a certificate of the first electronic device 100, respectively. The first electronic device 100 may hash the certificate illustrated in
(129)
(130) The first electronic device 100 of
(131)
(132) The first electronic device 100 of
(133) The node 410 may verify the new transaction and the new certificate. Operations in which the node 410 verifies the new transaction and the new certificate are substantially identical to the operations (including operation (a) to operation (g)) described with reference to
(134) In operation S310, the node 410 may receive the new transaction and the new certificate.
(135) In operation S320, the node 410 may verify the new transaction and the new certificate. The node 410 may perform operation (a) to operation (g) of
(136) When the new transaction and the new certificate are successfully verified, operation S330 may be performed. In operation S330, the node 410 may generate a block including the new transaction. The node 410 may register the generated block at the distributed ledger, for example by broadcasting the block on the P2P. That is, a block indicating that there is revoked a transaction meaning that a public key of the first electronic device 100 is “PK.sub.01” may be registered at the distributed ledger.
(137) When the verification of the new transaction and the new certificate fails, operation S340 may be performed. In operation S340, the node 410 may revoke the new transaction and the new certificate.
(138)
(139) As described with reference to
(140) There may be other information included in each of the blocks 510 to 530; however, example embodiments are not limited thereto. For example, there may include a proof-of-work included in each of the blocks 510 to 530; however, example embodiments are not limited thereto. Furthermore, the transaction data may be organized as a tree, for example as Merkle tree; however, example embodiments are not limited thereto.
(141) The block 550 may indicate that there is revoked a transaction meaning that a public key of the first electronic device 100 having the ID DID.sub.1 is “PK.sub.01”. That is, the blocks 510, 540, and 550 may indicate that a public key of the first electronic device 100 having the ID DID.sub.1 is “PK.sub.1”.
(142) Accordingly, the distributed ledger where the blocks 510 to 550 are registered may secure the following: a public key of the first electronic device 100 having the ID DID.sub.1 is “PK.sub.1”, a public key of the second electronic device 200 having the ID DID.sub.2 is “PK.sub.2”, and a public key of the third electronic device 300 having an ID DID.sub.3 is “PK.sub.3”.
(143)
(144) As described with reference to
(145) The electronic devices 100 and 200 may deal with/communicate with each other. Before dealing with each other, each of the electronic devices 100 and 200 may check an identity of a counterpart. Because an operation of the first electronic device 100 and an operation of the second electronic device 200 are symmetrical, the operation of the first electronic device 100 is mainly described with reference to
(146) For a transaction, the first electronic device 100 may request the second electronic device 200 to prove an identity of the second electronic device 200. The second electronic device 200 may output a certificate 220 depending on the request of the first electronic device 100. The certificate 220 may be/include a certificate indicating the identity of the second electronic device 200. The second electronic device 200 may generate a private key SK.sub.2, a public key PK.sub.2, a transaction 210, and the certificate 220.
(147) When the certificate 220 is received, the first electronic device 100 may request the transaction 210 including identity information of the second electronic device 200 from the blockchain network 400. The blockchain network 400 may search the distributed ledger for a block indicating the identity information of the second electronic device 200, depending on the request of the first electronic device 100. The blockchain network 400 may output the block indicating the identity information of the second electronic device 200 and/or the transaction 210 included in the block.
(148) The first electronic device 100 may receive the transaction 210. The first electronic device 100 may verify the certificate 220 received from the second electronic device 200 and the transaction 210 received from the blockchain network 400. That the verification succeeds may mean the identity of the second electronic device 200 is verified.
(149) The second electronic device 200 may verify the identity of the first electronic device 100 in a method similar to the method performed by the first electronic device 100.
(150) In a case where both the verification in the first electronic device 100 and the verification in the second electronic device 200 succeed, the first electronic device 100 and the second electronic device 200 may deal with each other.
(151) For example, the electronic devices 100 and 200 may verify counterpart's identities by using the distributed ledger of the blockchain network 400 without needing to verify counterpart's identities through layers of certification authorities. Accordingly, even though the number of electronic devices in the cryptographic communication system 10 increases, a time taken to verify an identity may not be long.
(152)
(153) The electronic devices 100 and 200 and the blockchain network 400 may communicate based on a secure sockets layer (SSL) and/or a transport layer security (TLS). The SSL/TLS may be or include a standard cryptographic protocol for protecting data exchanged when communicating on the Internet. Because the SSL/TLS is a cryptographic manner of a transport layer, the SSL/TLS may be available regardless of a protocol kind of an application layer, such as FTP and/or XMPP, as well as HTTP. As described with reference to
(154) An operation in which the electronic devices 100 and 200 verify counterpart's identities, make mutual authentication, and establish a cryptographic channel, by using the SSL/TLS, is described with reference to
(155) In operation S410 and operation S415, the first electronic device 100 and the second electronic device 200 may transmit/receive basic information through ‘hello’ messages. For example, the first electronic device 100 may transmit the following information through the ‘hello’ message: an authentication algorithm, a key exchange algorithm, a hash algorithm, and a cryptographic algorithm that the first electronic device 100 supports. The second electronic device 200 may transmit the following information through the ‘hello’ message: an authentication algorithm, a key exchange algorithm, a hash algorithm, and a cryptographic algorithm that the second electronic device 200 supports.
(156) In operation S420, the second electronic device 200 may output the certificate 220. The certificate 220 may include information about the public key PK.sub.1 of the second electronic device 200.
(157) When the certificate 220 is received from the second electronic device 200, in operation S425, the first electronic device 100 may request the blockchain network 400 to verify an identity of the second electronic device 200. In detail, the first electronic device 100 may request the transaction 210 indicating the identity of the second electronic device 200 from the blockchain network 400. For example, the first electronic device 100 may transmit a “Lookup” command to the blockchain network 400. The first electronic device 100 and the second electronic device 200 may communicate with different nodes. That is, the first electronic device 100 may request the node 410 of the blockchain network 400 to verify the identity of the second electronic device 200, and the second electronic device 200 may request a node 420 of the blockchain network 400 to verify the identity of the first electronic device 100.
(158) Depending on the request of the first electronic device 100, in operation S430, the blockchain network 400 may look up the transaction 210 indicating the identity of the second electronic device 200 at the distributed ledger. Accordingly, the blockchain network 400 may look up in the order of recently registered block.
(159) In operation S435, the blockchain network 400 may transmit the found transaction 210 to the first electronic device 100.
(160) In operation S440, the first electronic device 100 may verify the transaction 210 received from the blockchain network 400 and the certificate 220 received from the second electronic device 200. The verification in the first electronic device 100 is substantially identical to the verification through operation (a) to operation (g) of
(161) An operation in which the first electronic device 100 obtains the transaction 210 registered at the distributed ledger by using the blockchain network 400 is described with reference to operation S425 to operation S435. However, inventive concepts is not limited thereto. The first electronic device 100 may store a part of blocks registered at the distributed ledger. Accordingly, the first electronic device 100 may automatically loop up a block without requesting the transaction 210 from the blockchain network 400. A method in which the first electronic device 100 automatically looks up a block will be described with reference to
(162) In operation S445, the second electronic device 200 may send a server key exchange message when necessary/desirable to exchange a key with the first electronic device 100.
(163) In operation S450 and operation S455, the second electronic device 200 may request the certificate 120a from the first electronic device 100 and may terminate a server hello.
(164) In operation S460, the first electronic device 100 may output the certificate 120a depending on the request of the second electronic device 200. The certificate 120a may include information about the public key PK.sub.2 of the first electronic device 100.
(165) When the certificate 120a is received from the first electronic device 100, in operation S465, the second electronic device 200 may request the blockchain network 400 to verify the identity of the first electronic device 100. In detail, the second electronic device 200 may request the transaction 110a indicating the identity of the first electronic device 100 from the blockchain network 400. For example, the second electronic device 200 may transmit the “Lookup” command to the blockchain network 400.
(166) Depending on the request of the second electronic device 200, in operation S470, the blockchain network 400 may look up the transaction 110a indicating the identity of the first electronic device 100 at the distributed ledger.
(167) In operation S475, the blockchain network 400 may transmit the found transaction 110a to the second electronic device 200.
(168) An operation in which the second electronic device 200 obtains the transaction 110a registered at the distributed ledger by using the blockchain network 400 is described with reference to operation S465 to operation S475. However, inventive concepts is not limited thereto. As described above, the second electronic device 200 may also store a part of blocks registered at the distributed ledger. In this case, the second electronic device 200 may automatically loop up a block without requesting the transaction 110a from the blockchain network 400. A method in which the second electronic device 200 automatically looks up a block will be described with reference to
(169) In operation S480, the second electronic device 200 may verify the transaction 110a received from the blockchain network 400 and the certificate 120a received from the first electronic device 100. The verification in the second electronic device 200 is substantially identical to the verification through operation (a) to operation (g) of
(170) In operation S485, the first electronic device 100 may send a client key exchange message when necessary/desirable to exchange a key with the second electronic device 200.
(171) In operation S490, the first electronic device 100 may transmit a certificate valid message for the purpose of providing notification that the identity of the second electronic device 200 is verified.
(172) To provide notification that a handshake protocol is normally finished, in operation S495, the first electronic device 100 and the second electronic device 200 may transmit complete messages each other.
(173) After determining that the handshake protocol is normally completed, the first electronic device 100 and the second electronic device 200 may start communication safely through the cryptographic channel.
(174)
(175) The electronic devices 100 and 200 may store a part of the blocks 510 to 550 registered at the distributed ledger. However, inventive concepts are not limited thereto. For example, the electronic devices 100 and 200 may store all the blocks 510 to 550 registered at the distributed ledger. Because the second electronic device 200 provides substantially the same operations as the first electronic device 100, the operation of the first electronic device 100 is mainly described with reference to
(176) The first electronic device 100 may store the blocks 530 to 550. The blocks 530 and 550 may be blocks, which are registered the most lately, from among the blocks 510 to 550. The first electronic device 100 may search the blocks 530 to 550 for the purpose of finding the block 520 indicating the identity of the second electronic device 200. The first electronic device 100 may search the blocks 530 to 550 in the order of the most recently registered block.
(177) In a case where the first electronic device 100 fails to look up the block 520 indicating the identity of the second electronic device 200 in the blocks 530 to 550, the first electronic device 100 may additionally download the blocks 510 and 520 from the distributed ledger. The first electronic device 100 may search the blocks 510 to 520 to look up the block 520.
(178)
(179) A user that uses the first electronic device 100 may additionally use first electronic devices 100a and 100b. The user may set IDs DID.sub.1a and DID.sub.1a of the first electronic devices 100a and 100b to be identical to the ID DID.sub.1 of the first electronic device 100. That is, the first electronic device 100 may share the ID DID.sub.1a with the first electronic devices 100a and 100b. However, private keys SK.sub.1a and SK.sub.1b, public keys PK.sub.1a and PK.sub.1b, and certificates Cert.sub.1a and Cert.sub.1b of the first electronic devices 100a and 100b may be different from the private key SK.sub.1, the public key PK.sub.1, and the certificate Cert.sub.1 of the first electronic device 100.
(180) In a case where the identity information of the first electronic device 100 is already registered at the distributed ledger, the first electronic devices 100a and 100b may use an “EXT” command for the purpose of registering identity information of the first electronic devices 100a and 100b.
(181) In detail, in the case of intending to register the identity information of the first electronic device 100a in a state where the identity information of the first electronic device 100 is already registered at the distributed ledger, the first electronic device 100 or the first electronic device 100a may generate a transaction including the “EXT” command. The transaction including the “EXT” command will be more fully described with reference to
(182) The node 410 may verify the transaction including the “EXT” command and the certificate indicating the identity of the first electronic device 100a; if successful, the node 410 may generate a block including a transaction including the “EXT” command. In this case, two public keys PK.sub.1 and PK.sub.1a may be registered with regard to one ID DID.sub.1.
(183)
(184) A transaction 110d may include a message 111d and a signature σ.sub.1a. The message 111d may include “DID.sub.1”, “EXT”, “{PK.sub.1, PK.sub.1a}”, and “HC.sub.1a”. “DID.sub.1”, “PK.sub.1”, “PK.sub.1a”, and “HC.sub.1a” indicate an ID of the first electronic device 100a, a public key of the first electronic device 100 registered at the distributed ledger, a public key of the first electronic device 100a to which the first electronic device 100 is extended, and a hash value being a result of hashing a certificate of the first electronic device 100a, respectively.
(185) The signature σ.sub.1a may include a signature σ.sub.1a_1 and a signature σ.sub.1a_2. The signature σ.sub.1a_1 may be a result of encrypting a hash value being a result of hashing the message 111a registered at the distributed ledger and a hash value HC.sub.1a of the message 111d, by using the private key SK.sub.1. The message 111a may be a message indicating the identity of the first electronic device 100 from among messages registered at the distributed ledger. The private key SK.sub.1 may be a private key of the first electronic device 100. The signature σ.sub.1a_2 may be a result of encrypting a hash value being a result of hashing the message 111d by using the private key SK.sub.1a. The private key SK.sub.1a may be a private key of the first electronic device 100a.
(186) Because the first electronic device 100 and the first electronic device 100a share identity information each other, as well as the first electronic device 100a, the first electronic device 100 may generate the transaction 110d.
(187) The first electronic device 100a may generate a certificate indicating an identity of the first electronic device 100a. The certificate indicating the identity of the first electronic device 100a is identical to the certificate 120a of
(188) The first electronic device 100 or the first electronic device 100a may transmit the transaction 110d and the certificate indicating the identity of the first electronic device 100a to the node 410. The node 410 may verify the transaction 110d and the certificate of the first electronic device 100a. A method in which the node 410 verifies the transaction 110d and the certificate of the first electronic device 100a is similar to operation S220 to operation S240 described with reference to
(189)
(190) An electronic device 1000 may include an interface 1100, a memory 1200, and a processor 1300. However, all the components illustrated in
(191) According to some example embodiments, the interface 1100 may perform communication with an external device. In detail, the interface 1100 may, through a wired and/or wireless connection, connect to a network to perform communication with the external device. Here, the external device may be a server, a smartphone, a tablet, a PC, a computing device, etc. The interface 1100 may include a communication module supporting one of various wired/wireless communication schemes. For example, the communication module may be in the form of a chipset or may be a sticker/barcode (e.g., a sticker including an NFC tag) including information necessary/desirable for communication. Also, the communication module may be a short range communication module or a wired communication module.
(192) According to some example embodiments, the memory 1200 may include a storage medium that is implemented in at least one of the following memory types: a flash memory, a hard disk, a multimedia card micro, a card type memory (e.g., SD memory, XD memory, etc.), a RAM (Random Access Memory), an SRAM (Static Random Access Memory), a ROM (Read-Only Memory), an EEPROM (Electrically Erasable Programmable Read-Only Memory), a PROM (Programmable Read-Only Memory), a magnetic memory, a magnetic disc, an optical disc, etc. In the case where the electronic device 1000 is the node 410 of
(193) According to some example embodiments, the processor 1300 may control the overall operations of the electronic device 1000 and may include at least one processor such as a central processing unit (CPU). The processor 1300 may include at least one processor specialized to correspond to each function or may be one integrated processor. In a case where the electronic device 1000 is the node 410, the processor 1300 may perform a verification operation on a transaction and a certificate by using pieces of information stored in the memory 1200. In the case where the electronic device 1000 is the first electronic device 100 of
(194) Inventive concepts may guarantee identities of electronic devices in a cryptographic communication system based on a blockchain network without several layers of certification authorities. Alternatively or additionally, even though the number of electronic devices in the cryptographic communication system increases, a time taken to verify an identity may not be long. Alternatively or additionally, the cryptographic communication system according to some example embodiments of inventive concepts is compatible with an existing standard protocol. Alternatively or additionally, security of certification may be improved, for example, because certificates may be recorded on a blockchain network that does not include a root/administrator.
(195) While inventive concepts has been described with reference to example embodiments thereof, it will be apparent to those of ordinary skill in the art that various changes and modifications may be made thereto without departing from the spirit and scope of inventive concepts as set forth in the following claims.