计算机科学 ›› 2021, Vol. 48 ›› Issue (11): 159-169.doi: 10.11896/jsjkx.210400027

所属专题: 密码学 虚拟专题

• 区块链技术* 上一篇    下一篇

基于改进P2PKHCA脚本方案的比特币密钥更新机制

向阿新1,2, 高鸿峰1,3, 田有亮1,2,4   

  1. 1 贵州大学计算机科学与技术学院 贵阳550025
    2 贵州大学密码学与数据安全研究所 贵阳550025
    3 贵州大学网络与信息化管理中心 贵阳550025
    4 公共大数据国家重点实验室 贵阳550025
  • 收稿日期:2021-04-01 修回日期:2021-08-09 出版日期:2021-11-15 发布日期:2021-11-10
  • 通讯作者: 高鸿峰(hfgao@gzu.edu.cn)
  • 作者简介:Xax18885248968@163.com
  • 基金资助:
    国家自然科学基金(61662009,61772008);贵州省科技重大专项计划(20183001);国家自然科学基金联合基金重点支持项目(U1836205);贵州省科技计划项目(黔科合基础[2019]1098,ZK[2021]一般331,ZK[2021]一般325);贵州省高层次创新型人才项目(黔科合平台人才[2020]6008);贵阳市科技计划项目(筑科合[2021]1-5)

Key Update Mechanism in Bitcoin Based on Improved P2PKHCA Script Scheme

XIANG A-xin1,2, GAO Hong-feng1,3, TIAN You-liang1,2,4   

  1. 1 College of Computer Science and Technology,Guizhou University,Guiyang 550025,China
    2 Institute of Cryptography & Date Security,Guizhou University,Guiyang 550025,China
    3 Network and Information Management Center,Guizhou University,Guiyang 550025,China
    4 State Key Laboratory of Public Big Data,Guiyang 550025,China
  • Received:2021-04-01 Revised:2021-08-09 Online:2021-11-15 Published:2021-11-10
  • About author:XIANG A-xin,born in 1996,postgra-duate.His main research interests include cryptography and blockchain technology.
    GAO Hong-feng,born in 1975,associate professor.His main research interests include network and information secu-rity.
  • Supported by:
    National Natural Science Foundation of China(61662009, 61772008),Science and Technology Major Support Program of Guizhou Province(20183001), Key Program of the National Natural Science Union Foundation of China(U1836205), Science and Technology Program of Guizhou Province( [2019]1098,ZK[2021]general 331,ZK[2021]general 325),Project of High-level Innovative Talents of Guizhou Province( [2020]6008) and Science and Technology Program of Guiyang( [2021]1-5).

摘要: 比特币是最成熟的公有链应用系统之一,用户密钥是比特币所有权确定过程的关键,比特币的安全由用户密钥的安全管理所保证,密钥的遗失会导致大量的用户资产流失,因此实现流失资产找回是亟待解决的问题。针对以上问题,提出了基于改进P2PKHCA(具有条件匿名的支付到公钥哈希)脚本方案的比特币密钥更新机制。首先,通过引入密钥生命周期和随机数改进P2PKHCA方案中的密钥生成算法,以解决其存在的密钥泄露问题;其次,提出两个新的操作符OP_KEYUPDATE和OP_TSELECTION来设计新的密钥更新脚本,以实现比特币系统的用户密钥更新;最后,基于密钥更新脚本构造两种密钥更新方案,使得密钥更新脚本适用于不同的密钥更新应用需求。对密钥更新机制进行的安全性分析和性能分析表明,所提机制在有效完成用户密钥更新的前提下,能够实现比特币系统中流失比特币的找回。

关键词: 比特币, 脚本方案, 流失比特币找回, 密钥更新, 区块链

Abstract: Bitcoin is one of the most mature public chain application systems,the user key is the critical factor to the process of determining the ownership of Bitcoin,the security of Bitcoin is guaranteed by the safe management of the user key,and the loss of the key will lead to the loss of a large number of user assets.So it is an urgent problem to recover the lost assets.This paper proposes a key update mechanism in Bitcoin based on the improved P2PKHCA (pay-to-public-key-hash-with-conditional-anonymity) script scheme to solve above problems.Firstly,the key generation algorithm in the P2PKHCA scheme is improved by introducing the key life cycle and random number to solve its key leakage problem.Secondly,the two new opcodes,OP_KEYUPDATE and OP_TSELECTION,are proposed to design the new key update script to realize the user key update of the Bitcoin system.Finally,two types of key update schemes based on the key update script are constructed to make the script suitable for the requirements of different key update applications.The security analysis and performance analysis of the key update mechanism show that the proposed mechanism realizes the recovery of lost Bitcoins in the Bitcoin system on the premise of the effective completion of update of user's key.

Key words: Bitcoin, Blockchain, Key update, Recovery of lost Bitcoins, Script scheme

中图分类号: 

  • TP3
[1]NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system [OL].(2008-10-31) [2020-10-30].http://bitcoin.org/bitcoin.pdf.
[2]TSUNG-TING K,HYEONEUI K,LUCILA O M.Blockchaindistributed ledger technologies for biomedical and health care applications[J].the American Medical Informatics Association,2017,24(6):1211-1220.
[3]CHUKWU E,GARG L.A systematic review of blockchain inhealthcare:frameworks,prototypes,and implementations[J].IEEE Access,2020,8:21196-21214.
[4]TIAGO M,FERNÁNDEZ-CARAMÉS,PAULA F.A Reviewon the Use of Blockchain for the Internet of Things[J].IEEE Access,2018,6:32979-33001.
[5]OUIMET S.Bitcoin dominance rate hits 50% for first times[OL].[2020-09-28].https://www.coin-desk.com/bitcoin-do-minance-rate-hits-50-for-first-time-in-2018/.
[6]LI L,LIU J Q,CHANG X L,et al.Toward conditionally anonymous Bitcoin transactions:A lightweight-script approach[J].Information Sciences,2020,509:290-303.
[7]ESKANDARI S,CLARK J,BARRERA D,et al.A First Look at the Usability of Bitcoin Key Management[C]//Workshop on Usable Security.2015.
[8]ITTAY E,ADEM E G,EMIN G S,et al.Bitcoin-NG:A Scalable Blockchain Protocol[C]//Symposium on Networked Systems Design and Implementation.2016:45-59.
[9]MÖSER M,EYAL I,SIRER E G.Bitcoin Covenants[C]//International Conference on Financial Cryptography & Data Security.2016:126-141.
[10]O'CONNOR R ,PIEKARSKA M.Enhancing Bitcoin Transactions with Covenants[C]//International Conference on Financial Cryptography & Data Security.2017:191-198.
[11]POULAMI D,LISA E,TOMMASO F,et al.FastKitten:Practical Smart Contracts on Bitcoin[C]//USENIX Security Sympo-sium.2019:801-818.
[12]YU H,ZHANG Z Y,LIU J W.Research on Scaling Technology of Bitcoin Blockchain[J].Journal of Computer Research and Development,2017,54(10):2390-2403.
[13]BRENGEL M,ROSSOW C.Identifying Key Leakage of Bitcoin Users[C]//International Symposium on Recent Advances in Intrusion Detection.2018:623-643.
[14]LI J,LI T,LIU Z,et al.Secure Deduplication System with Active Key Update and Its Application in IoT[J].ACM Transactions on Intelligent Systems and Technology,2019,10(6):1-21.
[15]HONG H,SUN Z.Achieving secure data access control and efficient key updating in mobile multimedia sensor networks[J].Multimedia Tools and Applications,2017,77(4):4477-4490.
[16]TIAN Y,WANG Z,XIONG J,et al.A Blockchain-Based Secure Key Management Scheme with Trustworthiness in DWSNs[J].IEEE Transactions on Industrial Informatics,2020,16(9):6193-6202.
[17]LI Y,YU Y,YANG B,et al.Privacy preserving cloud data auditing with efficient key update[J].Future Generation Computer Systems,2018,78(PT.2):789-798.
[18]ATHMANI S,BILAMI A,BOUBICHE D E.EDAK:An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs[J].Future Generation Computer Systems,2019,92:789-799.
[19]NICOLAS T C,REBEKAH M.Stealth Address and Key Ma-nagement Techniques in Blockchain Systems[C]//International Conference on Information Systems Security & Privacy.2017:559-566.
[20]STANISLAW J,HUGO K,JASON K R.Updatable Oblivious Key Management for Storage Systems[C]//ACM Conference on Computer and Communictions Secu-rity.2019:379-393.
[21]ALBAKRI A,HARN L,MADDUMALA M.Polynomial-based Lightweight Key Management in a Permissioned Blockchain[C]//IEEE Conference on Communications and Network Secu-rity.2019:1-9.
[22]ZHANG R,LIU J,HAN Z,et al.An IBE scheme using ECCcombined public key[J].Computers & Electrical Engineering,2010,36(6):1046-1054.
[23]LI X,QIAN H,ZHOU Y.Pitfalls in identity-based encryption using an elliptic curve combined public key[J].Applied Mathematics Letters,2012,25(8):1111-1113.
[24]ANDERSON R.Two Remarks on Public-Key Cryptology[OL].[2020-09-27].http://www.cl.cam.ac.uk/user/rja14/.
[25]THOMAS P.Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)[J].Request for Comments,2013,6979:1-79.
[26]WANG Z,YU H,ZHANG Z,et al.ECDSA weak randomness in Bitcoin[J].Future Generation Computer Systems,2020,102:507-513.
[27]BROWN M,HANKERSON D,LÓPEZ J,et al.Software Implementation of the NIST Elliptic Curves Over Prime Fields[C]//Proceeding of the 2001 Conference on Topics in Crytology:The Cryptographer's Track at RSA.2001:250-265.
[1] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[2] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[3] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[4] 何茜, 贺可太, 王金山, 林绅文, 杨菁林, 冯玉超.
比特币实体交易模式分析
Analysis of Bitcoin Entity Transaction Patterns
计算机科学, 2022, 49(6A): 502-507. https://doi.org/10.11896/jsjkx.210600178
[5] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[6] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[7] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[8] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[9] 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇.
区块链跨链技术发展及应用
Development and Application of Blockchain Cross-chain Technology
计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132
[10] 阳真, 黄松, 郑长友.
基于区块链与改进CP-ABE的众测知识产权保护技术研究
Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE
计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075
[11] 任畅, 赵洪, 蒋华.
一种量子安全拜占庭容错共识机制
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[12] 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜.
区块链BFT共识算法研究进展
Research Advance on BFT Consensus Algorithms
计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011
[13] 杨昕宇, 彭长根, 杨辉, 丁红发.
基于演化博弈的理性拜占庭容错共识算法
Rational PBFT Consensus Algorithm with Evolutionary Game
计算机科学, 2022, 49(3): 360-370. https://doi.org/10.11896/jsjkx.210900110
[14] 王鑫, 周泽宝, 余芸, 陈禹旭, 任昊文, 蒋一波, 孙凌云.
一种面向电能量数据的联邦学习可靠性激励机制
Reliable Incentive Mechanism for Federated Learning of Electric Metering Data
计算机科学, 2022, 49(3): 31-38. https://doi.org/10.11896/jsjkx.210700195
[15] 张潆藜, 马佳利, 刘子昂, 刘新, 周睿.
以太坊Solidity智能合约漏洞检测方法综述
Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts
计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!