计算机科学 ›› 2021, Vol. 48 ›› Issue (9): 324-329.doi: 10.11896/jsjkx.200800123
张小艳, 李秦伟, 付福杰
ZHANG Xiao-yan, LI Qin-wei, FU Fu-jie
摘要: 传统区块链交易中,隐私保护都是在匿名机制下加密用户的敏感信息,引入公正的第三方对交易明文信息进行验证,然而一旦第三方受到攻击,用户的交易信息便会被泄露,且在理性状态下不存在真正公正的第三方。为了能够更好地解决区块链交易中存在的隐私问题,针对交易者非匿名状态下的交易金额保密验证问题,采用PVC数字承诺协议,将交易金额隐藏在承诺中,并构造公开可验证的零知识证明方案,使验证者能在不获取交易敏感信息的情况下对交易的合法性进行保密验证。同时,利用椭圆曲线同态加密特性加密金额,进而解决交易者密文账本的更新问题。对所提出的隐私保护方案的正确性进行验证和分析,结果表明,与已有方案相比,所提方案具有计算复杂度相对较低、安全性强、高效等优点。
中图分类号:
[1]YUAN Y,WANG F Y.Blockchain:The state of the art and future trends[J].Acta Automatica Sinica,2016,42(4):481-494. [2]HALPIN H,PIEKARSKA M.Introduction to Security and Privacy on the Blockchain[C]//2017 IEEE European Symposium on Security and Privacy Workshops(EuroS&PW).IEEE,2017:1-3. [3]CAO B,LIN L,LI Y,et al.Review of blockchain research[J].Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition),2020,32(1):1-14. [4]XU C J,LI X F.Blockchain transaction data privacy protection method[J].Computer Science,2019,47(3):281-286. [5]FENG Q,HE D,ZEADALLY S,et al.A survey on privacy protection in blockchain system[J].Journal of Network and Computer Applications,2019,126:45-58. [6]LI X,MEI Y,GONG J,et al.A Blockchain Privacy Protection Scheme Based on Ring Signature[J].IEEE Access,2020,8:76765-76772. [7]SONG S,PENG W.BLOCCE+:An Improved Covert Communication Method Based on Blockchain[J].Journal of Chongqing University of Technology(Natural Science),2020,34(9):238-244. [8]GONG Y X,LV J K.A Kinds of Design of Data Storage System Based on Blockchain[J].Journal of Chongqing University of Technology(Natural Science),2019,33(9):190-195. [9]ZHU L H,GAO F,SHEN M,et al.Survey on Privacy Preserving Techniques for Blockchain Technology[J].Computer Engineering and Application,2017,54(10):2170-2186. [10]RIVEST R L,SHAMIR A,TAUMAN Y.How to leak a secret[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin,Heidelberg:Springer,2001:552-565. [11]GOLDWASSER S,MICALI S,RACKOFF C.The knowledgecomplexity of interactive proof systems[J].SIAM Journal on Computing,1989,18(1):186-208. [12]MIERS I,GARMAN C,GREEN M,et al.Zerocoin:Anonymous distributed e-cash from bitcoin[C]//2013 IEEE Symposium on Security and Privacy.IEEE,2013:397-411. [13]SASSON E B,CHIESA A,GARMAN C,et al.Zerocash:Decentralized anonymous payments from bitcoin[C]//2014 IEEE Symposium on Security and Privacy.IEEE,2014:459-474. [14]NOETHER S,MACKENZIE A.Ring confidential transactions[J].Ledger,2016,1:1-18. [15]YUAN C,XU M,SI X.Research on a new signature scheme on blockchain[J].Security and Communication Networks,2017,2017:1-10. [16]NARULA N,VASQUEZ W,VIRZA M.zkledger:Privacy-preserving auditing for distributed ledgers[C]//15th {USENIX} Symposium on Networked Systems Design and Implementation({NSDI} 18).2018:65-80. [17]LI G L,HE D B,GUO B,et al.Blockchain Privacy Protection Algorithm Based on Zero-knowledge Proof[J].Journal of Huazhong University of Science and Technology(Natural Science Edition),2020,48(7):112-116. [18]WANG Q,QIN B,HU J,et al.Preserving transaction privacy in bitcoin[J].Future Generation Computer Systems,2017,8(26):793-804. [19]HE Y Z,WU C K,FENG D G.Publicly Verifiable Zero-know-ledge Watermark Detection[J].Journal of Software,2005,16(9):1606-1616. [20]RIVEST R L,ADLEMAN L,DERTOUZOS M L.On databanks and privacy homomorphisms[J].Foundations of Secure Computation,1978,4(11):169-180. [21]QIAN P,WU M,LIU Z.Homomorphic Encryption Privacy Protection Method towards Cloud Computing[J].Small Micro-computer System,2015,36(4):840-844. [22]PEDERSEN T P.Non-interactive and information-theoretic secure verifiable secret sharing[C]//Annual International Cryptology Conference.Berlin,Heidelberg:Springer,1991:129-140. [23]DONG G S,CHEN Y X,FAN J,et al.Research on Privacy Protection Strategy in Blockchain Application[J].Computer Science,2019,46(5):29-35. [24]FUJISAKI E,OKAMOTO T.Statistical zero knowledge protocols to prove modular polynomial relations[C]//Annual International Cryptology Conference.Berlin,Heidelberg:Springer,1997:16-30. |
[1] | 郭显, 王雨悦, 冯涛, 曹来成, 蒋泳波, 张迪. 基于区块链的工业控制系统角色委派访问控制机制[J]. 计算机科学, 2021, 48(9): 306-316. |
[2] | 王日宏, 周航, 徐泉清, 张立锋. 用于联盟链的非拜占庭容错共识算法[J]. 计算机科学, 2021, 48(9): 317-323. |
[3] | 周艺华, 贾玉欣, 贾立圆, 方嘉博, 侍伟敏. 基于红黑树的共享电子病历数据完整性验证方案[J]. 计算机科学, 2021, 48(9): 330-336. |
[4] | 刘嘉琪, 刘贝丽, 彭韬, 段江, 康立, 陈智. 基于区块链的音频版权存证模型[J]. 计算机科学, 2021, 48(6A): 438-442. |
[5] | 唐飞, 陈云龙, 冯卓. 基于区块链和代理重加密的电子处方共享方案[J]. 计算机科学, 2021, 48(6A): 498-503. |
[6] | 李嘉明, 赵阔, 屈挺, 刘晓翔. 基于知识图谱的区块链物联网领域研究分析[J]. 计算机科学, 2021, 48(6A): 563-567. |
[7] | 郭上铜, 王瑞锦, 张凤荔. 区块链技术原理与应用综述[J]. 计算机科学, 2021, 48(2): 271-281. |
[8] | 王卫红, 陈震宇. 基于改进区块链的智能制造安全模型[J]. 计算机科学, 2021, 48(2): 295-302. |
[9] | 季钰翔, 黄建华, 王喆, 郑红, 唐瑞琮. 基于信任度匹配的改进PBFT共识算法[J]. 计算机科学, 2021, 48(2): 303-310. |
[10] | 闫凯伦, 张继连. 一种可用于数据和模型分享的模型链[J]. 计算机科学, 2021, 48(2): 311-316. |
[11] | 张艳梅, 楼胤成. 基于深度神经网络的庞氏骗局合约检测方法[J]. 计算机科学, 2021, 48(1): 273-279. |
[12] | 邵炜晖, 王宁, 韩传峰, 许维胜. 基于区块链的一体化应急应战机制[J]. 计算机科学, 2021, 48(1): 287-294. |
[13] | 李莹, 于亚新, 张宏宇, 李振国. 基于TBchain区块链的高可信云存储模型[J]. 计算机科学, 2020, 47(9): 330-338. |
[14] | 刘帅, 甘国华, 刘明熹, 房勇, 汪寿阳. 一种基于拓扑结构及分配机制设计的多子块激励共识机制[J]. 计算机科学, 2020, 47(7): 268-277. |
[15] | 陆歌皓, 谢莉红, 李析禹. 区块链共识算法对比研究[J]. 计算机科学, 2020, 47(6A): 332-339. |
|