计算机科学 ›› 2024, Vol. 51 ›› Issue (9): 408-415.doi: 10.11896/jsjkx.231000054

• 信息安全 • 上一篇    下一篇

基于双默克尔树区块结构的交易粒度联盟链修改方案

王冬, 李笑若, 祝丙南   

  1. 河南大学软件学院 河南 开封 475001
    河南省智能网络理论与关键技术国际联合实验室 河南 开封 475001
  • 收稿日期:2023-10-10 修回日期:2024-03-14 出版日期:2024-09-15 发布日期:2024-09-10
  • 通讯作者: 李笑若(lixiaoruo@henu.edu.cn)
  • 作者简介:(juliawdd@henu.edu.cn)
  • 基金资助:
    国家自然科学基金面上项目(61872125);河南省高等学校重点科研项目(23A520035);南京大学计算机软件新技术国家重点实验室开放课题(KFKT2022B08);河南省科技攻关项目(232102210192)

Transaction Granularity Modifiable Consortium Blockchain Scheme Based on Dual Merkel Trees Block Structure

WANG Dong, LI Xiaoruo, ZHU Bingnan   

  1. School of Software,Henan University,Kaifeng,Henan 475001,China
    Henan International Joint Laboratory of Intelligent Network Theory and Key Technology,Kaifeng,Henan 475001,China
  • Received:2023-10-10 Revised:2024-03-14 Online:2024-09-15 Published:2024-09-10
  • About author:WANG Dong,born in 1977,Ph.D,professor,is a member of CCF(No.22542S).Her main research interests include blockchain and its applications,and so on.
    LI Xiaoruo,born in 1999,postgraduate.His main research interests include cryptography and blockchain.
  • Supported by:
    General Program of the National Natural Science Foundation of China(61872125),Colleges and Universities Key Research Project of Henan Province(23A520035),Foundation of National Key Laboratory for Novel Software Technology,Nanjing University(KFKT2022B08) and Henan Province Science and Technology Research Project(232102210192).

摘要: 随着区块链技术的蓬勃发展,以区块链为底层架构的信息系统已应用于包括数字货币、供应链等众多领域。在监管和实际应用双重需求的驱动下,可修改区块链技术因能够进行安全且权责分明的数据治理而成为当前研究的热点。然而,目前的修改方案中仍然存在修改权限过度中心化、修改效率不高等问题。针对上述问题,提出了一种交易粒度联盟链账本修改方案,构建了双默克尔树区块结构,利用椭圆曲线加密和迪菲-赫尔曼秘钥交换技术将变色龙哈希陷门信息(即变色龙哈希私钥)加密存储在区块中,降低密钥分发的系统通信开销。在此基础之上,通过默克尔树将修改权与用户绑定,修改提案受权限节点投票审查,有效防止了修改权的滥用,进一步提高了区块链系统的监管问责能力。实验表明,该联盟链账本修改方案的算法执行速率整体达到毫秒级,并大幅降低了链上数据修改操作的额外开销。

关键词: 联盟链, 变色龙哈希, 可修改区块链, 椭圆曲线加密, 数据治理

Abstract: With the vigorous development of blockchain technology,information systems based on blockchain have been applied in many fields,including digital currency,supply chain and other fields.Driven by the dual needs of supervision and practical application,modifiable blockchain technology has been developed.However,the current modification scheme still has problems such as excessive centralization of modification authority and low modification efficiency.In response to the aforementioned problems,a transaction-granularity consortium blockchain ledger modification approach is proposed.It constructs a dual Merkle tree block structure,utilizing elliptic curve encryption and Diffie-Hellman key exchange technology to encrypt and store the chameleon hash trapdoor information(i.e.,chameleon hash private key) in the blockchain,reducing the system communication overhead for key distribution.On this basis,the modification right is bound to the user through the Merkle tree,and the proposal is subject to vo-ting review by authorized nodes,which effectively prevents the mining of modification rights and further improves the regulatory warehouse capabilities of the blockchain system.Modification experiments show that the overall algorithm execution speed of this consortium blockchain ledger solution reaches the millisecond level,and significantly reduces the additional overhead of data ope-rations on the chain.

Key words: Consortium blockchain, Chameleon hash, Modifiable blockchain, Elliptic curve cryptography, Data governance

中图分类号: 

  • TP309
[1]YUAN Y,WANG F Y.Blockchain:the state of the art and future trends[J].Acta Automatica Sinica,2016,42(4):481-494.
[2]CHEN C.Key Technology in Alliance Chain and Challenges in Monitoring Blockchain[J].Electric Power Equipment Management,2019(11):20-21.
[3]PANG J,LIU C,HAO K,et al.Research on Editable Blockchain Model Based on Temporal Index[J].Journal of Frontiers of Computer Science and Technology,2023,17(5):1180-1188.
[4]YUAN Y,WANG F Y.Editable blockchain:models,techniques and methods[J].Acta Automatica Sinica,2020,46(5):831-846.
[5]PUDDU I,DMITRIENKO A,CAPKUN S.μchain:How to Forget without Hard Forks[J/OL].http://eprint.iacr.org/2017/106.pdf.
[6]POLITOU E,CASINO F,ALEPIS E,et al.Blockchain mutability:Challenges and proposed solutions[J].IEEE Transactions on Emerging Topics in Computing,2019,9(4):1972-1986.
[7]MARSALEK A,ZEFFERER T.A correctable public blockchain[C]//2019 18th IEEE International Conference On Trust,Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering(TrustCom/BigDataSE).IEEE,2019:554-561.
[8]REN Y L,XU D T,ZHANG X P,et al.Deletable blockchainbased on threshold ring signature[J].Journal on Communications,2019,40(4):71-82.
[9]REN Y L,XU D T,ZHANGX P,et al.Scheme of revisable blockchain[J].Journal of Software,2020,12:3909-3922.
[10]KRAWCZYK H M,RABIN T D.Chameleon hashing and signatures:U.S.Patent 6,108,783[P].[2000-08-22].
[11]ATENIESE G,MAGRI B,VENTURID,et al.Redactable blockchain-or-rewriting history in bitcoin and friends[C]//2017 IEEE European Symposium on Security and Privacy(EuroS&P).IEEE,2017:111-126.
[12]LI P,XU H,MA T,et al.Research on fault-correcting blockchain technology[J].Journal of Cryptologic Research,2018,5(5):501-509.
[13]ASHRITHA K,SINDHU M,LAKSHMY K V.Redactableblockchain using enhanced chameleon hash function[C]//2019 5th International Conference on Advanced Computing & Communication Systems(ICACCS).IEEE,2019:323-328.
[14]ZHAO X,ZHANG Z,LI Y.An Editable and Accountable Blockchain Scheme[J].Journal of Cyber Security,2022,7(5):19-28.
[15]XUE Q,XUE Z,WANG C,et al.One modifiable blockchainscheme based on additive homomorphic encryption algorithm[J].Application Research of Computers,2022,39(11):3232-3237.
[16]LV W,WEI S J,YU M H,et al.Research on Verifiable Blockchain Ledger Redaction Method for Trusted Consortium[J].Chineses Journal of Computers,2021,44(10):2016-2032.
[17]WANG R M,WU J Y,ZHANG J H.Blockchain secure datasharing model based on secret sharing [J].JoCQUPT,Natural Science Edition,2023,35(6):1145-1153.
[18]XU G,SUN H.Modifiable Blockchain Based on Chebyshev Poly-nomial and Chameleon Hash Function[C]//International Conference on Web Information Systems and Applications.Cham:Springer International Publishing,2022:732-739.
[19]SHEN J,CHEN X,LIU Z,et al.Verifiable and RedactableBlockchains With Fully Editing Operations[J].IEEE Transactions on Information Forensics and Security,2023,18:3787-3802.
[20]XU Y,XIAO S,WANG H,et al.Redactable blockchain-basedsecure and accountable data management[J].IEEE Transactions on Network and Service Management,2024,21(2):1764-1776.
[21]LI F,XU H,SONG Q,et al.BLMA:Editable Blockchain-Based Lightweight Massive IIoT Device Authentication Protocol[J].IEEE Internet of Things Journal,2023,10(24):21633-21646.
[22]SHAO W,WANG J,WANG L,et al.Auditable Blockchain Rewriting in Permissioned Setting with Mandatory Revocability for IoT[J].IEEE Internet of Things Journal,2023,10(24):21322-21336.
[23]HAAKEGAARD R,LANG J.The elliptic curve diffie-hellman(ecdh)[J/OL].https://koclab.cs.ucsb.edu/teaching/ecc/project/2015Projects/HaakegaardLang.pdf,2015.
[24]MERKLER C.Protocols for public key cryptosystems[C]//Proceedings of the 1980 IEEE Symposium on Security and Privacy.Oakland,CA,USA:IEEE,1980.
[25]ZHANG X,TONG W,WANG T,et al.Cipher texts generation method in elliptic curve cryptography based on plaintext length[J].Journal of Computer Applications,2015,35(10):2863-2866,2876.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!