计算机科学 ›› 2019, Vol. 46 ›› Issue (5): 29-35.doi: 10.11896/j.issn.1002-137X.2019.05.004

所属专题: 区块链技术

• 综述 • 上一篇    下一篇

区块链应用中的隐私保护策略研究

董贵山, 陈宇翔, 范佳, 郝尧, 李枫   

  1. (中国电子科技集团公司第三十研究所 成都610041)
  • 收稿日期:2018-05-14 修回日期:2018-08-16 发布日期:2019-05-15
  • 作者简介:董贵山(1974-),男,博士,研究员,主要研究方向为信息安全;陈宇翔(1993-),男,硕士,工程师,主要研究方向为信息安全,E-mail:2392827595@qq.com(通信作者);范 佳(1982-),女,博士,主要研究方向为密码学;郝 尧(1971-),男,高级工程师,主要研究方向为信息安全;李 枫(1993-),男,硕士,主要研究方向为密码学。
  • 基金资助:
    国家重点研发计划(2017YFB0802300,2017YFB0802304)资助。

Research on Privacy Protection Strategies in Blockchain Application

DONG Gui-shan, CHEN Yu-xiang, FAN Jia, HAO Yao, LI Feng   

  1. (No.30 Inst,China Electronics Technology Group Corporation,Chengdu 610041,China)
  • Received:2018-05-14 Revised:2018-08-16 Published:2019-05-15

摘要: 近年来,人们对身份管理系统和以用户为中心的自主权身份提出了越来越多的隐私保护需求。区块链作为解决数据隐私安全问题的重要手段,被越来越多的应用所使用。本文针对区块链应用中的隐私保护问题,首先研究了当前主流加密代币使用的隐私保护策略,包括匿名处理发送方、接收方和内容等环节,设置区块链的访问权限,创新侧链和支付通道等方法,分类存储数据等;然后分析了各隐私保护策略的效率、侧重点及应用前景,并重点分析了零知识证明对基于区块链的分布式应用的重要性;最后对智能合约、身份管理、供应链等实践领域的隐私保护策略进行介绍分析,并提出对未来方向的展望。

关键词: 零知识证明, 区块链应用, 隐私保护, 自主权身份

Abstract: In recent years,more and more privacy protection requirements have been put forward for identity management systems and user-centric self-sovereign identity.As an important means to solve privacy protection problems,blockchain is used by more and more applications.Aiming at the problem of privacy protection in blockchain applications,firstly,this paper studied the privacy protection strategies of mainstream encrypted currencies,including anonymous processing of sender,receiver,content and other links,setting of blockchain access right,innovative methods such as side chain and payment channel,classified storage of data,etc.Then,the efficiency,emphasis and application prospect of each privacy protection strategy were analyzed.Specially,the importance of zero knowledge proof to distributed application based on blockchain was analyzed.Finally,this paper introduced and analyzed the privacy protection strategies in smart contracts,identity management,supply chain and other practical fields,and put forward the prospects of future direction.

Key words: Blockchain application, Privacy protection, Self-sovereign identity, Zero knowledge proof

中图分类号: 

  • TP309
[1]ALLEN C.The Path to Self-Sovereign Identity [EB/OL].
(2018-03-14) [2018-05-10].http://www.coindesk.com/path-self-sovereign-identity/.
[2]MOSER M.Anonymity of bitcoin transactions[EB/OL].
http://xueshu.baidu.com/s?wd=paperuri%3A%2805b83a0935a0aed4f1fbb6a1fa94dc68%29&filter=sc_long_sign&sc_ks_para=q%3DAnonymity%20of%20Bitcoin%20Transac-tions&sc_us=8079223010421678528&tn=SE_baiduxueshu_c1gjeupa&ie=utf-8.
[3]LIN I C,LIAO T C.A survey of blockchain security issues and challenges[J].IJ Network Security,2017,19(5):653-659.
[4]DORRI A,KANHERE S S,JURDAK R.Blockchain in internet of things:challenges andsolutions[EB/OL].[2018-05-10].http://xueshu.baidu.com/s?wd=Blockchain+in+internet+of+things.
[5]LI X,JIANG P,CHEN T,et al.A survey on the security of blockchain systems,Future Generation Computer Systems[EB/OL].[2018-05-10].http://www.sciencedirect.com/science/article/pii/S0167739X17318332.
[6]NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2018-05-10].http://bitcoin.org/bitcoin,2009.
[7]Ethereum White Paper.A next-generation smart contract anddecentralized application platform [EB/OL].(2015-11-12).https://github.com/ethereum/wiki/wiki/White Paper.
[8]HEARN M.Merge avoidance:Privacy enhancing techniques inthe bitcoin protocol[EB/OL].[2018-05-10].https://www.coindesk.com/merge-avoidance-privacy-bitcoin/.
[9]BERGAN T,ANDERSON O,DEVIETTI J,et al.CryptoNote v 2.0[EB/OL].[2018-05-10].https://cryptonote.org/whitepaper.pdf.
[10]ANDY G.Dark wallet is about to make bitcoin money laundering easier than ever[EB/OL].[2018-05-10].https://www.wired.com/2014/04/dark-wallet/.
[11]Belcher.Joinmarket-Coinjoin that people will actually use[EB/OL].[2018-09-09].http://bitcointalk.org/index.php?topic=919116.0.
[12]ZIEGELDORF J H,GROSSMANN F,HENZE M,et al.Coin-Party:Secure multi-party mixing of bitcoins[C]∥Proc of the 5th ACM Conf on Data and Application Security and Privacy.New York:ACM,2015:75-86.
[13]CAMENISCH J,LYSYANSKAYA A.Signature Schemes andAnonymous Credentials from Bilinear Maps[M]∥Advances in Cryptology - CRYPTO 2004.Berlin:Springer,2004:56-72.
[14]Bitcoin Fog.Accessing bitcoin fog[EB/OL].[2018-09-09].http://bitcoinfog.info/.
[15]BitLaunder.BitLaunder’s mixer vs “major exchanges” mixer[EB/OL].[2018-09-09].http://bitcoin.stackchange.com/questions/25722/bitlaunders-mixer-vs-major-exchanges-mixer/25753.
[16] BONNEAU J,NARAYANAN A,MILLER A,et al.Mixcoin:Anonymity for bitcoin with accountable mixes[C]∥Proc of the 18th Int Conf on Financial Cryptography and Data Security Finacial.Barbados:Financial Cryptography,2014:486-504[17]KYLE T.CoinShuffle aims to improve privacy in bitcoin[EB/OL].[2018-09-09].http://insidebitcoins.com/news/coinshuffle-aims-to-improve-privacy-in-bitcoin/29269.
[18]PEDERSEN T P.Non-Interactive and Information-TheoreticSecure Verifiable Secret Sharing[C]∥International Cryptology Conference on Advances in Cryptology.Springer-Verlag,1991:129-140.
[19]CHAUM D.Blind Signatures for Untraceable Payments[M]∥Advances in Cryptology.US:Springer,1983:199-203.
[20]MAXWELL G.Confidential Transactions[EB/OL].https://people.xiph.org/ ~greg/confidential _values.txt.
[21]NEHA N,VASQUEZ W,VIRZA M.zkLedger:Privacy-Preserving Auditing for Distributed Ledgers,IACR Cryptology ePrint Archive [EB/OL].[2018-05-10].https://eprint.iacr.org/2018/241.
[22]The MediLedger Project 2017 Progress Report.Charter[EB/OL].[2018-05-10].http://www.authorstream.com/jdonahue123/The-MediLedger-Project-2017-Report/.
[23]YUAN C,XU M X,SI X M.Research on a New SignatureScheme on Blockchain[EB/OL].[2018-05-10].https://www.hindawi.com/journals/scn/2017/4746586/.
[24]MENDLING J,WEBER I,AALST W V D,et al.Blockchains for business process management-challenges and opportunities..https://www.researchgate.net/publication/316076240_Blockchains_for_Business_Process_Management_-_Challenges_and_Opportunities.
[25]MAN H A,SUSILO W,YI M.Constant-size dynamic k -TAA[C]∥International Conference on Security and Cryptography for Networks.Berlin:Springer,2006:111-125.
[26]Rivest R L,Shamir A,Tauman Y.How to Leak a Secret[M]∥Advances in Cryptology — ASIACRYPT 2001.Berlin:Sprin-ger,2017:552-565.
[27]MONERO.A note on chain reactions in traceability in cryp-toNote2.0[EB/OL].[2018-09-09].https:// getmonero.org/knowledge-base/about.
[28]BEN-SASSON E,CHIESA A,GENKIN D,et al.SNARKs for C:verifying program executions succinctly and in zero know-ledge[M]∥Advances in Cryptology (CRYPTO2013).Berlin:Springer,2013:90-108[29]SASSON E B,CHIESA A,GARMAN C,et al.Zerocash:Decentralized Anonymous Payments from Bitcoin[C]∥Security and Privacy.IEEE,2014:459-474.
[30]KOSBA A,MILLER A,SHI E,et al.Hawk:The BlockchainModel of Cryptography and Privacy-Preserving Smart Contracts[C]∥Security and Privacy.IEEE,2016:839-858.
[31]YUAN Y,WANG F Y.Parallelblockchain:concept,methodsand issues[J].Acta Automatica Sinica,2017,43(10):1703-1712.(in Chinese)袁勇,王飞跃.平行区块链:概念、方法与内涵解析[J].自动化学报,2017,43(10):1703-1712.
[32]GREEN M,MIERS I.Bolt:Anonymous Payment Channels for Decentralized Currencies[C]∥ACM Sigsac Conference on Computer and Communications Security.ACM,2017:473-489.
[33]HEILMAN E,ALSHENIBR L,BALDIMTSI F,et al.TumbleBit:An Untrusted Bitcoin-Compatible Anonymous Payment Hub[C]∥Network and Distributed System Security Sympo-sium.2017.
[34]JOSEPH P,THADDEUS D.The bitcoin lightning network:Scalable Off-Chain instant payments[EB/OL].[2018-09-09].http://lightning.network/lightning-network-paper.pdf.
[35]SUN S F,MAN H A,LIU J K,et al.RingCT 2.0:A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero[C]∥European Symposium on Research in Computer Security.Cham:Springer,2017:456-474.
[36]Monero.What is Monero?[EB/OL].[2018-09-09].https://getmonero.org/get-started/what-is-monero/.
[37]CHAIN I.Confidential assets[EB/OL].[2018-05-10].https://blog.chain.com/hidden-in-plain-sight-transacting-privately-on-a-blockchain-835ab75c01cb.
[38]AXWELL M.Confidential transactions[EB/OL].[2018-05-10].https://people.xiph.org/ ? greg/confidential_values.txt.
[39]Confidential assets [EB/OL].[2018-05-10].https://www.
grin-forum.org/t/confidential-assets/1217.
[40]ZYSKIND G,NATHAN O,PENTLAND A S.Decentralizing Privacy:Using Blockchain to Protect Personal Data [C]∥2015 IEEE Conference on Security and Privacy Workshops (SPW).2015:180-184.
[41]Hyperledger.Project Charter[EB/OL].[2018-05-10].https://www.hyperledger.org/about/charter.
[42]CAMENISCH J,DRIJVERS M,LEHMANN A.AnonymousAttestation Using the Strong Diffie Hellman Assumption Revisited[C]∥International Conference on Trust and Trustworthy Computing.Springer International Publishing,2016:1-20.
[43]LIANG X,ZHAO J,SHETTY S,etal.Towards data assurance and resilience in IoT using blockchain[C]∥2017 IEEE Military Communications Conference (MILCOM).IEEE,2017:261-266.
[44]KORPELA K,HALLIKAS J,DAHLBERG T.Digital supplychain transformation toward blockchain integration[C]∥Proceedings of the 50th Hawaii International Conference on System Sciences.2017.
[45]PARK J H,PARK J H.Blockchain security in cloud computing:Use cases,challenges,and solutions[J].Symmetry,2017,9(8):164.
[46]DORRI A,STEGER M,KANHERE S S,et al.Blockchain:Adistributed solution to automotive security and privacy[J].IEEE Communications Magazine,2017,55:119-125.
[47]TOSH D K,SHETTY S,LIANG X P.Security implications of blockchain cloud with analysis of block withholding attack..https://www.researchgate.net/publication/317182715_Security_Implications_of_Blockchain_Cloud_with_Analysis_of_Block_Withholding_Attack.
[48]RUFFING T,MORENO-SANCHEZ P,KATE A.CoinShuffle:Practical Decentralized Coin Mixing for Bitcoin[C]∥European Symposium on Research in Computer Security.New York:Springer-Verlag,2014:345-364.
[1] 鲁晨阳, 邓苏, 马武彬, 吴亚辉, 周浩浩.
基于分层抽样优化的面向异构客户端的联邦学习
Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients
计算机科学, 2022, 49(9): 183-193. https://doi.org/10.11896/jsjkx.220500263
[2] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[3] 吕由, 吴文渊.
隐私保护线性回归方案与应用
Privacy-preserving Linear Regression Scheme and Its Application
计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190
[4] 王健.
基于隐私保护的反向传播神经网络学习算法
Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving
计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155
[5] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[6] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[7] 李利, 何欣, 韩志杰.
群智感知的隐私保护研究综述
Review of Privacy-preserving Mechanisms in Crowdsensing
计算机科学, 2022, 49(5): 303-310. https://doi.org/10.11896/jsjkx.210400077
[8] 王美珊, 姚兰, 高福祥, 徐军灿.
面向医疗集值数据的差分隐私保护技术研究
Study on Differential Privacy Protection for Medical Set-Valued Data
计算机科学, 2022, 49(4): 362-368. https://doi.org/10.11896/jsjkx.210300032
[9] 吕由, 吴文渊.
基于同态加密的线性系统求解方案
Linear System Solving Scheme Based on Homomorphic Encryption
计算机科学, 2022, 49(3): 338-345. https://doi.org/10.11896/jsjkx.201200124
[10] 孔钰婷, 谭富祥, 赵鑫, 张正航, 白璐, 钱育蓉.
基于差分隐私的K-means算法优化研究综述
Review of K-means Algorithm Optimization Based on Differential Privacy
计算机科学, 2022, 49(2): 162-173. https://doi.org/10.11896/jsjkx.201200008
[11] 金华, 朱靖宇, 王昌达.
视频隐私保护技术综述
Review on Video Privacy Protection
计算机科学, 2022, 49(1): 306-313. https://doi.org/10.11896/jsjkx.201200047
[12] 雷羽潇, 段玉聪.
面向跨模态隐私保护的AI治理法律技术化框架
AI Governance Oriented Legal to Technology Bridging Framework for Cross-modal Privacy Protection
计算机科学, 2021, 48(9): 9-20. https://doi.org/10.11896/jsjkx.201000011
[13] 王辉, 朱国宇, 申自浩, 刘琨, 刘沛骞.
基于用户偏好和位置分布的假位置生成方法
Dummy Location Generation Method Based on User Preference and Location Distribution
计算机科学, 2021, 48(7): 164-171. https://doi.org/10.11896/jsjkx.200800069
[14] 季琰, 戴华, 姜莹莹, 杨庚, 易训.
面向混合云的可并行多关键词Top-k密文检索技术
Parallel Multi-keyword Top-k Search Scheme over Encrypted Data in Hybrid Clouds
计算机科学, 2021, 48(5): 320-327. https://doi.org/10.11896/jsjkx.200300160
[15] 郭蕊, 芦天亮, 杜彦辉.
WSN中基于目标决策的源位置隐私保护方案
Source-location Privacy Protection Scheme Based on Target Decision in WSN
计算机科学, 2021, 48(5): 334-340. https://doi.org/10.11896/jsjkx.200400099
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!