计算机科学 ›› 2024, Vol. 51 ›› Issue (6A): 240100157-5.doi: 10.11896/jsjkx.240100157

• 信息安全 • 上一篇    下一篇

一种分散变色龙哈希函数的链上隐私数据编辑机制

黄寿孟1,2, 杨博雄2, 杨明3   

  1. 1 三亚学院信息与智能工程学院 海南 三亚 572022
    2 三亚学院陈国良院士团队创新中心 海南 三亚 572022
    3 三亚学院容淳铭院士工作站 海南 三亚 572022
  • 发布日期:2024-06-06
  • 通讯作者: 黄寿孟(huang123888@126.com)
  • 基金资助:
    海南省自然科学基金(622RC735);海南省院士创新平台科研项目资金(YSPTZX202144,YSPTZX202145);三亚学院校级重大项目(USY22XK-04)

Privacy Data Editing Mechanism Based on Distributed Chameleon Hash Function

HUANG Shoumeng1,2, YANG Boxiong2, YANG Ming3   

  1. 1 School of Information & Intelligence Engineering,University of Sanya,Sanya,Hainan 572022,China
    2 Academician Guoliang Chen Team Innovation Center,University of Sanya,Sanya,Hainan 572022,China
    3 Academician Chunming Rong Workstation,University of Sanya,Sanya,Hainan 572022,China
  • Published:2024-06-06
  • About author:HUANG Shoumeng,born in 1975,master,associate professor.His main research interests inclue information technology and information security.
  • Supported by:
    Hainan Provincia1 Natural Science Foundation of China(622RC735),Specific Research Fund of the Innovation Platform for Academician of Hainan Province(YSPTZX202144,YSPTZX202145) and University of Sanya Major Project(USY22XK-04).

摘要: 随着区块链技术广泛应用于各个领域,数据安全及用户隐私出现了很多未知威胁和挑战。对于恶意携带用户隐私或者携带非法攻击代码的非法交易数据,通过属性策略、变色龙哈希算法,设计了基于多方监控的变色龙哈希碰撞数据编辑机制(DecPRB),该DecPRB机制是在变色龙哈希编辑机制的基础上,优化设计以方便管理的陷门哈希函数,通过计算哈希碰撞实现区块链历史数据编辑,即可将在区块链上公开的那些非法数据(特别是隐私数据或攻击代码)删除,当然在更新编辑过程中,所有修改权限由链上所有节点共同监控。最后通过安全性分析推理出DecPRB机制,既不改变区块链的安全属性,又具有很强的抗攻击能力,再通过仿真实验验证DecPRB机制具有一定的有效性,符合数据安全需求。该DecPRB机制在复杂的分布式网络环境中(特别是分布式的云计算和区块链系统)能有效保护数据安全和隐私问题,对数字经济时代的发展作出一定的贡献。

关键词: 哈希函数, 隐私数据, 编辑机制, 变色龙哈希

Abstract: With the widespread application of blockchain technology in various fields,data security and user privacy are faced with many unknown threats and challenges.For illegal transaction data that maliciously carries user privacy or illegal attack code,a chameleon hash collision data editing mechanism (DecPRB) based on multi-party monitoring is designed through attribute strategy and chameleon hash algorithm.This DecPRB mechanism is based on the chameleon hash editing mechanism,optimized and designed with a trapdoor hash function that is easy to manage.By calculating hash collisions,blockchain historical data editing is achieved,illegal data (especially private data or attack code) that is publicly available on the blockchain can be deleted.Of course,during this update and editing process,all modification permissions are jointly monitored by all nodes on the chain.Finally,through security analysis,it is inferred that the DecPRB mechanism does not change the security attributes of the blockchain and has strong anti attack capabilities.Simulation experiments are conducted to verify the effectiveness of the DecPRB mechanism,which meets data security requirements.DecPRB mechanism can effectively protect data security and privacy issues in complex distributed network environments,especially distributed cloud computing and blockchain systems,and make a certain contribution to the development of the digital economy era.

Key words: Hash function, Privacy data, Editing mechanism, Chameleon hash

中图分类号: 

  • TP309
[1]ROMAN M,JENS H,MARTIN H,et al.A quantitative analysis of the impact of ar-bitrary blockchain content on bitcoin[C]//International Conference on FinancialCryptography and Data Security.2018:420-438.
[2]IVAN P,ALEXANDRA D,SRDJAN C.uchain:How to forget without hard forks[J].IACR Cryptology ePrint Archive,2017,20(1):106-116.
[3]ALI D,SALIL S K,RAJA J.Mof-bc:A memory optimized and flexible blockchain for large scale networks[J].Future Generation Computer Systems,2019,92:357-373.
[4]DOMINIC D,BERNARDO M,SRI A K T.Redactable blockchain in the permissionless setting[C]//2019 IEEE Symposiumon Security and Privacy.2019:124-138.
[5]SRI A K T,ADITHYA B,BERNARDO M,et al.Reparo:Publicly verifiable layer to repair blockchains[J].arXiv:2001.00486,2020.
[6]GIUSEPPE A,BERNARDO M,DANIELE V,et al.Redactable blockchain··c or··c rewriting history in bitcoin and friends[C]//2017 IEEE European Symposium on Security and Privacy.2017:111-126.
[7]DAVID D,KAI S,DANIEL S,et al.Fine-grained and controlled rewriting in blockchains:Chameleon-hashing gone attribute-based[C]//26th Annual Network and Distributed System Security Symposium.2019:1-15.
[8]KE H,XIAO S Z,YI M,et al.Achieving intelligent trust-layer for internet-of-things via self-redactable blockchain[J].IEEE Transactions on Industrial Informatics.2020,16(4):2677-2686.
[9]KE H,XIAO S Z,YI M,et al.Building redactable consortium blockchain for industrial internet-of-things[J].IEEE Transactions on IndustrialInformatics.2019,15(6):3670-3679.
[10]ZHANG D.Research on key technologies of dataSecurity and privacy protection in distributed environment[D].Chongqing:Southwest University,2021.
[11]LIAO X F,ZHANG D.Data privacy security based on re-dactable blockchain[J].Journal of Guangzhou University(Natural Science Edition),2021,20(3):1-8.
[12]ALLISON L,BRENT W.Decentralizing attribute-based encryption[C]//Annual international conference on the theory and applications of cryptographic techniques.2021:568-588.
[13]Charm-Crypto 0.5.[OL].https://github.com/JHUISI/charm.2021-09-15
[14]OpenSSL[OL].https://www.openssl.org/.2021-10-10.
[15]TheGNU Multiple Precision Arithmetic Library 6.1.2.[OL].Available:https://gmplib.org/.2022-08-04.
[16]The Pairing-Based Cryptography Library 0.5.14.[OL].Available:https://crypto.stanford.edu/pbc/.2022-10-27.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!