通信学报 ›› 2022, Vol. 43 ›› Issue (8): 131-141.doi: 10.11959/j.issn.1000-436x.2022162
张学旺1,2, 黎志鸿1, 林金朝3
修回日期:
2022-08-05
出版日期:
2022-08-25
发布日期:
2022-08-01
作者简介:
张学旺(1974- ),男,湖南祁东人,重庆大学博士生,重庆邮电大学副教授,主要研究方向为数据安全与隐私保护、区块链与物联网等基金资助:
Xuewang ZHANG1,2, Zhihong LI1, Jinzhao LIN3
Revised:
2022-08-05
Online:
2022-08-25
Published:
2022-08-01
Supported by:
摘要:
为了解决联盟链应用场景中身份信息、交易数据存在的安全隐患,以及单级加密方法耗时的问题,提出了一种基于公平盲签名和分级加密的联盟链隐私保护方案。一方面,考虑公平盲签名方案存在中心化强、安全性差的缺陷,结合零知识证明技术对其重新设计,使之适用于联盟链应用场景;另一方面,基于 Paillier 同态加密算法,设计出可监管的分级加密方法。安全性分析及仿真实验结果表明,所提方案在实现对加密后的交易数据信息监管的同时,减少了加解密过程的时间开销;能有效抵抗篡改、窃听等恶意攻击,并使加密效率明显提升。
中图分类号:
张学旺, 黎志鸿, 林金朝. 基于公平盲签名和分级加密的联盟链隐私保护方案[J]. 通信学报, 2022, 43(8): 131-141.
Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain[J]. Journal on Communications, 2022, 43(8): 131-141.
表4
不同方案加密开销对比"
文件大小/kbit | 消耗时长/ms | |||
文献[ | 文献[ | 文献[ | 本文方案 | |
5 | 19.161 | 37.132 | 6.723 | 5.173 |
10 | 37.718 | 75.923 | 12.684 | 10.002 |
15 | 55.892 | 109.851 | 14.015 | 13.746 |
20 | 62.902 | 129.55 | 18.762 | 16.714 |
25 | 87.91 | 166.82 | 22.516 | 23.619 |
30 | 95.725 | 189.345 | 26.271 | 25.272 |
35 | 111.94 | 219.876 | 31.151 | 29.485 |
40 | 125.856 | 253.451 | 36.417 | 33.167 |
45 | 140.121 | 277.623 | 39.438 | 36.931 |
50 | 150.85 | 303.67 | 43.787 | 39.043 |
表6
不同方案解密开销对比"
文件大小/kbit | 消耗时长/ms | |||
文献[ | 文献[ | 文献[ | 本文方案 | |
5 | 2.218 | 21.055 | 6.702 | 1.065 |
10 | 4.093 | 36.302 | 12.661 | 1.606 |
15 | 6.315 | 47.413 | 13.937 | 2.438 |
20 | 7.957 | 60.399 | 18.758 | 2.979 |
25 | 10.126 | 69.764 | 22.488 | 3.732 |
30 | 13.093 | 82.301 | 26.250 | 4.643 |
35 | 15.411 | 95.621 | 31.083 | 5.413 |
40 | 16.258 | 115.632 | 36.389 | 5.965 |
45 | 18.539 | 128.456 | 39.217 | 6.534 |
50 | 21.145 | 137.031 | 42.856 | 7.586 |
[1] | GAI K K , WU Y L , ZHU L H ,et al. Privacy-preserving energy trading using consortium blockchain in smart grid[J]. IEEE Transactions on Industrial Informatics, 2019,15(6): 3548-3558. |
[2] | DU M X , CHEN Q J , XIAO J ,et al. Supply chain finance innovation using blockchain[J]. IEEE Transactions on Engineering Management, 2020,67(4): 1045-1058. |
[3] | 李娟娟, 袁勇, 王飞跃 . 基于区块链的数字货币发展现状与展望[J]. 自动化学报, 2021,47(4): 715-729. |
LI J J , YUAN Y , WANG F Y . Blockchain-based digital currency:the state of the art and future trends[J]. Acta Automatica Sinica, 2021,47(4): 715-729. | |
[4] | ZHANG X H , CHEN X F . Data security sharing and storage based on a consortium blockchain in a vehicular ad-hoc network[J]. IEEE Access, 2019,7: 58241-58254. |
[5] | SHE W , GU Z H , LYU X K ,et al. Homomorphic consortium blockchain for smart home system sensitive data privacy preserving[J]. IEEE Access, 2019,7: 62058-62070. |
[6] | 谭海波, 周桐, 赵赫 ,等. 基于区块链的档案数据保护与共享方法[J]. 软件学报, 2019,30(9): 2620-2635. |
TAN H B , ZHOU T , ZHAO H ,et al. Archival data protection and sharing method based on blockchain[J]. Journal of Software, 2019,30(9): 2620-2635. | |
[7] | ZHENG Z B , XIE S A , DAI H N ,et al. Blockchain challenges and opportunities:a survey[J]. International Journal of Web and Grid Services, 2018,14(4): 352. |
[8] | 朱立, 俞欢, 詹士潇 ,等. 高性能联盟区块链技术研究[J]. 软件学报, 2019,30(6): 1577-1593. |
ZHU L , YU H , ZHAN S X ,et al. Research on high-performance consortium blockchain technology[J]. Journal of Software, 2019,30(6): 1577-1593. | |
[9] | FENG Q , HE D B , ZEADALLY S ,et al. A survey on privacy protection in blockchain system[J]. Journal of Network and Computer Applications, 2019,126: 45-58. |
[10] | 王晨旭, 程加成, 桑新欣 ,等. 区块链数据隐私保护:研究现状与展望[J]. 计算机研究与发展, 2021,58(10): 2099-2119. |
WANG C X , CHENG J C , SANG X X ,et al. Data privacy-preserving for blockchain:state of the art and trends[J]. Journal of Computer Research and Development, 2021,58(10): 2099-2119. | |
[11] | CHAUM D , HEYST V E . Group signatures[C]// Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques (EUROCRYPT’91). Berlin:Springer, 1991: 257-265. |
[12] | KOMANO Y , OHTA K , SHIMBO A ,et al. Toward the fair anonymous signatures:deniable ring signatures[J]. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences, 2007,E90-A(1): 54-64. |
[13] | LINDELL Y , PINKAS B . Secure multiparty computation for privacy-preserving data mining[J]. Journal of Privacy and Confidentiality, 2012,25(2): 761-766. |
[14] | CHAUM D , . Blind signatures for untraceable payments[C]// Advances in Cryptology. Berlin:Springer, 1983: 199-203. |
[15] | ZHANG S J , LEE J H . A group signature and authentication scheme for blockchain-based mobile-edge computing[J]. IEEE Internet of Things Journal, 2020,7(5): 4557-4565. |
[16] | LI X F , MEI Y R , GONG J ,et al. A blockchain privacy protection scheme based on ring signature[J]. IEEE Access, 2020,8: 76765-76772. |
[17] | STADLER M , PIVETEAU J M , CANENISCH J . Fair blind signatures[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 1995: 209-219. |
[18] | 李瑞琪, 贾春福, 王雅飞 . 基于NTRU的多密钥同态代理重加密方案及其应用[J]. 通信学报, 2021,42(3): 11-22. |
LI R Q , JIA C F , WANG Y F . Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application[J]. Journal on Communications, 2021,42(3): 11-22. | |
[19] | 王后珍, 蔡鑫伟, 郭岩 ,等. 基于矩阵填充问题的五轮零知识身份认证方案[J]. 通信学报, 2021,42(11): 79-86. |
WANG H Z , CAI X W , GUO Y ,et al. 5-pass zero-knowledge identity authentication scheme based on matrix completion problem[J]. Journal on Communications, 2021,42(11): 79-86. | |
[20] | ZHANG R , XUE R , LIU L . Security and privacy on blockchain[J]. ACM Computing Surveys, 2020,52(3): 1-34. |
[21] | 李宇溪, 周福才, 徐紫枫 . 支持K-近邻搜索的移动社交网络隐私保护方案[J]. 计算机学报, 2021,44(7): 1481-1500. |
LI Y X , ZHOU F C , XU Z F . Privacy-preserving K-nearest-neighbor search over mobile social network[J]. Chinese Journal of Computers, 2021,44(7): 1481-1500. | |
[22] | DOWLIN N , GILAD-BACHRACH R ,, LAINE K ,et al. Manual for using homomorphic encryption for bioinformatics[J]. Proceedings of the IEEE, 2017,105(3): 552-567. |
[23] | GENTRY C , . A fully homomorphic encryption scheme using ideal lattices[C]// Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing. New York:ACM Press, 2009: 169-178. |
[24] | ACAR A , AKSU H , ULUAGAC A S ,et al. A survey on homomorphic encryption schemes:theory and implementation[J]. ACM Computing Surveys, 2018,51(4): 1-35. |
[25] | 于戈, 聂铁铮, 李晓华 ,等. 区块链系统中的分布式数据管理技术:挑战与展望[J]. 计算机学报, 2021,44(1): 28-54. |
YU G , NIE T Z , LI X H ,et al. The challenge and prospect of distributed data management techniques in blockchain systems[J]. Chinese Journal of Computers, 2021,44(1): 28-54. | |
[26] | CHRISTIAN C , . Architecture of the hyperledger blockchain fabric[C]// Proceedings of the Workshop on Distributed Cryptocurrencies and Consensus Ledgers. New York:ACM Press, 2016: 14-17. |
[27] | ANDROULAKI E , BARGER A , BORTNIKOV V ,et al. Hyperledger fabric:a distributed operating system for permissioned blockchains[C]// Proceedings of the Thirteenth EuroSys Conference. New York:ACM Press, 2018: 1-30. |
[28] | 徐文玉, 吴磊, 阎允雪 . 基于区块链和同态加密的电子健康记录隐私保护方案[J]. 计算机研究与发展, 2018,55(10): 2233-2243. |
XU W Y , WU L , YAN Y X . Privacy-preserving scheme of electronic health records based on blockchain and homomorphic encryption[J]. Journal of Computer Research and Development, 2018,55(10): 2233-2243. | |
[29] | PHONG L T , AONO Y , HAYASHI T ,et al. Privacy-preserving deep learning via additively homomorphic encryption[J]. IEEE Transactions on Information Forensics and Security, 2018,13(5): 1333-1345. |
[30] | PAILLIER P , . Public-key cryptosystems based on composite degree residuosity classes[C]// Proceedings of EUROCRYPT 1999. Berlin:Springer, 1999: 223-238. |
[31] | WANG Q , QIN B , HU J K ,et al. Preserving transaction privacy in bitcoin[J]. Future Generation Computer Systems, 2020,107: 793-804. |
[32] | GAUTAM P , ANSARI M D , SHARMA S K . Enhanced security for electronic health care information using obfuscation and RSA algorithm in cloud computing[J]. International Journal of Information Security and Privacy, 2019,13(1): 59-69. |
[1] | 马鑫迪, 李清华, 姜奇, 马卓, 高胜, 田有亮, 马建峰. 面向Non-IID数据的拜占庭鲁棒联邦学习[J]. 通信学报, 2023, 44(6): 138-153. |
[2] | 冯涛, 陈李秋, 方君丽, 石建明. 基于本地化差分隐私和属性基可搜索加密的区块链数据共享方案[J]. 通信学报, 2023, 44(5): 224-233. |
[3] | 夏莹杰, 朱思雨, 刘雪娇. 区块链架构下具有条件隐私的车辆编队跨信任域高效群组认证研究[J]. 通信学报, 2023, 44(4): 111-123. |
[4] | 胡柏吉, 张晓娟, 李元诚, 赖荣鑫. 支持多功能的V2G网络隐私保护数据聚合方案[J]. 通信学报, 2023, 44(4): 187-200. |
[5] | 徐明, 张保俊, 伍益明, 应晨铎, 郑宁. 面向网络攻击和隐私保护的多智能体系统分布式共识算法[J]. 通信学报, 2023, 44(3): 117-127. |
[6] | 余晟兴, 陈钟. 基于同态加密的高效安全联邦学习聚合框架[J]. 通信学报, 2023, 44(1): 14-28. |
[7] | 杨亚涛, 刘德莉, 刘培鹤, 曾萍, 肖嵩. BFV-Blockchainvoting:支持BFV全同态加密的区块链电子投票系统[J]. 通信学报, 2022, 43(9): 100-111. |
[8] | 冯霞, 崔凯平, 谢晴晴, 王良民. VANET中基于区块链的分布式匿名认证方案[J]. 通信学报, 2022, 43(9): 134-147. |
[9] | 王继锋, 王国峰. 边缘计算模式下密文搜索与共享技术研究[J]. 通信学报, 2022, 43(4): 227-238. |
[10] | 封化民, 史瑞, 袁峰, 李艳俊, 杨旸. 高效的强隐私保护和可转让的属性票据方案[J]. 通信学报, 2022, 43(3): 63-75. |
[11] | 于海宁, 张宏莉, 余翔湛, 曲家兴, 葛蒙蒙. 隐私保护的轨迹相似度计算方法[J]. 通信学报, 2022, 43(11): 1-13. |
[12] | 彭滔, 钟文韬, 王国军, 罗恩韬, 熊金波, 刘忆宁, Hao Wang. 移动社交网络中面向隐私保护的精确好友匹配[J]. 通信学报, 2022, 43(11): 90-103. |
[13] | 史瑞, 封化民, 谢惠琴, 史国振, 刘飚, 杨旸. 基于带智能卡的移动终端实现的隐私保护的属性票据方案[J]. 通信学报, 2022, 43(10): 26-41. |
[14] | 熊金波, 周永洁, 毕仁万, 万良, 田有亮. 边缘协同的轻量级隐私保护分类框架[J]. 通信学报, 2022, 43(1): 127-137. |
[15] | 晏燕, 丛一鸣, Adnan Mahmood, 盛权政. 基于深度学习的位置大数据统计发布与隐私保护方法[J]. 通信学报, 2022, 43(1): 203-216. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|