计算机科学 ›› 2021, Vol. 48 ›› Issue (11): 159-169.doi: 10.11896/jsjkx.210400027
所属专题: 密码学 虚拟专题
向阿新1,2, 高鸿峰1,3, 田有亮1,2,4
XIANG A-xin1,2, GAO Hong-feng1,3, TIAN You-liang1,2,4
摘要: 比特币是最成熟的公有链应用系统之一,用户密钥是比特币所有权确定过程的关键,比特币的安全由用户密钥的安全管理所保证,密钥的遗失会导致大量的用户资产流失,因此实现流失资产找回是亟待解决的问题。针对以上问题,提出了基于改进P2PKHCA(具有条件匿名的支付到公钥哈希)脚本方案的比特币密钥更新机制。首先,通过引入密钥生命周期和随机数改进P2PKHCA方案中的密钥生成算法,以解决其存在的密钥泄露问题;其次,提出两个新的操作符OP_KEYUPDATE和OP_TSELECTION来设计新的密钥更新脚本,以实现比特币系统的用户密钥更新;最后,基于密钥更新脚本构造两种密钥更新方案,使得密钥更新脚本适用于不同的密钥更新应用需求。对密钥更新机制进行的安全性分析和性能分析表明,所提机制在有效完成用户密钥更新的前提下,能够实现比特币系统中流失比特币的找回。
中图分类号:
[1]NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system [OL].(2008-10-31) [2020-10-30].http://bitcoin.org/bitcoin.pdf. [2]TSUNG-TING K,HYEONEUI K,LUCILA O M.Blockchaindistributed ledger technologies for biomedical and health care applications[J].the American Medical Informatics Association,2017,24(6):1211-1220. [3]CHUKWU E,GARG L.A systematic review of blockchain inhealthcare:frameworks,prototypes,and implementations[J].IEEE Access,2020,8:21196-21214. [4]TIAGO M,FERNÁNDEZ-CARAMÉS,PAULA F.A Reviewon the Use of Blockchain for the Internet of Things[J].IEEE Access,2018,6:32979-33001. [5]OUIMET S.Bitcoin dominance rate hits 50% for first times[OL].[2020-09-28].https://www.coin-desk.com/bitcoin-do-minance-rate-hits-50-for-first-time-in-2018/. [6]LI L,LIU J Q,CHANG X L,et al.Toward conditionally anonymous Bitcoin transactions:A lightweight-script approach[J].Information Sciences,2020,509:290-303. [7]ESKANDARI S,CLARK J,BARRERA D,et al.A First Look at the Usability of Bitcoin Key Management[C]//Workshop on Usable Security.2015. [8]ITTAY E,ADEM E G,EMIN G S,et al.Bitcoin-NG:A Scalable Blockchain Protocol[C]//Symposium on Networked Systems Design and Implementation.2016:45-59. [9]MÖSER M,EYAL I,SIRER E G.Bitcoin Covenants[C]//International Conference on Financial Cryptography & Data Security.2016:126-141. [10]O'CONNOR R ,PIEKARSKA M.Enhancing Bitcoin Transactions with Covenants[C]//International Conference on Financial Cryptography & Data Security.2017:191-198. [11]POULAMI D,LISA E,TOMMASO F,et al.FastKitten:Practical Smart Contracts on Bitcoin[C]//USENIX Security Sympo-sium.2019:801-818. [12]YU H,ZHANG Z Y,LIU J W.Research on Scaling Technology of Bitcoin Blockchain[J].Journal of Computer Research and Development,2017,54(10):2390-2403. [13]BRENGEL M,ROSSOW C.Identifying Key Leakage of Bitcoin Users[C]//International Symposium on Recent Advances in Intrusion Detection.2018:623-643. [14]LI J,LI T,LIU Z,et al.Secure Deduplication System with Active Key Update and Its Application in IoT[J].ACM Transactions on Intelligent Systems and Technology,2019,10(6):1-21. [15]HONG H,SUN Z.Achieving secure data access control and efficient key updating in mobile multimedia sensor networks[J].Multimedia Tools and Applications,2017,77(4):4477-4490. [16]TIAN Y,WANG Z,XIONG J,et al.A Blockchain-Based Secure Key Management Scheme with Trustworthiness in DWSNs[J].IEEE Transactions on Industrial Informatics,2020,16(9):6193-6202. [17]LI Y,YU Y,YANG B,et al.Privacy preserving cloud data auditing with efficient key update[J].Future Generation Computer Systems,2018,78(PT.2):789-798. [18]ATHMANI S,BILAMI A,BOUBICHE D E.EDAK:An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs[J].Future Generation Computer Systems,2019,92:789-799. [19]NICOLAS T C,REBEKAH M.Stealth Address and Key Ma-nagement Techniques in Blockchain Systems[C]//International Conference on Information Systems Security & Privacy.2017:559-566. [20]STANISLAW J,HUGO K,JASON K R.Updatable Oblivious Key Management for Storage Systems[C]//ACM Conference on Computer and Communictions Secu-rity.2019:379-393. [21]ALBAKRI A,HARN L,MADDUMALA M.Polynomial-based Lightweight Key Management in a Permissioned Blockchain[C]//IEEE Conference on Communications and Network Secu-rity.2019:1-9. [22]ZHANG R,LIU J,HAN Z,et al.An IBE scheme using ECCcombined public key[J].Computers & Electrical Engineering,2010,36(6):1046-1054. [23]LI X,QIAN H,ZHOU Y.Pitfalls in identity-based encryption using an elliptic curve combined public key[J].Applied Mathematics Letters,2012,25(8):1111-1113. [24]ANDERSON R.Two Remarks on Public-Key Cryptology[OL].[2020-09-27].http://www.cl.cam.ac.uk/user/rja14/. [25]THOMAS P.Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)[J].Request for Comments,2013,6979:1-79. [26]WANG Z,YU H,ZHANG Z,et al.ECDSA weak randomness in Bitcoin[J].Future Generation Computer Systems,2020,102:507-513. [27]BROWN M,HANKERSON D,LÓPEZ J,et al.Software Implementation of the NIST Elliptic Curves Over Prime Fields[C]//Proceeding of the 2001 Conference on Topics in Crytology:The Cryptographer's Track at RSA.2001:250-265. |
[1] | 王子凯, 朱健, 张伯钧, 胡凯. 区块链与智能合约并行方法研究与实现 Research and Implementation of Parallel Method in Blockchain and Smart Contract 计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102 |
[2] | 傅丽玉, 陆歌皓, 吴义明, 罗娅玲. 区块链技术的研究及其发展综述 Overview of Research and Development of Blockchain Technology 计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214 |
[3] | 高健博, 张家硕, 李青山, 陈钟. RegLang:一种面向监管的智能合约编程语言 RegLang:A Smart Contract Programming Language for Regulation 计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016 |
[4] | 何茜, 贺可太, 王金山, 林绅文, 杨菁林, 冯玉超. 比特币实体交易模式分析 Analysis of Bitcoin Entity Transaction Patterns 计算机科学, 2022, 49(6A): 502-507. https://doi.org/10.11896/jsjkx.210600178 |
[5] | 毛典辉, 黄晖煜, 赵爽. 符合监管合规性的自动合成新闻检测方法研究 Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance 计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083 |
[6] | 周航, 姜河, 赵琰, 解相朋. 适用于各单元共识交易的电力区块链系统优化调度研究 Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit 计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241 |
[7] | 李博, 向海昀, 张宇翔, 廖浩德. 面向食品溯源场景的PBFT优化算法应用研究 Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios 计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018 |
[8] | 王思明, 谭北海, 余荣. 面向6G可信可靠智能的区块链分片与激励机制 Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence 计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004 |
[9] | 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇. 区块链跨链技术发展及应用 Development and Application of Blockchain Cross-chain Technology 计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132 |
[10] | 阳真, 黄松, 郑长友. 基于区块链与改进CP-ABE的众测知识产权保护技术研究 Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE 计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075 |
[11] | 任畅, 赵洪, 蒋华. 一种量子安全拜占庭容错共识机制 Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism 计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154 |
[12] | 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜. 区块链BFT共识算法研究进展 Research Advance on BFT Consensus Algorithms 计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011 |
[13] | 杨昕宇, 彭长根, 杨辉, 丁红发. 基于演化博弈的理性拜占庭容错共识算法 Rational PBFT Consensus Algorithm with Evolutionary Game 计算机科学, 2022, 49(3): 360-370. https://doi.org/10.11896/jsjkx.210900110 |
[14] | 王鑫, 周泽宝, 余芸, 陈禹旭, 任昊文, 蒋一波, 孙凌云. 一种面向电能量数据的联邦学习可靠性激励机制 Reliable Incentive Mechanism for Federated Learning of Electric Metering Data 计算机科学, 2022, 49(3): 31-38. https://doi.org/10.11896/jsjkx.210700195 |
[15] | 张潆藜, 马佳利, 刘子昂, 刘新, 周睿. 以太坊Solidity智能合约漏洞检测方法综述 Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts 计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004 |
|