计算机科学 ›› 2022, Vol. 49 ›› Issue (6A): 469-473.doi: 10.11896/jsjkx.210700033

• 信息安全 • 上一篇    下一篇

基于智能合约的秘密重建协议

卫宏儒, 李思月, 郭涌浩   

  1. 北京科技大学数理学院 北京 100083
  • 出版日期:2022-06-10 发布日期:2022-06-08
  • 通讯作者: 李思月(lsy231con@163.com)
  • 作者简介:(weihr@ustb.edu.cn)
  • 基金资助:
    广东省重点领域研发计划(2020B0909020001);国家自然科学基金(61873026)

Secret Reconstruction Protocol Based on Smart Contract

WEI Hong-ru, LI Si-yue, GUO Yong-hao   

  1. School of Mathematics and Physics,University of Science and Technology,Beijing 100083,China
  • Online:2022-06-10 Published:2022-06-08
  • About author:WEI Hong-ru,born in 1963,associate professor.His main research interests include mathematics,information secu-rity and cryptography and key techno-logies of Internet of things.
    LI Si-yue,born in 1996.Her main research interests include information security and cryptography.
  • Supported by:
    Key-Area Research and Development Program of Guangdong Province(2020B0909020001) and National Natural Science Foundation of China(61873026).

摘要: 针对可验证秘密共享方案设计秘密重建协议,在现实生活中参与者都是理性的条件下,利用惩罚机制并采用扣除押金的方式,对可验证性秘密共享方案验证出的恶意参与方的行为进行约束,并利用区块链的智能合约工具,根据智能合约的独立性、不可篡改性,解决了以有研究中很难解决的可信第三方问题,此协议分为本地协议和智能合约两部分,在保证安全性、秘密性的同时也能够通过对智能合约的设计实现公平性。

关键词: 安全多方计算, 惩罚机制, 公平性, 秘密重建, 智能合约

Abstract: The secret reconstruction protocol for a verifiable secret sharing scheme is designed.Under real-life conditions where the participants are all rational,the punishment mechanism and the method of deducting the deposit are used to conduct the behavior of malicious parties verified by the verifiable secret sharing scheme Constraint,and using the tool of blockchain smart contract,according to the independence and non-tampering of smart contract,the problem of trusted third parties that are difficult to solve in previous research is solved.The protocol is divided into two parts,local protocol and smart contract.While ensuring the security and confidentiality,the protocol can also utilize the design of smart contracts to achieve fairness.

Key words: Fairness, Punishment mechanism, Secret reconstruction, Secure multi-party computing, Smart contract

中图分类号: 

  • TP309
[1] SHAMIR A.How to Share a Secret[J].Communications of the ACM,1979,22(11):612-613.
[2] BLAKLEY G R.Safeguarding Cryptographic Keys[C]//Proceedings of the AFIPS National Computer Conference.Washington D.C,USA:IEEE Press,1979:313-317.
[3] CHOR B,GOLDWASSER S,MICALI S,et al.Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults[C]//Proceedings of the 26th Annual Symposium on the Foundations of Computer Science.IEEE,1985:383-395.
[4] GOLDREICH O,MICALI S,WIGDEION A.How to play anymental game a completeness theorem for protocols with honest majority[C]//Proceedings of the 19th ACM Symposium on Theory of Computing.1987:218-229.
[5] HE H W,YAN A,CHEN Z H.Overview of Smart ContractTechnology and Application Based on Blockchain[J].Computer Research and Development,2018(11):2452-2466.
[6] GONG Y H,WEI H R.Universal verifiability design for thecombination of n shamir threshold secret sharing schemes[J].Computer Science and Application,2019,9(12):2367-2374.
[7] KUMARESAN R,VAIKUNTANATHAN V,VASUDEVANP N.Improvements to secure computation with penalties[C]//Proceedings of the 23rd ACM Conference on Computer and Communications Security.New York:ACM PRESS,2016:406-417.
[8] KIAYIAS A,ZHOU H S,ZIKAS V.Fair and robust multi-party computation using a global transaction ledger[C]//Proceedings of the 35th Annual International Conference on the Theory and Applicatons of Cryptographic Techniues.Berlin:Springer,2016:705-734.
[9] ZHONG W,JIA Y Z.Prospect of the application of blockchain technology in accounting[J].Friends of Accounting,2016(17):122-125.
[1] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
基于安全多方计算和差分隐私的联邦学习方案
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[2] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[3] 窦家维.
保护隐私的汉明距离与编辑距离计算及应用
Privacy-preserving Hamming and Edit Distance Computation and Applications
计算机科学, 2022, 49(9): 355-360. https://doi.org/10.11896/jsjkx.220100241
[4] 黄松, 杜金虎, 王兴亚, 孙金磊.
以太坊智能合约模糊测试技术研究综述
Survey of Ethereum Smart Contract Fuzzing Technology Research
计算机科学, 2022, 49(8): 294-305. https://doi.org/10.11896/jsjkx.220500069
[5] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[6] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[7] 王健.
基于隐私保护的反向传播神经网络学习算法
Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving
计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155
[8] 彭冬阳, 王睿, 胡谷雨, 祖家琛, 王田丰.
视频缓存策略中QoE和能量效率的公平联合优化
Fair Joint Optimization of QoE and Energy Efficiency in Caching Strategy for Videos
计算机科学, 2022, 49(4): 312-320. https://doi.org/10.11896/jsjkx.210800027
[9] 张潆藜, 马佳利, 刘子昂, 刘新, 周睿.
以太坊Solidity智能合约漏洞检测方法综述
Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts
计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004
[10] 郭显, 王雨悦, 冯涛, 曹来成, 蒋泳波, 张迪.
基于区块链的工业控制系统角色委派访问控制机制
Blockchain-based Role-Delegation Access Control for Industrial Control System
计算机科学, 2021, 48(9): 306-316. https://doi.org/10.11896/jsjkx.210300235
[11] 王向宇, 杨挺.
智能合约定义路由目录服务器
Routing Directory Server Defined by Smart Contract
计算机科学, 2021, 48(6A): 504-508. https://doi.org/10.11896/jsjkx.200700210
[12] 郭上铜, 王瑞锦, 张凤荔.
区块链技术原理与应用综述
Summary of Principle and Application of Blockchain
计算机科学, 2021, 48(2): 271-281. https://doi.org/10.11896/jsjkx.200800021
[13] 陈自民, 卢艺文, 郭燕.
基于区块并行的以太坊智能合约高速重放
High-speed Replay of Ethereum Smart Contracts Based on Block Parallel
计算机科学, 2021, 48(2): 289-294. https://doi.org/10.11896/jsjkx.200500105
[14] 王辉, 陈博, 刘玉祥.
基于区块链的人事档案管理系统研究
Research on Personnel File Management System Based on Blockchain
计算机科学, 2021, 48(11A): 713-718. https://doi.org/10.11896/jsjkx.210300051
[15] 代闯闯, 栾海晶, 杨雪莹, 过晓冰, 陆忠华, 牛北方.
区块链技术研究综述
Overview of Blockchain Technology
计算机科学, 2021, 48(11A): 500-508. https://doi.org/10.11896/jsjkx.201200163
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!