计算机科学 ›› 2021, Vol. 48 ›› Issue (9): 324-329.doi: 10.11896/jsjkx.200800123

• 信息安全 • 上一篇    下一篇

基于数字承诺的区块链交易金额保密验证方法

张小艳, 李秦伟, 付福杰   

  1. 贵州大学计算机科学与技术学院 贵阳550025贵州省公共大数据重点实验室 贵阳550025
  • 收稿日期:2020-08-19 修回日期:2020-11-18 出版日期:2021-09-15 发布日期:2021-09-10
  • 通讯作者: 李秦伟(1539614676@qq.com)
  • 作者简介:1057879450@qq.com
  • 基金资助:
    国家自然科学基金(61802081);贵州省公共大数据重点实验室开放项目(2017BDKFJJ003)

Secret Verification Method of Blockchain Transaction Amount Based on Digital Commitment

ZHANG Xiao-yan, LI Qin-wei, FU Fu-jie   

  1. College of Computer Science and Technology,Guizhou University,Guiyang 550025,ChinaGuizhou Provincial Key Laboratory of Public Big Data,Guiyang 550025,China
  • Received:2020-08-19 Revised:2020-11-18 Online:2021-09-15 Published:2021-09-10
  • About author:ZHANG Xiao-yan,born in 1996,postgraduate.Her main research interests include information security and blockchain technology.
    LI Qin-wei,born in 1961,professor,master supervisor.His main research interests include information security,blockchain and privacy protection.
  • Supported by:
    National Natural Science Foundation of China(61802081) and Key Laboratory Open Project of Public Big Data of Guizhou Province,China(2017BDKFJJ003)

摘要: 传统区块链交易中,隐私保护都是在匿名机制下加密用户的敏感信息,引入公正的第三方对交易明文信息进行验证,然而一旦第三方受到攻击,用户的交易信息便会被泄露,且在理性状态下不存在真正公正的第三方。为了能够更好地解决区块链交易中存在的隐私问题,针对交易者非匿名状态下的交易金额保密验证问题,采用PVC数字承诺协议,将交易金额隐藏在承诺中,并构造公开可验证的零知识证明方案,使验证者能在不获取交易敏感信息的情况下对交易的合法性进行保密验证。同时,利用椭圆曲线同态加密特性加密金额,进而解决交易者密文账本的更新问题。对所提出的隐私保护方案的正确性进行验证和分析,结果表明,与已有方案相比,所提方案具有计算复杂度相对较低、安全性强、高效等优点。

关键词: 区块链, PVC数字承诺, 保密验证, 公开可验证, 椭圆曲线同态加密

Abstract: In traditional blockchain transactions,privacy protection is to encrypt users' sensitive information under the anonymity mechanism,and a trusted third party is involved to verify the transaction plaintext information.However,once the third party is attacked,the users' transaction information will be divulged.Furthermore,there is no truly trusted third party in a rational state.To better solve the privacy problems in blockchain transactions,and in view of issues of confidentiality verification of the tra-ders' transaction amount under the non-anonymous state,the PVC digital commitment protocol is adopted to hide the transaction amount in the commitment,and a publicly verifiable zero-knowledge proof scheme is established,so that verifiers are able to confidentially verify the legitimacy of the transaction without obtaining sensitive information from the traders.At the same time,the elliptic curve homomorphic encryption feature is used to encrypt the amount,thereby solving the problem of updating the traders' ciphertext ledger.The correctness of the proposed privacy protection scheme is verified and analyzed,and the results shows that compared with the existing schemes,the proposed scheme has the advantages of relatively low computational complexity,strong security and high efficiency.

Key words: Blockchain, PVC digital commitment, Confidentiality verification, Publicly verifiable, Elliptic curve homomorphic encryption

中图分类号: 

  • TP309
[1]YUAN Y,WANG F Y.Blockchain:The state of the art and future trends[J].Acta Automatica Sinica,2016,42(4):481-494.
[2]HALPIN H,PIEKARSKA M.Introduction to Security and Privacy on the Blockchain[C]//2017 IEEE European Symposium on Security and Privacy Workshops(EuroS&PW).IEEE,2017:1-3.
[3]CAO B,LIN L,LI Y,et al.Review of blockchain research[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(1):1-14.
[4]XU C J,LI X F.Blockchain transaction data privacy protection method[J].Computer Science,2019,47(3):281-286.
[5]FENG Q,HE D,ZEADALLY S,et al.A survey on privacy protection in blockchain system[J].Journal of Network and Computer Applications,2019,126:45-58.
[6]LI X,MEI Y,GONG J,et al.A Blockchain Privacy Protection Scheme Based on Ring Signature[J].IEEE Access,2020,8:76765-76772.
[7]SONG S,PENG W.BLOCCE+:An Improved Covert Communication Method Based on Blockchain[J].Journal of Chongqing University of Technology(Natural Science),2020,34(9):238-244.
[8]GONG Y X,LV J K.A Kinds of Design of Data Storage System Based on Blockchain[J].Journal of Chongqing University of Technology(Natural Science),2019,33(9):190-195.
[9]ZHU L H,GAO F,SHEN M,et al.Survey on Privacy Preserving Techniques for Blockchain Technology[J].Computer Engineering and Application,2017,54(10):2170-2186.
[10]RIVEST R L,SHAMIR A,TAUMAN Y.How to leak a secret[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin,Heidelberg:Springer,2001:552-565.
[11]GOLDWASSER S,MICALI S,RACKOFF C.The knowledgecomplexity of interactive proof systems[J].SIAM Journal on Computing,1989,18(1):186-208.
[12]MIERS I,GARMAN C,GREEN M,et al.Zerocoin:Anonymous distributed e-cash from bitcoin[C]//2013 IEEE Symposium on Security and Privacy.IEEE,2013:397-411.
[13]SASSON E B,CHIESA A,GARMAN C,et al.Zerocash:Decentralized anonymous payments from bitcoin[C]//2014 IEEE Symposium on Security and Privacy.IEEE,2014:459-474.
[14]NOETHER S,MACKENZIE A.Ring confidential transactions[J].Ledger,2016,1:1-18.
[15]YUAN C,XU M,SI X.Research on a new signature scheme on blockchain[J].Security and Communication Networks,2017,2017:1-10.
[16]NARULA N,VASQUEZ W,VIRZA M.zkledger:Privacy-preserving auditing for distributed ledgers[C]//15th {USENIX} Symposium on Networked Systems Design and Implementation({NSDI} 18).2018:65-80.
[17]LI G L,HE D B,GUO B,et al.Blockchain Privacy Protection Algorithm Based on Zero-knowledge Proof[J].Journal of Huazhong University of Science and Technology(Natural Science Edition),2020,48(7):112-116.
[18]WANG Q,QIN B,HU J,et al.Preserving transaction privacy in bitcoin[J].Future Generation Computer Systems,2017,8(26):793-804.
[19]HE Y Z,WU C K,FENG D G.Publicly Verifiable Zero-know-ledge Watermark Detection[J].Journal of Software,2005,16(9):1606-1616.
[20]RIVEST R L,ADLEMAN L,DERTOUZOS M L.On databanks and privacy homomorphisms[J].Foundations of Secure Computation,1978,4(11):169-180.
[21]QIAN P,WU M,LIU Z.Homomorphic Encryption Privacy Protection Method towards Cloud Computing[J].Small Micro-computer System,2015,36(4):840-844.
[22]PEDERSEN T P.Non-interactive and information-theoretic secure verifiable secret sharing[C]//Annual International Cryptology Conference.Berlin,Heidelberg:Springer,1991:129-140.
[23]DONG G S,CHEN Y X,FAN J,et al.Research on Privacy Protection Strategy in Blockchain Application[J].Computer Science,2019,46(5):29-35.
[24]FUJISAKI E,OKAMOTO T.Statistical zero knowledge protocols to prove modular polynomial relations[C]//Annual International Cryptology Conference.Berlin,Heidelberg:Springer,1997:16-30.
[1] 郭显, 王雨悦, 冯涛, 曹来成, 蒋泳波, 张迪. 基于区块链的工业控制系统角色委派访问控制机制[J]. 计算机科学, 2021, 48(9): 306-316.
[2] 王日宏, 周航, 徐泉清, 张立锋. 用于联盟链的非拜占庭容错共识算法[J]. 计算机科学, 2021, 48(9): 317-323.
[3] 周艺华, 贾玉欣, 贾立圆, 方嘉博, 侍伟敏. 基于红黑树的共享电子病历数据完整性验证方案[J]. 计算机科学, 2021, 48(9): 330-336.
[4] 刘嘉琪, 刘贝丽, 彭韬, 段江, 康立, 陈智. 基于区块链的音频版权存证模型[J]. 计算机科学, 2021, 48(6A): 438-442.
[5] 唐飞, 陈云龙, 冯卓. 基于区块链和代理重加密的电子处方共享方案[J]. 计算机科学, 2021, 48(6A): 498-503.
[6] 李嘉明, 赵阔, 屈挺, 刘晓翔. 基于知识图谱的区块链物联网领域研究分析[J]. 计算机科学, 2021, 48(6A): 563-567.
[7] 郭上铜, 王瑞锦, 张凤荔. 区块链技术原理与应用综述[J]. 计算机科学, 2021, 48(2): 271-281.
[8] 王卫红, 陈震宇. 基于改进区块链的智能制造安全模型[J]. 计算机科学, 2021, 48(2): 295-302.
[9] 季钰翔, 黄建华, 王喆, 郑红, 唐瑞琮. 基于信任度匹配的改进PBFT共识算法[J]. 计算机科学, 2021, 48(2): 303-310.
[10] 闫凯伦, 张继连. 一种可用于数据和模型分享的模型链[J]. 计算机科学, 2021, 48(2): 311-316.
[11] 张艳梅, 楼胤成. 基于深度神经网络的庞氏骗局合约检测方法[J]. 计算机科学, 2021, 48(1): 273-279.
[12] 邵炜晖, 王宁, 韩传峰, 许维胜. 基于区块链的一体化应急应战机制[J]. 计算机科学, 2021, 48(1): 287-294.
[13] 李莹, 于亚新, 张宏宇, 李振国. 基于TBchain区块链的高可信云存储模型[J]. 计算机科学, 2020, 47(9): 330-338.
[14] 刘帅, 甘国华, 刘明熹, 房勇, 汪寿阳. 一种基于拓扑结构及分配机制设计的多子块激励共识机制[J]. 计算机科学, 2020, 47(7): 268-277.
[15] 陆歌皓, 谢莉红, 李析禹. 区块链共识算法对比研究[J]. 计算机科学, 2020, 47(6A): 332-339.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 伍建辉,黄中祥,李武,吴健辉,彭鑫,张生. 城市道路建设时序决策的鲁棒优化[J]. 计算机科学, 2018, 45(4): 89 -93 .
[2] 崔琼,李建华,王宏,南明莉. 基于节点修复的网络化指挥信息系统弹性分析模型[J]. 计算机科学, 2018, 45(4): 117 -121 .
[3] 王振朝,侯欢欢,连蕊. 抑制CMT中乱序程度的路径优化方案[J]. 计算机科学, 2018, 45(4): 122 -125 .
[4] 厉柏伸,李领治,孙涌,朱艳琴. 基于伪梯度提升决策树的内网防御算法[J]. 计算机科学, 2018, 45(4): 157 -162 .
[5] 吴姝,周安民,左政. PDiOS:iOS应用程序中私有API的调用检测[J]. 计算机科学, 2018, 45(4): 163 -168 .
[6] 贾伟,华庆一,张敏军,陈锐,姬翔,王博. 基于改进粒子群优化的移动界面模式聚类算法[J]. 计算机科学, 2018, 45(4): 220 -226 .
[7] 丁舒阳,黎冰,侍洪波. 基于改进的离散PSO算法的FJSP的研究[J]. 计算机科学, 2018, 45(4): 233 -239 .
[8] 梁俊斌,周翔,王田,李陶深. 移动低占空比无线传感网中数据收集的研究进展[J]. 计算机科学, 2018, 45(4): 19 -24 .
[9] 王正理,谢添,何琨,金燕. 考虑时间因素的0-1背包调度问题[J]. 计算机科学, 2018, 45(4): 53 -59 .
[10] 朱金彬,武继刚,隋秀峰. 基于极大团的边缘云节点聚合算法[J]. 计算机科学, 2018, 45(4): 60 -65 .