计算机科学 ›› 2022, Vol. 49 ›› Issue (6A): 469-473.doi: 10.11896/jsjkx.210700033

• 信息安全 • 上一篇    下一篇


卫宏儒, 李思月, 郭涌浩   

  1. 北京科技大学数理学院 北京 100083
  • 出版日期:2022-06-10 发布日期:2022-06-08
  • 通讯作者: 李思月(lsy231con@163.com)
  • 作者简介:(weihr@ustb.edu.cn)
  • 基金资助:

Secret Reconstruction Protocol Based on Smart Contract

WEI Hong-ru, LI Si-yue, GUO Yong-hao   

  1. School of Mathematics and Physics,University of Science and Technology,Beijing 100083,China
  • Online:2022-06-10 Published:2022-06-08
  • About author:WEI Hong-ru,born in 1963,associate professor.His main research interests include mathematics,information secu-rity and cryptography and key techno-logies of Internet of things.
    LI Si-yue,born in 1996.Her main research interests include information security and cryptography.
  • Supported by:
    Key-Area Research and Development Program of Guangdong Province(2020B0909020001) and National Natural Science Foundation of China(61873026).

摘要: 针对可验证秘密共享方案设计秘密重建协议,在现实生活中参与者都是理性的条件下,利用惩罚机制并采用扣除押金的方式,对可验证性秘密共享方案验证出的恶意参与方的行为进行约束,并利用区块链的智能合约工具,根据智能合约的独立性、不可篡改性,解决了以有研究中很难解决的可信第三方问题,此协议分为本地协议和智能合约两部分,在保证安全性、秘密性的同时也能够通过对智能合约的设计实现公平性。

关键词: 安全多方计算, 惩罚机制, 公平性, 秘密重建, 智能合约

Abstract: The secret reconstruction protocol for a verifiable secret sharing scheme is designed.Under real-life conditions where the participants are all rational,the punishment mechanism and the method of deducting the deposit are used to conduct the behavior of malicious parties verified by the verifiable secret sharing scheme Constraint,and using the tool of blockchain smart contract,according to the independence and non-tampering of smart contract,the problem of trusted third parties that are difficult to solve in previous research is solved.The protocol is divided into two parts,local protocol and smart contract.While ensuring the security and confidentiality,the protocol can also utilize the design of smart contracts to achieve fairness.

Key words: Fairness, Punishment mechanism, Secret reconstruction, Secure multi-party computing, Smart contract


  • TP309
[1] SHAMIR A.How to Share a Secret[J].Communications of the ACM,1979,22(11):612-613.
[2] BLAKLEY G R.Safeguarding Cryptographic Keys[C]//Proceedings of the AFIPS National Computer Conference.Washington D.C,USA:IEEE Press,1979:313-317.
[3] CHOR B,GOLDWASSER S,MICALI S,et al.Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults[C]//Proceedings of the 26th Annual Symposium on the Foundations of Computer Science.IEEE,1985:383-395.
[4] GOLDREICH O,MICALI S,WIGDEION A.How to play anymental game a completeness theorem for protocols with honest majority[C]//Proceedings of the 19th ACM Symposium on Theory of Computing.1987:218-229.
[5] HE H W,YAN A,CHEN Z H.Overview of Smart ContractTechnology and Application Based on Blockchain[J].Computer Research and Development,2018(11):2452-2466.
[6] GONG Y H,WEI H R.Universal verifiability design for thecombination of n shamir threshold secret sharing schemes[J].Computer Science and Application,2019,9(12):2367-2374.
[7] KUMARESAN R,VAIKUNTANATHAN V,VASUDEVANP N.Improvements to secure computation with penalties[C]//Proceedings of the 23rd ACM Conference on Computer and Communications Security.New York:ACM PRESS,2016:406-417.
[8] KIAYIAS A,ZHOU H S,ZIKAS V.Fair and robust multi-party computation using a global transaction ledger[C]//Proceedings of the 35th Annual International Conference on the Theory and Applicatons of Cryptographic Techniues.Berlin:Springer,2016:705-734.
[9] ZHONG W,JIA Y Z.Prospect of the application of blockchain technology in accounting[J].Friends of Accounting,2016(17):122-125.
[1] 汤凌韬, 王迪, 张鲁飞, 刘盛云.
Federated Learning Scheme Based on Secure Multi-party Computation and Differential Privacy
计算机科学, 2022, 49(9): 297-305. https://doi.org/10.11896/jsjkx.210800108
[2] 王子凯, 朱健, 张伯钧, 胡凯.
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[3] 窦家维.
Privacy-preserving Hamming and Edit Distance Computation and Applications
计算机科学, 2022, 49(9): 355-360. https://doi.org/10.11896/jsjkx.220100241
[4] 黄松, 杜金虎, 王兴亚, 孙金磊.
Survey of Ethereum Smart Contract Fuzzing Technology Research
计算机科学, 2022, 49(8): 294-305. https://doi.org/10.11896/jsjkx.220500069
[5] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[6] 高健博, 张家硕, 李青山, 陈钟.
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[7] 王健.
Back-propagation Neural Network Learning Algorithm Based on Privacy Preserving
计算机科学, 2022, 49(6A): 575-580. https://doi.org/10.11896/jsjkx.211100155
[8] 彭冬阳, 王睿, 胡谷雨, 祖家琛, 王田丰.
Fair Joint Optimization of QoE and Energy Efficiency in Caching Strategy for Videos
计算机科学, 2022, 49(4): 312-320. https://doi.org/10.11896/jsjkx.210800027
[9] 张潆藜, 马佳利, 刘子昂, 刘新, 周睿.
Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts
计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004
[10] 郭显, 王雨悦, 冯涛, 曹来成, 蒋泳波, 张迪.
Blockchain-based Role-Delegation Access Control for Industrial Control System
计算机科学, 2021, 48(9): 306-316. https://doi.org/10.11896/jsjkx.210300235
[11] 王向宇, 杨挺.
Routing Directory Server Defined by Smart Contract
计算机科学, 2021, 48(6A): 504-508. https://doi.org/10.11896/jsjkx.200700210
[12] 郭上铜, 王瑞锦, 张凤荔.
Summary of Principle and Application of Blockchain
计算机科学, 2021, 48(2): 271-281. https://doi.org/10.11896/jsjkx.200800021
[13] 陈自民, 卢艺文, 郭燕.
High-speed Replay of Ethereum Smart Contracts Based on Block Parallel
计算机科学, 2021, 48(2): 289-294. https://doi.org/10.11896/jsjkx.200500105
[14] 王辉, 陈博, 刘玉祥.
Research on Personnel File Management System Based on Blockchain
计算机科学, 2021, 48(11A): 713-718. https://doi.org/10.11896/jsjkx.210300051
[15] 代闯闯, 栾海晶, 杨雪莹, 过晓冰, 陆忠华, 牛北方.
Overview of Blockchain Technology
计算机科学, 2021, 48(11A): 500-508. https://doi.org/10.11896/jsjkx.201200163
Full text



No Suggested Reading articles found!