计算机科学 ›› 2021, Vol. 48 ›› Issue (9): 324-329.doi: 10.11896/jsjkx.200800123
张小艳, 李秦伟, 付福杰
ZHANG Xiao-yan, LI Qin-wei, FU Fu-jie
摘要: 传统区块链交易中,隐私保护都是在匿名机制下加密用户的敏感信息,引入公正的第三方对交易明文信息进行验证,然而一旦第三方受到攻击,用户的交易信息便会被泄露,且在理性状态下不存在真正公正的第三方。为了能够更好地解决区块链交易中存在的隐私问题,针对交易者非匿名状态下的交易金额保密验证问题,采用PVC数字承诺协议,将交易金额隐藏在承诺中,并构造公开可验证的零知识证明方案,使验证者能在不获取交易敏感信息的情况下对交易的合法性进行保密验证。同时,利用椭圆曲线同态加密特性加密金额,进而解决交易者密文账本的更新问题。对所提出的隐私保护方案的正确性进行验证和分析,结果表明,与已有方案相比,所提方案具有计算复杂度相对较低、安全性强、高效等优点。
中图分类号:
[1]YUAN Y,WANG F Y.Blockchain:The state of the art and future trends[J].Acta Automatica Sinica,2016,42(4):481-494. [2]HALPIN H,PIEKARSKA M.Introduction to Security and Privacy on the Blockchain[C]//2017 IEEE European Symposium on Security and Privacy Workshops(EuroS&PW).IEEE,2017:1-3. [3]CAO B,LIN L,LI Y,et al.Review of blockchain research[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(1):1-14. [4]XU C J,LI X F.Blockchain transaction data privacy protection method[J].Computer Science,2019,47(3):281-286. [5]FENG Q,HE D,ZEADALLY S,et al.A survey on privacy protection in blockchain system[J].Journal of Network and Computer Applications,2019,126:45-58. [6]LI X,MEI Y,GONG J,et al.A Blockchain Privacy Protection Scheme Based on Ring Signature[J].IEEE Access,2020,8:76765-76772. [7]SONG S,PENG W.BLOCCE+:An Improved Covert Communication Method Based on Blockchain[J].Journal of Chongqing University of Technology(Natural Science),2020,34(9):238-244. [8]GONG Y X,LV J K.A Kinds of Design of Data Storage System Based on Blockchain[J].Journal of Chongqing University of Technology(Natural Science),2019,33(9):190-195. [9]ZHU L H,GAO F,SHEN M,et al.Survey on Privacy Preserving Techniques for Blockchain Technology[J].Computer Engineering and Application,2017,54(10):2170-2186. [10]RIVEST R L,SHAMIR A,TAUMAN Y.How to leak a secret[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin,Heidelberg:Springer,2001:552-565. [11]GOLDWASSER S,MICALI S,RACKOFF C.The knowledgecomplexity of interactive proof systems[J].SIAM Journal on Computing,1989,18(1):186-208. [12]MIERS I,GARMAN C,GREEN M,et al.Zerocoin:Anonymous distributed e-cash from bitcoin[C]//2013 IEEE Symposium on Security and Privacy.IEEE,2013:397-411. [13]SASSON E B,CHIESA A,GARMAN C,et al.Zerocash:Decentralized anonymous payments from bitcoin[C]//2014 IEEE Symposium on Security and Privacy.IEEE,2014:459-474. [14]NOETHER S,MACKENZIE A.Ring confidential transactions[J].Ledger,2016,1:1-18. [15]YUAN C,XU M,SI X.Research on a new signature scheme on blockchain[J].Security and Communication Networks,2017,2017:1-10. [16]NARULA N,VASQUEZ W,VIRZA M.zkledger:Privacy-preserving auditing for distributed ledgers[C]//15th {USENIX} Symposium on Networked Systems Design and Implementation({NSDI} 18).2018:65-80. [17]LI G L,HE D B,GUO B,et al.Blockchain Privacy Protection Algorithm Based on Zero-knowledge Proof[J].Journal of Huazhong University of Science and Technology(Natural Science Edition),2020,48(7):112-116. [18]WANG Q,QIN B,HU J,et al.Preserving transaction privacy in bitcoin[J].Future Generation Computer Systems,2017,8(26):793-804. [19]HE Y Z,WU C K,FENG D G.Publicly Verifiable Zero-know-ledge Watermark Detection[J].Journal of Software,2005,16(9):1606-1616. [20]RIVEST R L,ADLEMAN L,DERTOUZOS M L.On databanks and privacy homomorphisms[J].Foundations of Secure Computation,1978,4(11):169-180. [21]QIAN P,WU M,LIU Z.Homomorphic Encryption Privacy Protection Method towards Cloud Computing[J].Small Micro-computer System,2015,36(4):840-844. [22]PEDERSEN T P.Non-interactive and information-theoretic secure verifiable secret sharing[C]//Annual International Cryptology Conference.Berlin,Heidelberg:Springer,1991:129-140. [23]DONG G S,CHEN Y X,FAN J,et al.Research on Privacy Protection Strategy in Blockchain Application[J].Computer Science,2019,46(5):29-35. [24]FUJISAKI E,OKAMOTO T.Statistical zero knowledge protocols to prove modular polynomial relations[C]//Annual International Cryptology Conference.Berlin,Heidelberg:Springer,1997:16-30. |
[1] | 王子凯, 朱健, 张伯钧, 胡凯. 区块链与智能合约并行方法研究与实现 Research and Implementation of Parallel Method in Blockchain and Smart Contract 计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102 |
[2] | 李博, 向海昀, 张宇翔, 廖浩德. 面向食品溯源场景的PBFT优化算法应用研究 Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios 计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018 |
[3] | 傅丽玉, 陆歌皓, 吴义明, 罗娅玲. 区块链技术的研究及其发展综述 Overview of Research and Development of Blockchain Technology 计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214 |
[4] | 高健博, 张家硕, 李青山, 陈钟. RegLang:一种面向监管的智能合约编程语言 RegLang:A Smart Contract Programming Language for Regulation 计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016 |
[5] | 毛典辉, 黄晖煜, 赵爽. 符合监管合规性的自动合成新闻检测方法研究 Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance 计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083 |
[6] | 周航, 姜河, 赵琰, 解相朋. 适用于各单元共识交易的电力区块链系统优化调度研究 Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit 计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241 |
[7] | 王思明, 谭北海, 余荣. 面向6G可信可靠智能的区块链分片与激励机制 Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence 计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004 |
[8] | 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇. 区块链跨链技术发展及应用 Development and Application of Blockchain Cross-chain Technology 计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132 |
[9] | 阳真, 黄松, 郑长友. 基于区块链与改进CP-ABE的众测知识产权保护技术研究 Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE 计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075 |
[10] | 任畅, 赵洪, 蒋华. 一种量子安全拜占庭容错共识机制 Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism 计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154 |
[11] | 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜. 区块链BFT共识算法研究进展 Research Advance on BFT Consensus Algorithms 计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011 |
[12] | 王鑫, 周泽宝, 余芸, 陈禹旭, 任昊文, 蒋一波, 孙凌云. 一种面向电能量数据的联邦学习可靠性激励机制 Reliable Incentive Mechanism for Federated Learning of Electric Metering Data 计算机科学, 2022, 49(3): 31-38. https://doi.org/10.11896/jsjkx.210700195 |
[13] | 张潆藜, 马佳利, 刘子昂, 刘新, 周睿. 以太坊Solidity智能合约漏洞检测方法综述 Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts 计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004 |
[14] | 杨昕宇, 彭长根, 杨辉, 丁红发. 基于演化博弈的理性拜占庭容错共识算法 Rational PBFT Consensus Algorithm with Evolutionary Game 计算机科学, 2022, 49(3): 360-370. https://doi.org/10.11896/jsjkx.210900110 |
[15] | 范家幸, 王志伟. 基于门限环签名的分级匿名表决方案 Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature 计算机科学, 2022, 49(1): 321-327. https://doi.org/10.11896/jsjkx.201000032 |
|