计算机科学 ›› 2019, Vol. 46 ›› Issue (9): 162-168.doi: 10.11896/j.issn.1002-137X.2019.09.023

所属专题: 区块链技术

• 信息安全 • 上一篇    下一篇

基于区块链的信息共享及安全多方计算模型

王童, 马文平, 罗维   

  1. (西安电子科技大学通信工程学院 西安710071);
    (西安电子科技大学综合业务网国家重点实验室 西安710071)
  • 收稿日期:2018-08-07 出版日期:2019-09-15 发布日期:2019-09-02
  • 通讯作者: 马文平(1966-),男,教授,博士生导师,主要研究方向为密码学和信息安全,E-mail:357146415@qq.com
  • 作者简介:王 童(1993-),女,硕士生,主要研究方向为信息安全和通信理论,E-mail:357146415@qq.com;罗 维(1987-),男,博士生,主要研究方向为密码学和云计算安全。
  • 基金资助:
    国家自然科学基金(61373171),高等学校创新引智计划项目(B08038),国家重点研发计划重点专项(2017YFB0802400)

Information Sharing and Secure Multi-party Computing Model Based on Blockchain

WANG Tong, MA Wen-ping, LUO Wei   

  1. (School of Communication Engineering,Xidian University,Xi’an 710071,China);
    (National Key Laboratory of Comprehensive Business Network,Xidian University,Xi’an 710071,China)
  • Received:2018-08-07 Online:2019-09-15 Published:2019-09-02

摘要: 在大数据背景下,数据信息隐私和可控性成为了关注点。现有的计算模式大多依赖于第三方机构,第三方的不可依赖性和对信息的掌控易导致信息的安全性无法得到保证,容易出现大量隐私问题。为解决此问题,文中结合区块链的特征和安全多方计算,提出了一种安全、高性能的共享及多方计算模型,使得用户能在自主控制数据的同时也能保证数据计算和共享的安全性。该方案首先以链上存储和链下存储相结合作为基础,在该存储环境下,利用代理重加密方式进行数据共享;然后使用改进的共识算法确保节点间的一致性,进而在MapReduce计算框架中使用改进的同态加密算法实现在无需解密隐私数据的情况下直接用密文进行数据处理和安全计算;最后对方案的正确性与安全性进行分析并进行实验仿真。分析结果及仿真结果表明,该模型在数据量较大时具有高性能的优点,且在运算效率方面有比较大的提升。

关键词: MapReduce, 安全多方计算, 共识算法, 区块链, 同态加密

Abstract: Under the background of big data,the control and privacy of data information have become a concern.However,existing computation models mostly rely on the third-party institution.Because the incompliance and the information control of the third party cause that information security cannot be guaranteed,more privacy problems appear.To solve this problem,this paper constructed an information sharing and secure multi-party computing model with high performance and security combining the blockchain with the secure multi-party computation,which enables users to control the data autonomously while ensuring the security of data information computing and sharing.This scheme firstly combines the on-chain storage with the off-chain storage.In this storage condition,proxy heavy encryption is used for data sharing and improved consensus algorithm is used to ensure the accuracy of nodes.Then,based on the MapReduce parallel computing framework,an improved homomorphic encryption algorithm was put forward for data processing and secure computing in cipher without decrypting the privacy data.Finally,the correctness and the security of the scheme were analyzed,and the experimental simulation was carried out.The analysis results and experimental results show that this scheme has high performance when dealing with big data and has a great improvement in operational efficiency.

Key words: Blockchain, Consensus algorithm, Homomorphic encryption, MapReduce, Secure multi-party computation

中图分类号: 

  • TP309.2
[1]ZHU L H,GAO F,SHEN M,et al.Survey on Privacy Preserving Techniques for Blockchain Techniques[J].Computer engineering and Application,2017,54(10):2170-2186.(in Chinese)祝烈煌,高峰,沈蒙,等.区块链隐私保护研究综述[J].计算机研究与发展,2017,54(10):2170-2186.
[2]DORRI A,STEGER M,KANHERE S S,et al.BlockChain:A Distributed Solution to Automotive Security and Privacy[J].IEEE Communications Magazine,2017,55(12):119-125.
[3]LI X,JIANG P,CHEN T,et al.A Survey on the security ofblockchain systems[J].Future Generation Computer Systems,2017:1-13.doi:10.1016.
[4]CASTRO M,LISKOV B.Practical Byzantine fault tolerance[C]//Symposium on operating Systems Design & Implementation.ACM,1999,173-186.
[5]黄步添,王云霄,王从礼,等.一种应用于区块链的拜占庭容错共识方法:中国,CN106445711A[P].2017-02-22.
[6]ZYSKIND G,NATHAN O,ALE X,et al.Decentralizing Privacy:Using Blockchain to Protect Personal Data[C]//IEEE Security and Privacy Workshops.IEEE Computer Society,2015:180-184.
[7]RIVEST R L,ADLEM A L,DERTOUZOS M L.On DataBanks and Privacy Homomorphism [C]//Foundations of Secure Computation.New York:Academic Press,1978:169-179.
[8]PLANTARD T,SUSILO W,ZHANG Z.Fully HomomorphicEncryption Using Hidden Ideal Lattice[J].IEEE Transactions on Information Forensics and Security,2013,8(12):2127-2137.
[9]DIJK M V,GENTRY C,HALEVI S,et al.Fully Homomorphic Encryption over the Integers[J].Lecture Notes in Computer Science,2010,2009(4):24-43.
[10]TAN Z L,ZHANG W.Multiparty Cloud Computation and Homomorphic Proxy Re-encrypt Scheme[J].Journal of Chinese Computer Systems,2015,36(8):1739-1742.
[11]FU D,FANG L.Blockchain-based trusted computing in social network[C]//IEEE International Conference on Computer and Communications.IEEE,2017:19-22.
[12]DO H G,NG W K.Blockchain-Based System for Secure Data Storage with Private Keyword Search[C]//Services.IEEE,2017:90-93.
[13]ZHENG Z H,ZHANG M Q,WANG X A.Identity based proxy re-encryption scheme for secure cloud data sharing[J].Compu-ter Engineering and Application,2016,33(11):3450-3454.(in Chinese)郑志恒,张敏情,王绪安.一种适合云数据共享的身份代理重加密方案[J].计算机应用研究,2016,33(11):3450-3454.
[14]DITTRICH J,QUIANÉ-RUIZ J A.Efficient big data processing in Hadoop MapReduce[J].Proceedings of the Vldb Endowment,2012,5(12):2014-2015.
[15]XIE X S.A full homomorphic encryption scheme that is valid for a class of integers[D].Jinan:Shandong university,2014.(in Chinese)谢学说.一类整数上有效的全同态加密方案[D].济南:山东大学,2014.
[16]TIBOUCHI M,MANDAL A.Fully Homomorphic Encryptionover the Integers with Shorter Public Keys[C]//Conference on Advances in Cryptology.Springer-verlag,2011:487-504.
[17]TANG D H,ZHU S X,CAO Y F,et al.A full homomorphic encryption scheme on a faster integer[J].Computer Engineering and Application,2012,48(28):117-122.(in Chinese)汤殿华,祝世雄,曹云飞,等.一个较快速的整数上的全同态加密方案[J].计算机应用与研究,2012,48(28):117-122.
[1] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[2] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[3] 吕由, 吴文渊.
隐私保护线性回归方案与应用
Privacy-preserving Linear Regression Scheme and Its Application
计算机科学, 2022, 49(9): 318-325. https://doi.org/10.11896/jsjkx.220300190
[4] 窦家维.
保护隐私的汉明距离与编辑距离计算及应用
Privacy-preserving Hamming and Edit Distance Computation and Applications
计算机科学, 2022, 49(9): 355-360. https://doi.org/10.11896/jsjkx.220100241
[5] 刘卫明, 安冉, 毛伊敏.
基于聚类和WOA的并行支持向量机算法
Parallel Support Vector Machine Algorithm Based on Clustering and WOA
计算机科学, 2022, 49(7): 64-72. https://doi.org/10.11896/jsjkx.210500040
[6] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[7] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[8] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[9] 卫宏儒, 李思月, 郭涌浩.
基于智能合约的秘密重建协议
Secret Reconstruction Protocol Based on Smart Contract
计算机科学, 2022, 49(6A): 469-473. https://doi.org/10.11896/jsjkx.210700033
[10] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[11] 王健.
基于隐私保护的反向传播神经网络学习算法
Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving
计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155
[12] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[13] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[14] 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇.
区块链跨链技术发展及应用
Development and Application of Blockchain Cross-chain Technology
计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132
[15] 阳真, 黄松, 郑长友.
基于区块链与改进CP-ABE的众测知识产权保护技术研究
Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE
计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!