计算机科学 ›› 2024, Vol. 51 ›› Issue (9): 408-415.doi: 10.11896/jsjkx.231000054
王冬, 李笑若, 祝丙南
WANG Dong, LI Xiaoruo, ZHU Bingnan
摘要: 随着区块链技术的蓬勃发展,以区块链为底层架构的信息系统已应用于包括数字货币、供应链等众多领域。在监管和实际应用双重需求的驱动下,可修改区块链技术因能够进行安全且权责分明的数据治理而成为当前研究的热点。然而,目前的修改方案中仍然存在修改权限过度中心化、修改效率不高等问题。针对上述问题,提出了一种交易粒度联盟链账本修改方案,构建了双默克尔树区块结构,利用椭圆曲线加密和迪菲-赫尔曼秘钥交换技术将变色龙哈希陷门信息(即变色龙哈希私钥)加密存储在区块中,降低密钥分发的系统通信开销。在此基础之上,通过默克尔树将修改权与用户绑定,修改提案受权限节点投票审查,有效防止了修改权的滥用,进一步提高了区块链系统的监管问责能力。实验表明,该联盟链账本修改方案的算法执行速率整体达到毫秒级,并大幅降低了链上数据修改操作的额外开销。
中图分类号:
[1]YUAN Y,WANG F Y.Blockchain:the state of the art and future trends[J].Acta Automatica Sinica,2016,42(4):481-494. [2]CHEN C.Key Technology in Alliance Chain and Challenges in Monitoring Blockchain[J].Electric Power Equipment Management,2019(11):20-21. [3]PANG J,LIU C,HAO K,et al.Research on Editable Blockchain Model Based on Temporal Index[J].Journal of Frontiers of Computer Science and Technology,2023,17(5):1180-1188. [4]YUAN Y,WANG F Y.Editable blockchain:models,techniques and methods[J].Acta Automatica Sinica,2020,46(5):831-846. [5]PUDDU I,DMITRIENKO A,CAPKUN S.μchain:How to Forget without Hard Forks[J/OL].http://eprint.iacr.org/2017/106.pdf. [6]POLITOU E,CASINO F,ALEPIS E,et al.Blockchain mutability:Challenges and proposed solutions[J].IEEE Transactions on Emerging Topics in Computing,2019,9(4):1972-1986. [7]MARSALEK A,ZEFFERER T.A correctable public blockchain[C]//2019 18th IEEE International Conference On Trust,Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering(TrustCom/BigDataSE).IEEE,2019:554-561. [8]REN Y L,XU D T,ZHANG X P,et al.Deletable blockchainbased on threshold ring signature[J].Journal on Communications,2019,40(4):71-82. [9]REN Y L,XU D T,ZHANGX P,et al.Scheme of revisable blockchain[J].Journal of Software,2020,12:3909-3922. [10]KRAWCZYK H M,RABIN T D.Chameleon hashing and signatures:U.S.Patent 6,108,783[P].[2000-08-22]. [11]ATENIESE G,MAGRI B,VENTURID,et al.Redactable blockchain-or-rewriting history in bitcoin and friends[C]//2017 IEEE European Symposium on Security and Privacy(EuroS&P).IEEE,2017:111-126. [12]LI P,XU H,MA T,et al.Research on fault-correcting blockchain technology[J].Journal of Cryptologic Research,2018,5(5):501-509. [13]ASHRITHA K,SINDHU M,LAKSHMY K V.Redactableblockchain using enhanced chameleon hash function[C]//2019 5th International Conference on Advanced Computing & Communication Systems(ICACCS).IEEE,2019:323-328. [14]ZHAO X,ZHANG Z,LI Y.An Editable and Accountable Blockchain Scheme[J].Journal of Cyber Security,2022,7(5):19-28. [15]XUE Q,XUE Z,WANG C,et al.One modifiable blockchainscheme based on additive homomorphic encryption algorithm[J].Application Research of Computers,2022,39(11):3232-3237. [16]LV W,WEI S J,YU M H,et al.Research on Verifiable Blockchain Ledger Redaction Method for Trusted Consortium[J].Chineses Journal of Computers,2021,44(10):2016-2032. [17]WANG R M,WU J Y,ZHANG J H.Blockchain secure datasharing model based on secret sharing [J].JoCQUPT,Natural Science Edition,2023,35(6):1145-1153. [18]XU G,SUN H.Modifiable Blockchain Based on Chebyshev Poly-nomial and Chameleon Hash Function[C]//International Conference on Web Information Systems and Applications.Cham:Springer International Publishing,2022:732-739. [19]SHEN J,CHEN X,LIU Z,et al.Verifiable and RedactableBlockchains With Fully Editing Operations[J].IEEE Transactions on Information Forensics and Security,2023,18:3787-3802. [20]XU Y,XIAO S,WANG H,et al.Redactable blockchain-basedsecure and accountable data management[J].IEEE Transactions on Network and Service Management,2024,21(2):1764-1776. [21]LI F,XU H,SONG Q,et al.BLMA:Editable Blockchain-Based Lightweight Massive IIoT Device Authentication Protocol[J].IEEE Internet of Things Journal,2023,10(24):21633-21646. [22]SHAO W,WANG J,WANG L,et al.Auditable Blockchain Rewriting in Permissioned Setting with Mandatory Revocability for IoT[J].IEEE Internet of Things Journal,2023,10(24):21322-21336. [23]HAAKEGAARD R,LANG J.The elliptic curve diffie-hellman(ecdh)[J/OL].https://koclab.cs.ucsb.edu/teaching/ecc/project/2015Projects/HaakegaardLang.pdf,2015. [24]MERKLER C.Protocols for public key cryptosystems[C]//Proceedings of the 1980 IEEE Symposium on Security and Privacy.Oakland,CA,USA:IEEE,1980. [25]ZHANG X,TONG W,WANG T,et al.Cipher texts generation method in elliptic curve cryptography based on plaintext length[J].Journal of Computer Applications,2015,35(10):2863-2866,2876. |
|