[go: nahoru, domu]

CN108830602A - A kind of license chain construction and management-control method based on chameleon hash function - Google Patents

A kind of license chain construction and management-control method based on chameleon hash function Download PDF

Info

Publication number
CN108830602A
CN108830602A CN201810675840.6A CN201810675840A CN108830602A CN 108830602 A CN108830602 A CN 108830602A CN 201810675840 A CN201810675840 A CN 201810675840A CN 108830602 A CN108830602 A CN 108830602A
Authority
CN
China
Prior art keywords
block
chain
hash
node
hash function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810675840.6A
Other languages
Chinese (zh)
Other versions
CN108830602B (en
Inventor
张小松
黄可
牛伟纳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Electronic Science and Technology of China
Original Assignee
University of Electronic Science and Technology of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Electronic Science and Technology of China filed Critical University of Electronic Science and Technology of China
Priority to CN201810675840.6A priority Critical patent/CN108830602B/en
Publication of CN108830602A publication Critical patent/CN108830602A/en
Application granted granted Critical
Publication of CN108830602B publication Critical patent/CN108830602B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The license chain construction and management-control method that the invention discloses a kind of based on chameleon hash function, are related to technical field of network security, include the following steps:Step 1. defines chain control mechanism and manages mechanism initialization license chain according to chain;Step 2. carries out the transaction record of block in network to be packed into new block, and new block is added in license chain;Step 3. manages the block in mechanism supervision license chain according to chain, manages to the block for not meeting chain control mechanism.The present invention realizes full node and monitors in real time to fallacious message on block and the global of erroneous transaction information, any accessed node can be to the block of verifying node report mistake, control of the verifying node to entire license chain is realized by building license chain, in part in the environment of decentralization, realize managing to license chain network, all verifying nodes effectively modify block, realize the safety of license chain and the property managed by calculating chameleon hash collision and DBFT common recognition.

Description

A kind of license chain construction and management-control method based on chameleon hash function
Technical field
The present invention relates to technical field of network security, and in particular to a kind of license chain construction based on chameleon hash function And management-control method.
Background technique
The concept of block chain is suggested in first official in 2008, it can be used to implement the public affairs under decentralization environment Account book and not modifiable transaction record altogether.Technically, block chain is usually divided into no license (permissionless) Chain and license (permissioned) chain.It is also known as publicly-owned chain without license chain, is referred to using bit coin as in the going completely of representative Under heart environment, any node each may participate in the audit and verifying of block.Permit that chain includes alliance's chain and privately owned chain, refers to only Only authorization a part verifying node participates in verifying audit block, and feature is part decentralization.Current most of business applications are still So based on license chain, by taking financial circles as an example, any identity for participating in node is all known (such as corresponding a certain finance in the chain Mechanism).This is because bank's refusal is traded with any unwarranted side, and therefore, the publicly-owned chain all opened to any node Obviously it is not able to satisfy the demand of financial business.
It is public assigning each node using bit coin as the ideal money of representative and block catenary system from law angle Levelling, anonymity and can not tamper while, also form the gray zone that law can not supervise, caused by the result is that breed Terrified, crime and destruction financial order, this can not put up with.Therefore, being badly in need of a kind of mechanism allows block chain in zone of reasonableness It is interior that illegal contents or erroneous transaction information are modified.In addition, the mechanism must satisfy it is efficiently feasible, rather than with block chain Bifurcated is as cost, such as famous ether coin DAO event.In order to efficiently realize that block chain block content can be modified, Wo Menxu It to use and arrive chameleon hash function (Chameleon Hash).2016, Ateniese et al. existed 《RedactableBlokchain》In one text propose based on chameleon hash function can block chain technology to be edited, however This method is practical far from obtaining, the reason is that this method only proposes the imagination of editor's block, many critical issues are not solved Certainly, including:(1) the block chain how is constructed;(2) transaction record of block how is edited;(3) editor of block chain how is defined Strategy or logic;(4) using which kind of common recognition algorithm etc..
Summary of the invention
It is an object of the invention to:To solve not modifying to the illegal contents or erroneous transaction information permitted in chain And bring law that can not supervise and cause the problem of crime and financial order are by destroying, it provides a kind of based on chameleon hash The license chain of function constructs and management-control method.
The technical solution adopted by the present invention is as follows:
A kind of license chain construction and management-control method based on chameleon hash function, includes the following steps:
Step 1. defines chain control mechanism and manages mechanism initialization license chain according to chain;
Step 2. adds new block into license chain;
Step 3. manages the block in mechanism supervision license chain according to chain, carries out pipe to the block for not meeting chain control mechanism Control.
Further, the chain control mechanism includes block format and block control condition, wherein block format includes area Build and block body, the block head include version number version, the cryptographic Hash pre-hash of a upper block, random number Nonce, proof of work difficulty value complex, timestamp timestamp, Merkle Hash root vertex root, chameleon with Machine number r, change colour cryptographic Hash g;The block body includes the transaction record collection tran-set of multiple transaction record compositions.
Further, the block control condition is to distinguish the standard of normal blocks and abnormal block, will meet block pipe The block of any requirement is denoted as abnormal block in control condition;The block manages condition:(1) the countries concerned's safety and network Space safety;(2) related break laws and violate discipline, terrified crime;(3) in relation to personal or unit great privacy leakage;(4) related false Or the transaction of mistake;(5) mistake as caused by artificial or machine error.
Further, in the step 1, specific step is as follows for initialization license chain:
Step 1.1. selects impact resistant hash function H and chameleon hash function G;
Step 1.2. access node into license chain, and selected part node is as verifying node;
Hash key hk is calculated according to chameleon hash function G by step 1.3. and Hash limits door tk, according to selection The number for verifying node, which split to Hash limit door tk, to fragmentate, and all verifying nodes grasp one of fragment;
Step 1.4. is according to block format, impact resistant hash function H, chameleon hash function G, Hash key hk and Hash Limit door tk defines the CH-POW algorithm of the cryptographic Hash for calculation block;
Step 1.5 by chain manage mechanism, impact resistant hash function H, chameleon hash function G, CH-POW algorithm and DBFT algorithm generates wound generation block.
Further, the chain control mechanism further includes block control operation, and the method for the block control operation is:It holds Row DBFT algorithm is simultaneously combined all verifying nodes and is managed to the content in abnormal block.
Further, specific step is as follows for the step 2:
Step 2.1. calculates the nonce value of verifying node according to CH-POW algorithm;
Step 2.2. according to the nonce value of any verifying node, by network when the transaction of intra block for the previous period is remembered Record carries out being packed into new block;
Step 2.3. examines the correctness of new block by verifying node, if upchecking, which is added Add to license chain tail portion;If examining failure, the new block is abandoned.
Further, the chameleon hash function G includes three subalgorithms, respectively:
(1) key schedule:A security parameter a is inputted, Hash key hk is exported and Hash limits door tk;
(2) chameleon hash algorithm:Input the message m of Hash key hk, random number r and a random length, output one A discoloration cryptographic Hash g;
(3) collision algorithm:The message m of input discoloration cryptographic Hash g, Hash limit door tk and a random length ', export one Random number r'.
Further, specific step is as follows for the step 3:
Step 3.1. generates new transaction record collection tran-set' according to the transaction record collection tran-set of abnormal block, And by include transaction record collection tran-set' request modification content propagate in a network, enter step 3.2;
Step 3.2. verifies node and receives modification request content, and manages mechanism according to chain and judge whether modify request content It is legal, if legal, then enter step 3.3;If it is illegal, then the modification request content is abandoned;
All verifying nodes of step 3.3. are put to the vote according to DBFT algorithm, if all verifying nodes can reach common understanding, Enter step 3.4;If all verifying nodes cannot reach common understanding, the modification request content is abandoned;
All verifying nodes of step 3.4. limit door tk fragment according to the Hash of grasp and participate in chameleon hash function G's jointly It calculates, which is denoted as r', enters step 3.5;
All verifying nodes of step 3.5. regard transaction each in transaction record collection tran-set' record as leaf node, The root node root' for calculating Merkle Hash tree searches corresponding target block on license chain according to r' and root', is used in combination R', root' and tran-set' replace corresponding value in abnormal block.
Further, the chain control mechanism further includes that control requires, and the control requires to include modified transaction note Each transaction record in record collection tran-set' requires to meet following required:(1) each transaction record correctly may be used Letter;(2) each transaction record not will lead to honeysuckle;(3) each transaction record not will lead to user account remaining sum and be negative; (4) each transaction record ' in transaction record collection tran-set 'i(1≤i≤n) is inputted as leaf node, calculates Merkle The output valve root' that Hash tree obtains should be identical as the root value before modification;The control requires to further include obtaining after modifying Block should meet it is following each requirement:(1) permit being consistent property of chain;(2) parameter of modified block must be just Really.
Further, it is according to the method that chain manages the block in mechanism supervision license chain:Intelligence is written into chain control mechanism Energy contract, intelligent contract periodically check whether the block in network meets block control condition, if any block in network Transaction record concentrate a certain transaction record to meet block control condition, then it is the block for meeting block control condition is as different Normal block.
In conclusion by adopting the above-described technical solution, the beneficial effects of the invention are as follows:
1, in the present invention, mechanism is managed by defining chain, realizes that full node believes fallacious message on block and false transaction The global real time monitoring of breath, any ordinary node (i.e. accessed node) can pass through to the block of verifying node report mistake Building license chain realizes control of several verifying nodes to entire license chain, in weak center's (or being part decentralization) Under environment, managing to license chain network is realized, all verifying nodes are by calculating chameleon hash collision algorithm and DBFT Algorithm effectively modifies block, the characteristic that realizes the safety of license chain and can manage.
2, in the present invention, permit chain by defining chain and managing mechanism and reinitialize, further according to chain control mechanism supervision license Block in chain manages the block for not meeting chain control mechanism, convenient for the area in dynamic and efficient control license chain Block improves the safety of license chain.
3, in the present invention, by using proof of work (CH-POW) algorithm based on chameleon hash function as block It is controllable efficiently to realize data by the transaction record in legal modifications block for the common recognition algorithm of confirmation, it is ensured that license chain Safe operation.
4, in the present invention, intelligent contract is written into chain control mechanism, and use and be based on Byzantine failure tolerance (DBFT) algorithm As the common recognition algorithm of block modification, to realize efficient mechanism controllable by way of verifying node ballot.
5, in the present invention, by the verifying list node and DBFT algorithm of chain administrator's Dynamic Maintenance, verifying section is realized The dynamic mechanism of permitting the entrance of point, so that it is controllable to realize verifying node.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is overall flow schematic diagram of the invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention, i.e., described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is logical The component for the embodiment of the present invention being often described and illustrated herein in the accompanying drawings can be arranged and be designed with a variety of different configurations. Therefore, claimed invention is not intended to limit to the detailed description of the embodiment of the present invention provided in the accompanying drawings below Range, but be merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not having Every other embodiment obtained under the premise of creative work is made, shall fall within the protection scope of the present invention.
It should be noted that the relational terms of term " first " and " second " or the like be used merely to an entity or Operation is distinguished with another entity or operation, and without necessarily requiring or implying between these entities or operation, there are any This actual relationship or sequence.Moreover, the terms "include", "comprise" or its any other variant be intended to it is non-exclusive Property include so that include a series of elements process, method, article or equipment not only include those elements, but also Further include other elements that are not explicitly listed, or further include for this process, method, article or equipment it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described There is also other identical elements in the process, method, article or equipment of element.
Embodiment 1
A kind of license chain construction and management-control method based on chameleon hash function that present pre-ferred embodiments provide, packet Include following steps:
Step 1. defines chain control mechanism and manages mechanism initialization license chain according to chain.
Step 2. adds new block into license chain.
Step 3. manages the block in mechanism supervision license chain according to chain, carries out pipe to the block for not meeting chain control mechanism Control.
Wherein, chain control mechanism includes block format and block control condition.Block format includes block head and block body, And block size is 1M.Block head includes version number version, the cryptographic Hash pre-hash of a upper block, random number Nonce, proof of work difficulty value complex, timestamp timestamp, Merkle Hash root vertex root, chameleon with Machine number r, change colour cryptographic Hash g;Block body includes the transaction record collection tran-set of multiple transaction record compositions, transaction record collection The form of expression is:Tran_set={ recordi}1≤i≤n, wherein i indicates that transaction record concentrates the subscript of every transaction record, n Indicate the number of transaction record centralized transaction record.Block control condition is to distinguish the standard of normal blocks and abnormal block, area Block manages condition:(1) the countries concerned's safety and cyberspace safety;(2) related break laws and violate discipline, terrified crime;(3) related Personal or unit great privacy leakage;(4) in relation to false or mistake transaction, such as:Whether honeysuckle (Double is caused Spending), if account balance is caused to be negative;(5) mistake as caused by artificial or machine error, such as:Account mistake, Exchange hour mistake.If the transaction record of either block concentrates a certain transaction record to meet block control condition in network, will The block for meeting any requirement in block control condition is denoted as abnormal block.
In step 1, specific step is as follows for initialization license chain:
Step 1.1. selects impact resistant hash function H and chameleon hash function G.The impact resistant hash function H of selection is For system hash function.Chameleon hash function G includes three subalgorithms, respectively:
(1) key generates (GKeyGen) algorithm:A security parameter a is inputted, Hash key hk is exported and Hash limits door tk。
(2) chameleon hash (Ghash) algorithm:The message m of Hash key hk, random number r and a random length are inputted, Export a discoloration cryptographic Hash g.
(3) (Gcol) algorithm is collided:The message m of input discoloration cryptographic Hash g, Hash limit door tk and a random length ', it is defeated A random number r' out, so that Ghash (m ', hk, r ')=g.
Step 1.2. access node into license chain, and selected part node is as verifying node.
Firstly, network, and selected part node conduct is added by a set of Authentication mechanism access node in chain administrator Node is verified, remainder is as accessed node.Verifying node has the right to audit to block and verified, and accessed node is for reading Take the content on license chain.Then, chain administrator saves the list node of all verifying nodes, and maintenance is used for node in real time The list node of dynamic mechanism of permitting the entrance.
Hash key hk is calculated according to key schedule by step 1.3. and Hash limits door tk, according to the verifying of selection The number of node split to Hash limit door tk and be fragmentated, and all verifying nodes grasp one of fragment.
Chain administrator selects a security parameter a as input, executes key schedule and obtains disclosed Hash key Hk and Hash limit door tk.Hash key hk is disclosed, in a manner of threshold secret sharing by Hash limit door tk split into it is multiple broken Piece and it is safe be sent to all verifying nodes, so that each verifying node is grasped a portion that Hash limits door tk.
Step 1.4. according to block format, impact resistant hash function H, chameleon hash algorithm Ghash, Hash key hk and The CH-POW (proof of work based on chameleon hash function) that Hash limit door tk defines the cryptographic Hash for calculation block is calculated Method.The calculation formula of CH-POW algorithm is as follows:
H=H (version ‖ pre hash ‖ nonce ‖ complex ‖ Ghash (tran set ‖ root ‖ timestamp, hk, r))
Wherein, H indicates that system hash function H, Ghash indicate that chameleon hash algorithm Ghash, version indicate block Version number, pre hash indicates the cryptographic Hash of previous block, and complex indicates proof of work difficulty value, tran set Indicate that the transaction record collection of block, root indicate that the Merkle Hash root vertex of block, timestamp indicate the time of block Stamp is the time that block generates, and hk indicates that disclosed Hash key hk, r indicate the chameleon random number of block.Wherein, difficulty value By system according to the difficulty of digging mine to its adjust automatically;Chameleon random number is block initial stage, and node is randomly generated.Arbitrarily Node executes CH-POW algorithm as its proof of work repeatedly.Nonce is chosen over by verifying node come calculation block Cryptographic Hash h be dig mine a process, when obtained cryptographic Hash h meet proof of work target value require (such as:Target Value is with the cryptographic Hash of multiple 0 beginnings) when, it as digs to a mine, which is a solution of the node proof of work.
Chain control mechanism further includes that block control operation and control require, and the method for block control operation is:Execute DBFT Algorithm simultaneously combines all verifying nodes and modifies to any number of transaction records in abnormal block, while modifying abnormal block Corresponding Merkle Hash root vertex root and timestamp timestamp.Control requires to include modified transaction record collection Each transaction record in tran-set' requires to meet following required:(1) each transaction record is correct credible, That is the transaction of both parties' all Signature Confirmations;(2) each transaction record not will lead to honeysuckle (Double Spending), i.e., Two transactions are used for a sum of money;(3) each transaction record not will lead to user account remaining sum and be negative;(4) transaction record collection Each transaction record ' in tran-set 'i(1≤i≤n) is inputted as leaf node, and calculating Merkle Hash tree obtains defeated Value root' should be identical as the root value before modification out.Control require further include after modification obtained block should meet it is following Each is required:(1) after permitting being consistent property of chain, i.e., abnormal block to be modified, cryptographic Hash h' should with to modify before The cryptographic Hash of block is identical;(2) parameter of modified block must be correct, i.e.,:version,pre-hash,nonce, Complex and old block should being consistent property, root', tran-set' and timestamp' should be modified value.
Step 1.5 by chain manage mechanism, impact resistant hash function H, chameleon hash function G, CH-POW algorithm and DBFT algorithm generates wound generation block.
By DBFT (Byzantine failure tolerance) algorithm, CH-POW algorithm, impact resistant hash function H, chameleon hash function G, chain Manage mechanism, a direction is breathed out by the pointer for verifying list node of chain administrator's Dynamic Maintenance, timestamp, version number, wound generation In uncommon value write-in wound generation block.Wherein, wound generation cryptographic Hash by system setting themselves, filled out by node by the value of timestamp and version number It writes.When the authorization for having new node to obtain chain administrator, chain administrator updates verifying list node, the verifying section that will be revoked The fragment that point is grasped transfers to new node to grasp, to realize the dynamic mechanism of permitting the entrance of verifying node.After generating wound generation block, chain Administrator broadcasts wound generation block in a network.
Specific step is as follows for step 2:
Step 2.1. verifying node executes CH-POW algorithm repeatedly, finds the nonce value for meeting proof of work requirement.
Step 2.2. according to the nonce value of any verifying node, by network when the transaction of intra block for the previous period is remembered Record carries out being packed into new block.
According to the format of the nonce value that is calculated of verifying node and wound generation block, by network within for the previous period Transaction record be packaged and inserted into new block, the transaction record that each transaction record integrates is collected and is placed on block body It is interior, the nonce value being calculated is placed in block head, and new block is propagated in a network.The transaction note being packed into Record concentrate contain ought the user in Intranet network for the previous period Transaction Information, also additionally contain a service charge, and hand The higher block that continues to pay dues can be more confirmed as soon as possible.
Step 2.3. examines the correctness of new block by verifying node, if upchecking, which is added Add to license chain tail portion;If examining failure, the new block is abandoned.
Any verifying node can examine the correctness of new block, and the content of inspection includes but is not limited to:(1) transaction label The correctness of name;(2) whether the discoloration cryptographic Hash g of block meets g=Ghash (tran set ‖ root ‖ timestamp ‖ hk ‖ r);(3) whether the cryptographic Hash h of block is correct, that is, judges in cryptographic Hash that the content that the block includes is calculated and block head Cryptographic Hash it is whether consistent.If upchecking, which is added to license chain tail portion, meanwhile, verifying node continues It finds and meets the nonce value that the target value of proof of work requires, is i.e. verifying node continues to dig mine behind the block;If examining Failure, then abandon the new block.
Verifying node when two and its above has found the nonce value of the different requirements for meeting proof of work When, bifurcated will occur for license chain, at this point, still deferring to the optimal principle of long-chain.I.e.:Each verifying node can choose in them Continue to dig mine behind the block of any publication, but system only follows longest chain.Therefore, if after some verifying node Face with block it is less, this bifurcated is just abandoned automatically.
In step 3, it is according to the method that chain manages the block in mechanism supervision license chain:By chain control mechanism write-in intelligence Contract, intelligent contract periodically check whether the block in network meets block control condition, if any block in network Transaction record concentrates a certain transaction record to meet block control condition, then is abnormal by the block of block control condition is met Block.
Specific step is as follows for step 3:
Step 3.1. generates new transaction record collection tran-set' according to the transaction record collection tran-set of abnormal block, And by include transaction record collection tran-set' request modification content propagate in a network, enter step 3.2.
When there is abnormal transaction record in any node (verifying node or accessed node) discovery block, by different Any number of transaction records modification in normal block generates new transaction record collection tran-set', will (tran-set', h, Reason it) is broadcasted in a network as modification request.Wherein, h indicates the cryptographic Hash of the exception block, and reason indicates that request is repaired The reason of changing and foundation.
Step 3.2. verifies node and receives modification request content, and manages mechanism according to chain and judge whether modify request content It is legal, if legal, then enter step 3.3;If it is illegal, then the modification request content is abandoned.Verifying node is receiving modification After request, judge whether modification request is legal according to the block control condition in chain control mechanism defined in wound generation block.
All verifying nodes of step 3.3. are put to the vote according to DBFT algorithm, if all verifying nodes can reach common understanding, Enter step 3.4;If all verifying nodes cannot reach common understanding, the modification request content is abandoned.Since DBFT algorithm is supported Dynamic mechanism of permitting the entrance, therefore, the verifying node with the right to vote is both from list node.I.e.:The new verifying being added in real time Node may participate in the verifying of a new round, and the verifying node being revoked does not have the right to vote.
All verifying nodes of step 3.4. limit door tk fragment according to the Hash of grasp and participate in chameleon hash algorithm jointly The solution is denoted as r', enters step 3.5 by the calculating of Ghash.Each verifying node will be obtained by way of threshold secret sharing The tk fragment arrived calculates the solution r' of Gcol algorithm as input, common participation, and calculation formula is as follows:
R '=Gcol (tran set ' | | root ' | | timestamp ', tk, g)
Wherein, finally obtained r' is the random value for meeting Ghash algorithm, i.e. r' can satisfy:
Ghash (tran set ‖ root ‖ timestamp, hk, r)=g=Ghash (tran set ' | | root ' | | timestamp′,hk′,r′)
It follows that the cryptographic Hash of modified block, there is no variation, block content has obtained legal modification.
All verifying nodes of step 3.5. regard transaction each in transaction record collection tran-set' record as leaf node, The root node root' for calculating Merkle Hash tree searches corresponding target block on license chain according to (r', root'), is used in combination (r, root, tran-set) in new (r', root', tran-set') replacement target block.So as to complete to exceptions area Modified block content can be read in the modification of block, any node.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.

Claims (10)

1. a kind of license chain construction and management-control method based on chameleon hash function, which is characterized in that include the following steps:
Step 1. defines chain control mechanism and manages mechanism initialization license chain according to chain;
Step 2. adds new block into license chain;
Step 3. manages the block in mechanism supervision license chain according to chain, manages to the block for not meeting chain control mechanism.
2. a kind of license chain construction and management-control method based on chameleon hash function according to claim 1, feature It is, the chain control mechanism includes block format and block control condition, wherein block format includes block head and block Body, the block head include cryptographic Hash pre-hash, the random number nonce, workload of version number version, a upper block Prove difficulty value complex, timestamp timestamp, Merkle Hash root vertex root, chameleon random number r, discoloration is breathed out Uncommon value g;The block body includes the transaction record collection tran-set of multiple transaction record compositions.
3. a kind of license chain construction and management-control method based on chameleon hash function according to claim 2, feature It is, the block control condition is to distinguish the standard of normal blocks and abnormal block, will be met any in block control condition It is required that block be denoted as abnormal block;The block manages condition:(1) the countries concerned's safety and cyberspace safety;(2) It is related break laws and violate discipline, terrified crime;(3) in relation to personal or unit great privacy leakage;(4) in relation to false or mistake friendship Easily;(5) mistake as caused by artificial or machine error.
4. a kind of license chain construction and management-control method based on chameleon hash function according to claim 2, feature It is, in the step 1, specific step is as follows for initialization license chain:
Step 1.1. selects impact resistant hash function H and chameleon hash function G;
Step 1.2. access node into license chain, and selected part node is as verifying node;
Hash key hk is calculated according to chameleon hash function G by step 1.3. and Hash limits door tk, according to the verifying of selection The number of node split to Hash limit door tk and be fragmentated, and all verifying nodes grasp one of fragment;
Step 1.4. limits door according to block format, impact resistant hash function H, chameleon hash function G, Hash key hk and Hash Tk defines the CH-POW algorithm of the cryptographic Hash for calculation block;
Step 1.5 is managed mechanism, impact resistant hash function H, chameleon hash function G, CH-POW algorithm and DBFT by chain and is calculated Method generates wound generation block.
5. a kind of license chain construction and management-control method based on chameleon hash function, special according to claim 3 and 4 Sign is that the chain control mechanism further includes block control operation, and the method for the block control operation is:Execute DBFT algorithm And combines all verifying nodes and the content in abnormal block is managed.
6. a kind of license chain construction and management-control method based on chameleon hash function according to claim 1, feature It is, specific step is as follows for the step 2:
Step 2.1. calculates the nonce value of verifying node according to CH-POW algorithm;
Step 2.2. according to the nonce value of any verifying node, by network when the transaction record of intra block for the previous period into Row is packed into new block;
Step 2.3. examines the correctness of new block by verifying node, if upchecking, which is added to Permit chain tail portion;If examining failure, the new block is abandoned.
7. a kind of license chain construction and management-control method based on chameleon hash function according to claim 4, feature It is, the chameleon hash function G includes three subalgorithms, respectively:
(1) key schedule:A security parameter a is inputted, Hash key hk is exported and Hash limits door tk;
(2) chameleon hash algorithm:The message m for inputting Hash key hk, random number r and a random length, exports a change Color cryptographic Hash g;
(3) collision algorithm:The message m of input discoloration cryptographic Hash g, Hash limit door tk and a random length ', export one at random Number r'.
8. a kind of license chain construction and management-control method based on chameleon hash function, special according to claim 3 and 7 Sign is that specific step is as follows for the step 3:
Step 3.1. generates new transaction record collection tran-set' according to the transaction record collection tran-set of abnormal block, and will Include transaction record collection tran-set' request modification content propagate in a network, enter step 3.2;
Step 3.2. verifies node and receives modification request content, and manages mechanism according to chain and judge to modify whether request content closes Method then enters step 3.3 if legal;If it is illegal, then the modification request content is abandoned;
All verifying nodes of step 3.3. are put to the vote according to DBFT algorithm, if all verifying nodes can reach common understanding, are entered Step 3.4;If all verifying nodes cannot reach common understanding, the modification request content is abandoned;
All verifying nodes of step 3.4. limit the meter that door tk fragment participates in chameleon hash function G jointly according to the Hash of grasp It calculates, which is denoted as r', enters step 3.5;
All verifying nodes of step 3.5. regard transaction each in transaction record collection tran-set' record as leaf node, calculate The root node root' of Merkle Hash tree searches corresponding target block on license chain according to r' and root', and with r', Root' and tran-set' replaces corresponding value in abnormal block.
9. a kind of license chain construction and management-control method based on chameleon hash function according to claim 8, feature It is, the chain control mechanism further includes that control requires, and the control requires to include modified transaction record collection tran-set' In each transaction record require to meet following required:(1) each transaction record is correct credible;(2) each pen Transaction record not will lead to honeysuckle;(3) each transaction record not will lead to user account remaining sum and be negative;(4) transaction record collection Each transaction record ' in tran-set 'i(1≤i≤n) is inputted as leaf node, and calculating Merkle Hash tree obtains defeated Value root' should be identical as the root value before modification out;The control requires to further include that the block obtained after modifying should meet Each is required below:(1) permit being consistent property of chain;(2) parameter of modified block must be correct.
10. a kind of license chain construction and management-control method based on chameleon hash function according to claim 3, feature It is, is according to the method that chain manages the block in mechanism supervision license chain:Intelligent contract is written into chain control mechanism, intelligence is closed About periodically check whether the block in network meets block control condition, if the transaction record of any block is concentrated in network A certain transaction record meets block control condition, then is abnormal block by the block for meeting block control condition.
CN201810675840.6A 2018-06-27 2018-06-27 Permission chain construction and management and control method based on chameleon hash function Active CN108830602B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810675840.6A CN108830602B (en) 2018-06-27 2018-06-27 Permission chain construction and management and control method based on chameleon hash function

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810675840.6A CN108830602B (en) 2018-06-27 2018-06-27 Permission chain construction and management and control method based on chameleon hash function

Publications (2)

Publication Number Publication Date
CN108830602A true CN108830602A (en) 2018-11-16
CN108830602B CN108830602B (en) 2022-03-29

Family

ID=64139025

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810675840.6A Active CN108830602B (en) 2018-06-27 2018-06-27 Permission chain construction and management and control method based on chameleon hash function

Country Status (1)

Country Link
CN (1) CN108830602B (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109547194A (en) * 2018-12-11 2019-03-29 安徽大学 Lattice-based chameleon hash function construction method
CN109542577A (en) * 2018-11-30 2019-03-29 北京小米移动软件有限公司 Advertisement update method, device and computer readable storage medium
CN109559123A (en) * 2018-12-10 2019-04-02 大科数据(深圳)有限公司 A kind of point-to-point network processing method of mixed type
CN110020547A (en) * 2019-01-31 2019-07-16 阿里巴巴集团控股有限公司 A kind of data hiding method, device and equipment
CN110086599A (en) * 2019-04-24 2019-08-02 电子科技大学 Hash calculation method and label decryption method based on homomorphism chameleon hash function
CN110377609A (en) * 2019-06-17 2019-10-25 北京航空航天大学 Intelligent contract Dynamical Deployment and evolution method and device based on block chain
CN110457297A (en) * 2019-07-10 2019-11-15 北京航空航天大学 Editable block catenary system and method based on more authorization center encryption attributes
CN111147228A (en) * 2019-12-28 2020-05-12 西安电子科技大学 Ethernet IoT entity based lightweight authentication method, system and intelligent terminal
CN111211904A (en) * 2019-12-13 2020-05-29 杭州复杂美科技有限公司 Consensus method, device and storage medium
CN111753335A (en) * 2020-08-28 2020-10-09 支付宝(杭州)信息技术有限公司 Editing method and device for block content
CN111966696A (en) * 2019-05-20 2020-11-20 深圳市网安计算机安全检测技术有限公司 Method, device and equipment for updating data in block chain
CN112054990A (en) * 2020-07-21 2020-12-08 杜晓楠 Method for preventing Hash flood attack in blockchain system, computer readable medium and blockchain system
CN112070501A (en) * 2020-11-10 2020-12-11 支付宝(杭州)信息技术有限公司 Block chain transaction initiating and verifying method and system
CN112272092A (en) * 2020-08-30 2021-01-26 河南大学 Data editing method applied to block chain
CN112307513A (en) * 2020-11-23 2021-02-02 从法信息科技有限公司 Uplink document security management method and device based on time domain consensus and electronic equipment
CN112468302A (en) * 2020-10-23 2021-03-09 湖南天河国云科技有限公司 Editable blockchain based on verifiable multiparty secret sharing
CN113794556A (en) * 2021-09-10 2021-12-14 福建师范大学 PCH revocable method and system oriented to programmable block chain protocol
CN114331451A (en) * 2021-10-27 2022-04-12 东北大学 Data modification method on block chain based on double hash chains

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105978696A (en) * 2016-05-09 2016-09-28 北京航空航天大学 Revocable quick data outsourcing packaging method and device
CN106878000A (en) * 2017-03-06 2017-06-20 中钞信用卡产业发展有限公司北京智能卡技术研究院 A kind of alliance's chain common recognition method and system
WO2017145004A1 (en) * 2016-02-23 2017-08-31 nChain Holdings Limited Universal tokenisation system for blockchain-based cryptocurrencies
US20170338957A1 (en) * 2016-05-23 2017-11-23 Accenture Global Solutions Limited Rewritable blockchain
CN107563754A (en) * 2017-08-17 2018-01-09 杭州云象网络技术有限公司 A kind of storage of serial number information and verification method based on block chain
CN107819583A (en) * 2016-09-13 2018-03-20 渡边浩志 The anti-abuse technology of key
CN108009778A (en) * 2017-12-25 2018-05-08 南京思利华信息科技有限公司 A kind of supply chain management method
CN108111312A (en) * 2017-12-28 2018-06-01 电子科技大学 Intelligent terminal safety communication method based on block chain

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017145004A1 (en) * 2016-02-23 2017-08-31 nChain Holdings Limited Universal tokenisation system for blockchain-based cryptocurrencies
CN105978696A (en) * 2016-05-09 2016-09-28 北京航空航天大学 Revocable quick data outsourcing packaging method and device
US20170338957A1 (en) * 2016-05-23 2017-11-23 Accenture Global Solutions Limited Rewritable blockchain
CN107819583A (en) * 2016-09-13 2018-03-20 渡边浩志 The anti-abuse technology of key
CN106878000A (en) * 2017-03-06 2017-06-20 中钞信用卡产业发展有限公司北京智能卡技术研究院 A kind of alliance's chain common recognition method and system
CN107563754A (en) * 2017-08-17 2018-01-09 杭州云象网络技术有限公司 A kind of storage of serial number information and verification method based on block chain
CN108009778A (en) * 2017-12-25 2018-05-08 南京思利华信息科技有限公司 A kind of supply chain management method
CN108111312A (en) * 2017-12-28 2018-06-01 电子科技大学 Intelligent terminal safety communication method based on block chain

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
GIUSEPPE ATENIESE ET AL.: "Redactable Blockchain or Rewriting History in Bitcoin and Friends", 《2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY》 *
LENGXUE789: "PoW挖矿算法原理", 《HTTPS://BLOG.CSDN.NET/LENGXUE789/ARTICLE/DETAILS/79998866》 *
张小松 等: "大数据产业化中的核心安全", 《信息安全研究》 *

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109542577A (en) * 2018-11-30 2019-03-29 北京小米移动软件有限公司 Advertisement update method, device and computer readable storage medium
CN109559123A (en) * 2018-12-10 2019-04-02 大科数据(深圳)有限公司 A kind of point-to-point network processing method of mixed type
CN109547194A (en) * 2018-12-11 2019-03-29 安徽大学 Lattice-based chameleon hash function construction method
CN109547194B (en) * 2018-12-11 2021-08-27 安徽大学 Lattice-based chameleon hash function construction method
CN110020547A (en) * 2019-01-31 2019-07-16 阿里巴巴集团控股有限公司 A kind of data hiding method, device and equipment
CN110086599A (en) * 2019-04-24 2019-08-02 电子科技大学 Hash calculation method and label decryption method based on homomorphism chameleon hash function
CN111966696B (en) * 2019-05-20 2023-10-13 深圳市网安计算机安全检测技术有限公司 Method, device and equipment for updating data in block chain
CN111966696A (en) * 2019-05-20 2020-11-20 深圳市网安计算机安全检测技术有限公司 Method, device and equipment for updating data in block chain
CN110377609A (en) * 2019-06-17 2019-10-25 北京航空航天大学 Intelligent contract Dynamical Deployment and evolution method and device based on block chain
CN110377609B (en) * 2019-06-17 2021-11-02 北京航空航天大学 Intelligent contract dynamic deployment and evolution method and device based on block chain
CN110457297A (en) * 2019-07-10 2019-11-15 北京航空航天大学 Editable block catenary system and method based on more authorization center encryption attributes
CN110457297B (en) * 2019-07-10 2022-02-15 北京航空航天大学 Editable block chain system and method based on multi-authority attribute encryption
CN111211904A (en) * 2019-12-13 2020-05-29 杭州复杂美科技有限公司 Consensus method, device and storage medium
CN111147228A (en) * 2019-12-28 2020-05-12 西安电子科技大学 Ethernet IoT entity based lightweight authentication method, system and intelligent terminal
CN111147228B (en) * 2019-12-28 2022-04-01 西安电子科技大学 Ethernet IoT entity based lightweight authentication method, system and intelligent terminal
CN112054990A (en) * 2020-07-21 2020-12-08 杜晓楠 Method for preventing Hash flood attack in blockchain system, computer readable medium and blockchain system
CN112054990B (en) * 2020-07-21 2022-09-16 杜晓楠 Method for preventing Hash flood attack in blockchain system, computer readable medium and blockchain system
CN111753335B (en) * 2020-08-28 2023-09-01 支付宝(杭州)信息技术有限公司 Editing method and device for block content
CN111753335A (en) * 2020-08-28 2020-10-09 支付宝(杭州)信息技术有限公司 Editing method and device for block content
CN112272092A (en) * 2020-08-30 2021-01-26 河南大学 Data editing method applied to block chain
CN112468302A (en) * 2020-10-23 2021-03-09 湖南天河国云科技有限公司 Editable blockchain based on verifiable multiparty secret sharing
CN112468302B (en) * 2020-10-23 2024-05-24 湖南天河国云科技有限公司 Editable blockchain based on verifiable multiparty secret sharing
CN112070501B (en) * 2020-11-10 2021-03-02 支付宝(杭州)信息技术有限公司 Block chain transaction initiating and verifying method and system
CN112884477A (en) * 2020-11-10 2021-06-01 支付宝(杭州)信息技术有限公司 Block chain transaction initiating and verifying method and system
CN112070501A (en) * 2020-11-10 2020-12-11 支付宝(杭州)信息技术有限公司 Block chain transaction initiating and verifying method and system
CN112307513A (en) * 2020-11-23 2021-02-02 从法信息科技有限公司 Uplink document security management method and device based on time domain consensus and electronic equipment
CN113794556A (en) * 2021-09-10 2021-12-14 福建师范大学 PCH revocable method and system oriented to programmable block chain protocol
CN113794556B (en) * 2021-09-10 2023-05-23 福建师范大学 PCH revocable method and system for collectable blockchain protocol
CN114331451A (en) * 2021-10-27 2022-04-12 东北大学 Data modification method on block chain based on double hash chains

Also Published As

Publication number Publication date
CN108830602B (en) 2022-03-29

Similar Documents

Publication Publication Date Title
CN108830602A (en) A kind of license chain construction and management-control method based on chameleon hash function
Zamyatin et al. Xclaim: Trustless, interoperable, cryptocurrency-backed assets
Hanifatunnisa et al. Blockchain based e-voting recording system design
Chen et al. A survey on blockchain systems: Attacks, defenses, and privacy preservation
CN111464518B (en) Method and device for sending and verifying cross-link communication data
CN110097467A (en) A kind of side chain test method for intelligent contract safety and stability
Winn Open Systems, Free Markets, and Regulation of Internet Commerce
Anderson Liability and computer security: Nine principles
CN108681966A (en) A kind of information monitoring method and device based on block chain
Acharjamayum et al. Blockchain: a tale of peer to peer security
CN111066283A (en) System and method for communicating, storing and processing data provided by entities on a blockchain network
CN106789090A (en) Public key infrastructure system and semi-random participating certificate endorsement method based on block chain
CN107526766A (en) Data organization method and development environment system
CN109753817A (en) Medical information secure storage scheme based on block chain
CN111369730B (en) Voting processing method and device based on block chain
Agbesi et al. Electronic voting recording system based on blockchain technology
CN105072085B (en) A kind of stream rule legitimacy authentication method under software defined network
CN108989118A (en) A kind of privately owned block chain deployment tool of enterprise-level based on GO language
CN107908932A (en) A kind of digital cash based on L algorithms is false proof and verification method, system and equipment
CN110719168B (en) Hierarchical anonymous voting method based on block chain
CN112039927A (en) Management method of network security vulnerability response platform based on block chain technology
US20230092436A1 (en) Framework for demaraction of digital assets
TWM586416U (en) Implementing a multi-center, distributed verification system for transactions based on blockchain technology
Yoshihama et al. Study on integrity and privacy requirements of distributed ledger technologies
CN109690550A (en) Digital asset framework

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant