Computer Science ›› 2021, Vol. 48 ›› Issue (11): 159-169.doi: 10.11896/jsjkx.210400027

;

• Blockchain Technology • Previous Articles     Next Articles

Key Update Mechanism in Bitcoin Based on Improved P2PKHCA Script Scheme

XIANG A-xin1,2, GAO Hong-feng1,3, TIAN You-liang1,2,4   

  1. 1 College of Computer Science and Technology,Guizhou University,Guiyang 550025,China
    2 Institute of Cryptography & Date Security,Guizhou University,Guiyang 550025,China
    3 Network and Information Management Center,Guizhou University,Guiyang 550025,China
    4 State Key Laboratory of Public Big Data,Guiyang 550025,China
  • Received:2021-04-01 Revised:2021-08-09 Online:2021-11-15 Published:2021-11-10
  • About author:XIANG A-xin,born in 1996,postgra-duate.His main research interests include cryptography and blockchain technology.
    GAO Hong-feng,born in 1975,associate professor.His main research interests include network and information secu-rity.
  • Supported by:
    National Natural Science Foundation of China(61662009, 61772008),Science and Technology Major Support Program of Guizhou Province(20183001), Key Program of the National Natural Science Union Foundation of China(U1836205), Science and Technology Program of Guizhou Province( [2019]1098,ZK[2021]general 331,ZK[2021]general 325),Project of High-level Innovative Talents of Guizhou Province( [2020]6008) and Science and Technology Program of Guiyang( [2021]1-5).

Abstract: Bitcoin is one of the most mature public chain application systems,the user key is the critical factor to the process of determining the ownership of Bitcoin,the security of Bitcoin is guaranteed by the safe management of the user key,and the loss of the key will lead to the loss of a large number of user assets.So it is an urgent problem to recover the lost assets.This paper proposes a key update mechanism in Bitcoin based on the improved P2PKHCA (pay-to-public-key-hash-with-conditional-anonymity) script scheme to solve above problems.Firstly,the key generation algorithm in the P2PKHCA scheme is improved by introducing the key life cycle and random number to solve its key leakage problem.Secondly,the two new opcodes,OP_KEYUPDATE and OP_TSELECTION,are proposed to design the new key update script to realize the user key update of the Bitcoin system.Finally,two types of key update schemes based on the key update script are constructed to make the script suitable for the requirements of different key update applications.The security analysis and performance analysis of the key update mechanism show that the proposed mechanism realizes the recovery of lost Bitcoins in the Bitcoin system on the premise of the effective completion of update of user's key.

Key words: Bitcoin, Blockchain, Key update, Recovery of lost Bitcoins, Script scheme

CLC Number: 

  • TP3
[1]NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system [OL].(2008-10-31) [2020-10-30].http://bitcoin.org/bitcoin.pdf.
[2]TSUNG-TING K,HYEONEUI K,LUCILA O M.Blockchaindistributed ledger technologies for biomedical and health care applications[J].the American Medical Informatics Association,2017,24(6):1211-1220.
[3]CHUKWU E,GARG L.A systematic review of blockchain inhealthcare:frameworks,prototypes,and implementations[J].IEEE Access,2020,8:21196-21214.
[4]TIAGO M,FERNÁNDEZ-CARAMÉS,PAULA F.A Reviewon the Use of Blockchain for the Internet of Things[J].IEEE Access,2018,6:32979-33001.
[5]OUIMET S.Bitcoin dominance rate hits 50% for first times[OL].[2020-09-28].https://www.coin-desk.com/bitcoin-do-minance-rate-hits-50-for-first-time-in-2018/.
[6]LI L,LIU J Q,CHANG X L,et al.Toward conditionally anonymous Bitcoin transactions:A lightweight-script approach[J].Information Sciences,2020,509:290-303.
[7]ESKANDARI S,CLARK J,BARRERA D,et al.A First Look at the Usability of Bitcoin Key Management[C]//Workshop on Usable Security.2015.
[8]ITTAY E,ADEM E G,EMIN G S,et al.Bitcoin-NG:A Scalable Blockchain Protocol[C]//Symposium on Networked Systems Design and Implementation.2016:45-59.
[9]MÖSER M,EYAL I,SIRER E G.Bitcoin Covenants[C]//International Conference on Financial Cryptography & Data Security.2016:126-141.
[10]O'CONNOR R ,PIEKARSKA M.Enhancing Bitcoin Transactions with Covenants[C]//International Conference on Financial Cryptography & Data Security.2017:191-198.
[11]POULAMI D,LISA E,TOMMASO F,et al.FastKitten:Practical Smart Contracts on Bitcoin[C]//USENIX Security Sympo-sium.2019:801-818.
[12]YU H,ZHANG Z Y,LIU J W.Research on Scaling Technology of Bitcoin Blockchain[J].Journal of Computer Research and Development,2017,54(10):2390-2403.
[13]BRENGEL M,ROSSOW C.Identifying Key Leakage of Bitcoin Users[C]//International Symposium on Recent Advances in Intrusion Detection.2018:623-643.
[14]LI J,LI T,LIU Z,et al.Secure Deduplication System with Active Key Update and Its Application in IoT[J].ACM Transactions on Intelligent Systems and Technology,2019,10(6):1-21.
[15]HONG H,SUN Z.Achieving secure data access control and efficient key updating in mobile multimedia sensor networks[J].Multimedia Tools and Applications,2017,77(4):4477-4490.
[16]TIAN Y,WANG Z,XIONG J,et al.A Blockchain-Based Secure Key Management Scheme with Trustworthiness in DWSNs[J].IEEE Transactions on Industrial Informatics,2020,16(9):6193-6202.
[17]LI Y,YU Y,YANG B,et al.Privacy preserving cloud data auditing with efficient key update[J].Future Generation Computer Systems,2018,78(PT.2):789-798.
[18]ATHMANI S,BILAMI A,BOUBICHE D E.EDAK:An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs[J].Future Generation Computer Systems,2019,92:789-799.
[19]NICOLAS T C,REBEKAH M.Stealth Address and Key Ma-nagement Techniques in Blockchain Systems[C]//International Conference on Information Systems Security & Privacy.2017:559-566.
[20]STANISLAW J,HUGO K,JASON K R.Updatable Oblivious Key Management for Storage Systems[C]//ACM Conference on Computer and Communictions Secu-rity.2019:379-393.
[21]ALBAKRI A,HARN L,MADDUMALA M.Polynomial-based Lightweight Key Management in a Permissioned Blockchain[C]//IEEE Conference on Communications and Network Secu-rity.2019:1-9.
[22]ZHANG R,LIU J,HAN Z,et al.An IBE scheme using ECCcombined public key[J].Computers & Electrical Engineering,2010,36(6):1046-1054.
[23]LI X,QIAN H,ZHOU Y.Pitfalls in identity-based encryption using an elliptic curve combined public key[J].Applied Mathematics Letters,2012,25(8):1111-1113.
[24]ANDERSON R.Two Remarks on Public-Key Cryptology[OL].[2020-09-27].http://www.cl.cam.ac.uk/user/rja14/.
[25]THOMAS P.Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)[J].Request for Comments,2013,6979:1-79.
[26]WANG Z,YU H,ZHANG Z,et al.ECDSA weak randomness in Bitcoin[J].Future Generation Computer Systems,2020,102:507-513.
[27]BROWN M,HANKERSON D,LÓPEZ J,et al.Software Implementation of the NIST Elliptic Curves Over Prime Fields[C]//Proceeding of the 2001 Conference on Topics in Crytology:The Cryptographer's Track at RSA.2001:250-265.
[1] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[2] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[3] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[4] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[5] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[6] HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507.
[7] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[8] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[9] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[10] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[11] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[12] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[13] YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370.
[14] WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38.
[15] ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!