Computer Science ›› 2024, Vol. 51 ›› Issue (9): 408-415.doi: 10.11896/jsjkx.231000054

• Information Security • Previous Articles     Next Articles

Transaction Granularity Modifiable Consortium Blockchain Scheme Based on Dual Merkel Trees Block Structure

WANG Dong, LI Xiaoruo, ZHU Bingnan   

  1. School of Software,Henan University,Kaifeng,Henan 475001,China
    Henan International Joint Laboratory of Intelligent Network Theory and Key Technology,Kaifeng,Henan 475001,China
  • Received:2023-10-10 Revised:2024-03-14 Online:2024-09-15 Published:2024-09-10
  • About author:WANG Dong,born in 1977,Ph.D,professor,is a member of CCF(No.22542S).Her main research interests include blockchain and its applications,and so on.
    LI Xiaoruo,born in 1999,postgraduate.His main research interests include cryptography and blockchain.
  • Supported by:
    General Program of the National Natural Science Foundation of China(61872125),Colleges and Universities Key Research Project of Henan Province(23A520035),Foundation of National Key Laboratory for Novel Software Technology,Nanjing University(KFKT2022B08) and Henan Province Science and Technology Research Project(232102210192).

Abstract: With the vigorous development of blockchain technology,information systems based on blockchain have been applied in many fields,including digital currency,supply chain and other fields.Driven by the dual needs of supervision and practical application,modifiable blockchain technology has been developed.However,the current modification scheme still has problems such as excessive centralization of modification authority and low modification efficiency.In response to the aforementioned problems,a transaction-granularity consortium blockchain ledger modification approach is proposed.It constructs a dual Merkle tree block structure,utilizing elliptic curve encryption and Diffie-Hellman key exchange technology to encrypt and store the chameleon hash trapdoor information(i.e.,chameleon hash private key) in the blockchain,reducing the system communication overhead for key distribution.On this basis,the modification right is bound to the user through the Merkle tree,and the proposal is subject to vo-ting review by authorized nodes,which effectively prevents the mining of modification rights and further improves the regulatory warehouse capabilities of the blockchain system.Modification experiments show that the overall algorithm execution speed of this consortium blockchain ledger solution reaches the millisecond level,and significantly reduces the additional overhead of data ope-rations on the chain.

Key words: Consortium blockchain, Chameleon hash, Modifiable blockchain, Elliptic curve cryptography, Data governance

CLC Number: 

  • TP309
[1]YUAN Y,WANG F Y.Blockchain:the state of the art and future trends[J].Acta Automatica Sinica,2016,42(4):481-494.
[2]CHEN C.Key Technology in Alliance Chain and Challenges in Monitoring Blockchain[J].Electric Power Equipment Management,2019(11):20-21.
[3]PANG J,LIU C,HAO K,et al.Research on Editable Blockchain Model Based on Temporal Index[J].Journal of Frontiers of Computer Science and Technology,2023,17(5):1180-1188.
[4]YUAN Y,WANG F Y.Editable blockchain:models,techniques and methods[J].Acta Automatica Sinica,2020,46(5):831-846.
[5]PUDDU I,DMITRIENKO A,CAPKUN S.μchain:How to Forget without Hard Forks[J/OL].http://eprint.iacr.org/2017/106.pdf.
[6]POLITOU E,CASINO F,ALEPIS E,et al.Blockchain mutability:Challenges and proposed solutions[J].IEEE Transactions on Emerging Topics in Computing,2019,9(4):1972-1986.
[7]MARSALEK A,ZEFFERER T.A correctable public blockchain[C]//2019 18th IEEE International Conference On Trust,Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering(TrustCom/BigDataSE).IEEE,2019:554-561.
[8]REN Y L,XU D T,ZHANG X P,et al.Deletable blockchainbased on threshold ring signature[J].Journal on Communications,2019,40(4):71-82.
[9]REN Y L,XU D T,ZHANGX P,et al.Scheme of revisable blockchain[J].Journal of Software,2020,12:3909-3922.
[10]KRAWCZYK H M,RABIN T D.Chameleon hashing and signatures:U.S.Patent 6,108,783[P].[2000-08-22].
[11]ATENIESE G,MAGRI B,VENTURID,et al.Redactable blockchain-or-rewriting history in bitcoin and friends[C]//2017 IEEE European Symposium on Security and Privacy(EuroS&P).IEEE,2017:111-126.
[12]LI P,XU H,MA T,et al.Research on fault-correcting blockchain technology[J].Journal of Cryptologic Research,2018,5(5):501-509.
[13]ASHRITHA K,SINDHU M,LAKSHMY K V.Redactableblockchain using enhanced chameleon hash function[C]//2019 5th International Conference on Advanced Computing & Communication Systems(ICACCS).IEEE,2019:323-328.
[14]ZHAO X,ZHANG Z,LI Y.An Editable and Accountable Blockchain Scheme[J].Journal of Cyber Security,2022,7(5):19-28.
[15]XUE Q,XUE Z,WANG C,et al.One modifiable blockchainscheme based on additive homomorphic encryption algorithm[J].Application Research of Computers,2022,39(11):3232-3237.
[16]LV W,WEI S J,YU M H,et al.Research on Verifiable Blockchain Ledger Redaction Method for Trusted Consortium[J].Chineses Journal of Computers,2021,44(10):2016-2032.
[17]WANG R M,WU J Y,ZHANG J H.Blockchain secure datasharing model based on secret sharing [J].JoCQUPT,Natural Science Edition,2023,35(6):1145-1153.
[18]XU G,SUN H.Modifiable Blockchain Based on Chebyshev Poly-nomial and Chameleon Hash Function[C]//International Conference on Web Information Systems and Applications.Cham:Springer International Publishing,2022:732-739.
[19]SHEN J,CHEN X,LIU Z,et al.Verifiable and RedactableBlockchains With Fully Editing Operations[J].IEEE Transactions on Information Forensics and Security,2023,18:3787-3802.
[20]XU Y,XIAO S,WANG H,et al.Redactable blockchain-basedsecure and accountable data management[J].IEEE Transactions on Network and Service Management,2024,21(2):1764-1776.
[21]LI F,XU H,SONG Q,et al.BLMA:Editable Blockchain-Based Lightweight Massive IIoT Device Authentication Protocol[J].IEEE Internet of Things Journal,2023,10(24):21633-21646.
[22]SHAO W,WANG J,WANG L,et al.Auditable Blockchain Rewriting in Permissioned Setting with Mandatory Revocability for IoT[J].IEEE Internet of Things Journal,2023,10(24):21322-21336.
[23]HAAKEGAARD R,LANG J.The elliptic curve diffie-hellman(ecdh)[J/OL].https://koclab.cs.ucsb.edu/teaching/ecc/project/2015Projects/HaakegaardLang.pdf,2015.
[24]MERKLER C.Protocols for public key cryptosystems[C]//Proceedings of the 1980 IEEE Symposium on Security and Privacy.Oakland,CA,USA:IEEE,1980.
[25]ZHANG X,TONG W,WANG T,et al.Cipher texts generation method in elliptic curve cryptography based on plaintext length[J].Journal of Computer Applications,2015,35(10):2863-2866,2876.
[1] KANG Zhong, WANG Maoning, MA Xiaowen, DUAN Meijiao. New Design of Redactable Consortium Blockchain Scheme Based on Multi-user Chameleon Hash [J]. Computer Science, 2024, 51(6A): 230600004-6.
[2] GENG Qian, CHUAI Ziang, JIN Jian. Operational Consistency Model Based on Consortium Blockchain for Inter-organizational Data Exchange [J]. Computer Science, 2024, 51(6A): 230800145-9.
[3] HUANG Shoumeng, YANG Boxiong, YANG Ming. Privacy Data Editing Mechanism Based on Distributed Chameleon Hash Function [J]. Computer Science, 2024, 51(6A): 240100157-5.
[4] YAN Jiahe, LI Honghui, MA Ying, LIU Zhen, ZHANG Dalin, JIANG Zhouxian, DUAN Yuhang. Multi-source Heterogeneous Data Fusion Technologies and Government Big Data GovernanceSystem [J]. Computer Science, 2024, 51(2): 1-14.
[5] XIE Zhuo, ZHANG Zhi-hong, LI Lei, FENG Ying-jie, CHEN Jing. Improvement of PBFT Algorithm Based on Consortium Blockchain [J]. Computer Science, 2022, 49(11): 360-367.
[6] WANG Ri-hong, ZHOU Hang, XU Quan-qing, ZHANG Li-feng. Non-byzantine Fault Tolerance Consensus Algorithm for Consortium Blockchain [J]. Computer Science, 2021, 48(9): 317-323.
[7] WANG Jun, WANG Xiu-lai, PANG Wei, ZHAO Hong-fei. Research on Big Data Governance for Science and Technology Forecast [J]. Computer Science, 2021, 48(9): 36-42.
[8] ZONG Si-jie, QIN Tian, HE Long-bing. Analysis and Application of Secure Boot Algorithm Based on IOT Chip [J]. Computer Science, 2021, 48(11A): 552-556.
[9] MAO Han-yu, NIE Tie-zheng, SHEN De-rong, YU Ge, XU Shi-cheng, HE Guang-yu. Survey on Key Techniques and Development of Blockchain as a Service Platform [J]. Computer Science, 2021, 48(11): 4-11.
[10] YOU Wen-zhu, GE Hai-bo. High-performance FPGA Implementation of Elliptic Curve ECC on Binary Domain [J]. Computer Science, 2020, 47(8): 127-131.
[11] YUE Wen-jiao, LI Peng, WEN Jun-hao, XING Bin. Study on Impact Assessment Model of Enterprise Data Application [J]. Computer Science, 2020, 47(11A): 520-523.
[12] YIN Qiu-shi, CHEN Jian-hua. Improved Identity Authentication Protocol Based on Elliptic Curve Cryptographyin Multi-server Environment [J]. Computer Science, 2018, 45(6): 111-116.
[13] . Chameleon Signature Scheme Based on Lattice [J]. Computer Science, 2013, 40(2): 117-119.
[14] . Improved Remote Attestation Mechanism of Platform Configuration Based on Chameleon Hashes [J]. Computer Science, 2013, 40(1): 118-121.
[15] . Research on General Wireless Authentication Protocol Based on PKI [J]. Computer Science, 2012, 39(7): 74-77.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!