CN108830602A - A kind of license chain construction and management-control method based on chameleon hash function - Google Patents
A kind of license chain construction and management-control method based on chameleon hash function Download PDFInfo
- Publication number
- CN108830602A CN108830602A CN201810675840.6A CN201810675840A CN108830602A CN 108830602 A CN108830602 A CN 108830602A CN 201810675840 A CN201810675840 A CN 201810675840A CN 108830602 A CN108830602 A CN 108830602A
- Authority
- CN
- China
- Prior art keywords
- block
- chain
- hash
- node
- hash function
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The license chain construction and management-control method that the invention discloses a kind of based on chameleon hash function, are related to technical field of network security, include the following steps:Step 1. defines chain control mechanism and manages mechanism initialization license chain according to chain;Step 2. carries out the transaction record of block in network to be packed into new block, and new block is added in license chain;Step 3. manages the block in mechanism supervision license chain according to chain, manages to the block for not meeting chain control mechanism.The present invention realizes full node and monitors in real time to fallacious message on block and the global of erroneous transaction information, any accessed node can be to the block of verifying node report mistake, control of the verifying node to entire license chain is realized by building license chain, in part in the environment of decentralization, realize managing to license chain network, all verifying nodes effectively modify block, realize the safety of license chain and the property managed by calculating chameleon hash collision and DBFT common recognition.
Description
Technical field
The present invention relates to technical field of network security, and in particular to a kind of license chain construction based on chameleon hash function
And management-control method.
Background technique
The concept of block chain is suggested in first official in 2008, it can be used to implement the public affairs under decentralization environment
Account book and not modifiable transaction record altogether.Technically, block chain is usually divided into no license (permissionless)
Chain and license (permissioned) chain.It is also known as publicly-owned chain without license chain, is referred to using bit coin as in the going completely of representative
Under heart environment, any node each may participate in the audit and verifying of block.Permit that chain includes alliance's chain and privately owned chain, refers to only
Only authorization a part verifying node participates in verifying audit block, and feature is part decentralization.Current most of business applications are still
So based on license chain, by taking financial circles as an example, any identity for participating in node is all known (such as corresponding a certain finance in the chain
Mechanism).This is because bank's refusal is traded with any unwarranted side, and therefore, the publicly-owned chain all opened to any node
Obviously it is not able to satisfy the demand of financial business.
It is public assigning each node using bit coin as the ideal money of representative and block catenary system from law angle
Levelling, anonymity and can not tamper while, also form the gray zone that law can not supervise, caused by the result is that breed
Terrified, crime and destruction financial order, this can not put up with.Therefore, being badly in need of a kind of mechanism allows block chain in zone of reasonableness
It is interior that illegal contents or erroneous transaction information are modified.In addition, the mechanism must satisfy it is efficiently feasible, rather than with block chain
Bifurcated is as cost, such as famous ether coin DAO event.In order to efficiently realize that block chain block content can be modified, Wo Menxu
It to use and arrive chameleon hash function (Chameleon Hash).2016, Ateniese et al. existed
《RedactableBlokchain》In one text propose based on chameleon hash function can block chain technology to be edited, however
This method is practical far from obtaining, the reason is that this method only proposes the imagination of editor's block, many critical issues are not solved
Certainly, including:(1) the block chain how is constructed;(2) transaction record of block how is edited;(3) editor of block chain how is defined
Strategy or logic;(4) using which kind of common recognition algorithm etc..
Summary of the invention
It is an object of the invention to:To solve not modifying to the illegal contents or erroneous transaction information permitted in chain
And bring law that can not supervise and cause the problem of crime and financial order are by destroying, it provides a kind of based on chameleon hash
The license chain of function constructs and management-control method.
The technical solution adopted by the present invention is as follows:
A kind of license chain construction and management-control method based on chameleon hash function, includes the following steps:
Step 1. defines chain control mechanism and manages mechanism initialization license chain according to chain;
Step 2. adds new block into license chain;
Step 3. manages the block in mechanism supervision license chain according to chain, carries out pipe to the block for not meeting chain control mechanism
Control.
Further, the chain control mechanism includes block format and block control condition, wherein block format includes area
Build and block body, the block head include version number version, the cryptographic Hash pre-hash of a upper block, random number
Nonce, proof of work difficulty value complex, timestamp timestamp, Merkle Hash root vertex root, chameleon with
Machine number r, change colour cryptographic Hash g;The block body includes the transaction record collection tran-set of multiple transaction record compositions.
Further, the block control condition is to distinguish the standard of normal blocks and abnormal block, will meet block pipe
The block of any requirement is denoted as abnormal block in control condition;The block manages condition:(1) the countries concerned's safety and network
Space safety;(2) related break laws and violate discipline, terrified crime;(3) in relation to personal or unit great privacy leakage;(4) related false
Or the transaction of mistake;(5) mistake as caused by artificial or machine error.
Further, in the step 1, specific step is as follows for initialization license chain:
Step 1.1. selects impact resistant hash function H and chameleon hash function G;
Step 1.2. access node into license chain, and selected part node is as verifying node;
Hash key hk is calculated according to chameleon hash function G by step 1.3. and Hash limits door tk, according to selection
The number for verifying node, which split to Hash limit door tk, to fragmentate, and all verifying nodes grasp one of fragment;
Step 1.4. is according to block format, impact resistant hash function H, chameleon hash function G, Hash key hk and Hash
Limit door tk defines the CH-POW algorithm of the cryptographic Hash for calculation block;
Step 1.5 by chain manage mechanism, impact resistant hash function H, chameleon hash function G, CH-POW algorithm and
DBFT algorithm generates wound generation block.
Further, the chain control mechanism further includes block control operation, and the method for the block control operation is:It holds
Row DBFT algorithm is simultaneously combined all verifying nodes and is managed to the content in abnormal block.
Further, specific step is as follows for the step 2:
Step 2.1. calculates the nonce value of verifying node according to CH-POW algorithm;
Step 2.2. according to the nonce value of any verifying node, by network when the transaction of intra block for the previous period is remembered
Record carries out being packed into new block;
Step 2.3. examines the correctness of new block by verifying node, if upchecking, which is added
Add to license chain tail portion;If examining failure, the new block is abandoned.
Further, the chameleon hash function G includes three subalgorithms, respectively:
(1) key schedule:A security parameter a is inputted, Hash key hk is exported and Hash limits door tk;
(2) chameleon hash algorithm:Input the message m of Hash key hk, random number r and a random length, output one
A discoloration cryptographic Hash g;
(3) collision algorithm:The message m of input discoloration cryptographic Hash g, Hash limit door tk and a random length ', export one
Random number r'.
Further, specific step is as follows for the step 3:
Step 3.1. generates new transaction record collection tran-set' according to the transaction record collection tran-set of abnormal block,
And by include transaction record collection tran-set' request modification content propagate in a network, enter step 3.2;
Step 3.2. verifies node and receives modification request content, and manages mechanism according to chain and judge whether modify request content
It is legal, if legal, then enter step 3.3;If it is illegal, then the modification request content is abandoned;
All verifying nodes of step 3.3. are put to the vote according to DBFT algorithm, if all verifying nodes can reach common understanding,
Enter step 3.4;If all verifying nodes cannot reach common understanding, the modification request content is abandoned;
All verifying nodes of step 3.4. limit door tk fragment according to the Hash of grasp and participate in chameleon hash function G's jointly
It calculates, which is denoted as r', enters step 3.5;
All verifying nodes of step 3.5. regard transaction each in transaction record collection tran-set' record as leaf node,
The root node root' for calculating Merkle Hash tree searches corresponding target block on license chain according to r' and root', is used in combination
R', root' and tran-set' replace corresponding value in abnormal block.
Further, the chain control mechanism further includes that control requires, and the control requires to include modified transaction note
Each transaction record in record collection tran-set' requires to meet following required:(1) each transaction record correctly may be used
Letter;(2) each transaction record not will lead to honeysuckle;(3) each transaction record not will lead to user account remaining sum and be negative;
(4) each transaction record ' in transaction record collection tran-set 'i(1≤i≤n) is inputted as leaf node, calculates Merkle
The output valve root' that Hash tree obtains should be identical as the root value before modification;The control requires to further include obtaining after modifying
Block should meet it is following each requirement:(1) permit being consistent property of chain;(2) parameter of modified block must be just
Really.
Further, it is according to the method that chain manages the block in mechanism supervision license chain:Intelligence is written into chain control mechanism
Energy contract, intelligent contract periodically check whether the block in network meets block control condition, if any block in network
Transaction record concentrate a certain transaction record to meet block control condition, then it is the block for meeting block control condition is as different
Normal block.
In conclusion by adopting the above-described technical solution, the beneficial effects of the invention are as follows:
1, in the present invention, mechanism is managed by defining chain, realizes that full node believes fallacious message on block and false transaction
The global real time monitoring of breath, any ordinary node (i.e. accessed node) can pass through to the block of verifying node report mistake
Building license chain realizes control of several verifying nodes to entire license chain, in weak center's (or being part decentralization)
Under environment, managing to license chain network is realized, all verifying nodes are by calculating chameleon hash collision algorithm and DBFT
Algorithm effectively modifies block, the characteristic that realizes the safety of license chain and can manage.
2, in the present invention, permit chain by defining chain and managing mechanism and reinitialize, further according to chain control mechanism supervision license
Block in chain manages the block for not meeting chain control mechanism, convenient for the area in dynamic and efficient control license chain
Block improves the safety of license chain.
3, in the present invention, by using proof of work (CH-POW) algorithm based on chameleon hash function as block
It is controllable efficiently to realize data by the transaction record in legal modifications block for the common recognition algorithm of confirmation, it is ensured that license chain
Safe operation.
4, in the present invention, intelligent contract is written into chain control mechanism, and use and be based on Byzantine failure tolerance (DBFT) algorithm
As the common recognition algorithm of block modification, to realize efficient mechanism controllable by way of verifying node ballot.
5, in the present invention, by the verifying list node and DBFT algorithm of chain administrator's Dynamic Maintenance, verifying section is realized
The dynamic mechanism of permitting the entrance of point, so that it is controllable to realize verifying node.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is overall flow schematic diagram of the invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not
For limiting the present invention, i.e., described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is logical
The component for the embodiment of the present invention being often described and illustrated herein in the accompanying drawings can be arranged and be designed with a variety of different configurations.
Therefore, claimed invention is not intended to limit to the detailed description of the embodiment of the present invention provided in the accompanying drawings below
Range, but be merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art are not having
Every other embodiment obtained under the premise of creative work is made, shall fall within the protection scope of the present invention.
It should be noted that the relational terms of term " first " and " second " or the like be used merely to an entity or
Operation is distinguished with another entity or operation, and without necessarily requiring or implying between these entities or operation, there are any
This actual relationship or sequence.Moreover, the terms "include", "comprise" or its any other variant be intended to it is non-exclusive
Property include so that include a series of elements process, method, article or equipment not only include those elements, but also
Further include other elements that are not explicitly listed, or further include for this process, method, article or equipment it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described
There is also other identical elements in the process, method, article or equipment of element.
Embodiment 1
A kind of license chain construction and management-control method based on chameleon hash function that present pre-ferred embodiments provide, packet
Include following steps:
Step 1. defines chain control mechanism and manages mechanism initialization license chain according to chain.
Step 2. adds new block into license chain.
Step 3. manages the block in mechanism supervision license chain according to chain, carries out pipe to the block for not meeting chain control mechanism
Control.
Wherein, chain control mechanism includes block format and block control condition.Block format includes block head and block body,
And block size is 1M.Block head includes version number version, the cryptographic Hash pre-hash of a upper block, random number
Nonce, proof of work difficulty value complex, timestamp timestamp, Merkle Hash root vertex root, chameleon with
Machine number r, change colour cryptographic Hash g;Block body includes the transaction record collection tran-set of multiple transaction record compositions, transaction record collection
The form of expression is:Tran_set={ recordi}1≤i≤n, wherein i indicates that transaction record concentrates the subscript of every transaction record, n
Indicate the number of transaction record centralized transaction record.Block control condition is to distinguish the standard of normal blocks and abnormal block, area
Block manages condition:(1) the countries concerned's safety and cyberspace safety;(2) related break laws and violate discipline, terrified crime;(3) related
Personal or unit great privacy leakage;(4) in relation to false or mistake transaction, such as:Whether honeysuckle (Double is caused
Spending), if account balance is caused to be negative;(5) mistake as caused by artificial or machine error, such as:Account mistake,
Exchange hour mistake.If the transaction record of either block concentrates a certain transaction record to meet block control condition in network, will
The block for meeting any requirement in block control condition is denoted as abnormal block.
In step 1, specific step is as follows for initialization license chain:
Step 1.1. selects impact resistant hash function H and chameleon hash function G.The impact resistant hash function H of selection is
For system hash function.Chameleon hash function G includes three subalgorithms, respectively:
(1) key generates (GKeyGen) algorithm:A security parameter a is inputted, Hash key hk is exported and Hash limits door
tk。
(2) chameleon hash (Ghash) algorithm:The message m of Hash key hk, random number r and a random length are inputted,
Export a discoloration cryptographic Hash g.
(3) (Gcol) algorithm is collided:The message m of input discoloration cryptographic Hash g, Hash limit door tk and a random length ', it is defeated
A random number r' out, so that Ghash (m ', hk, r ')=g.
Step 1.2. access node into license chain, and selected part node is as verifying node.
Firstly, network, and selected part node conduct is added by a set of Authentication mechanism access node in chain administrator
Node is verified, remainder is as accessed node.Verifying node has the right to audit to block and verified, and accessed node is for reading
Take the content on license chain.Then, chain administrator saves the list node of all verifying nodes, and maintenance is used for node in real time
The list node of dynamic mechanism of permitting the entrance.
Hash key hk is calculated according to key schedule by step 1.3. and Hash limits door tk, according to the verifying of selection
The number of node split to Hash limit door tk and be fragmentated, and all verifying nodes grasp one of fragment.
Chain administrator selects a security parameter a as input, executes key schedule and obtains disclosed Hash key
Hk and Hash limit door tk.Hash key hk is disclosed, in a manner of threshold secret sharing by Hash limit door tk split into it is multiple broken
Piece and it is safe be sent to all verifying nodes, so that each verifying node is grasped a portion that Hash limits door tk.
Step 1.4. according to block format, impact resistant hash function H, chameleon hash algorithm Ghash, Hash key hk and
The CH-POW (proof of work based on chameleon hash function) that Hash limit door tk defines the cryptographic Hash for calculation block is calculated
Method.The calculation formula of CH-POW algorithm is as follows:
H=H (version ‖ pre hash ‖ nonce ‖ complex ‖ Ghash (tran set ‖ root ‖ timestamp, hk,
r))
Wherein, H indicates that system hash function H, Ghash indicate that chameleon hash algorithm Ghash, version indicate block
Version number, pre hash indicates the cryptographic Hash of previous block, and complex indicates proof of work difficulty value, tran set
Indicate that the transaction record collection of block, root indicate that the Merkle Hash root vertex of block, timestamp indicate the time of block
Stamp is the time that block generates, and hk indicates that disclosed Hash key hk, r indicate the chameleon random number of block.Wherein, difficulty value
By system according to the difficulty of digging mine to its adjust automatically;Chameleon random number is block initial stage, and node is randomly generated.Arbitrarily
Node executes CH-POW algorithm as its proof of work repeatedly.Nonce is chosen over by verifying node come calculation block
Cryptographic Hash h be dig mine a process, when obtained cryptographic Hash h meet proof of work target value require (such as:Target
Value is with the cryptographic Hash of multiple 0 beginnings) when, it as digs to a mine, which is a solution of the node proof of work.
Chain control mechanism further includes that block control operation and control require, and the method for block control operation is:Execute DBFT
Algorithm simultaneously combines all verifying nodes and modifies to any number of transaction records in abnormal block, while modifying abnormal block
Corresponding Merkle Hash root vertex root and timestamp timestamp.Control requires to include modified transaction record collection
Each transaction record in tran-set' requires to meet following required:(1) each transaction record is correct credible,
That is the transaction of both parties' all Signature Confirmations;(2) each transaction record not will lead to honeysuckle (Double Spending), i.e.,
Two transactions are used for a sum of money;(3) each transaction record not will lead to user account remaining sum and be negative;(4) transaction record collection
Each transaction record ' in tran-set 'i(1≤i≤n) is inputted as leaf node, and calculating Merkle Hash tree obtains defeated
Value root' should be identical as the root value before modification out.Control require further include after modification obtained block should meet it is following
Each is required:(1) after permitting being consistent property of chain, i.e., abnormal block to be modified, cryptographic Hash h' should with to modify before
The cryptographic Hash of block is identical;(2) parameter of modified block must be correct, i.e.,:version,pre-hash,nonce,
Complex and old block should being consistent property, root', tran-set' and timestamp' should be modified value.
Step 1.5 by chain manage mechanism, impact resistant hash function H, chameleon hash function G, CH-POW algorithm and
DBFT algorithm generates wound generation block.
By DBFT (Byzantine failure tolerance) algorithm, CH-POW algorithm, impact resistant hash function H, chameleon hash function G, chain
Manage mechanism, a direction is breathed out by the pointer for verifying list node of chain administrator's Dynamic Maintenance, timestamp, version number, wound generation
In uncommon value write-in wound generation block.Wherein, wound generation cryptographic Hash by system setting themselves, filled out by node by the value of timestamp and version number
It writes.When the authorization for having new node to obtain chain administrator, chain administrator updates verifying list node, the verifying section that will be revoked
The fragment that point is grasped transfers to new node to grasp, to realize the dynamic mechanism of permitting the entrance of verifying node.After generating wound generation block, chain
Administrator broadcasts wound generation block in a network.
Specific step is as follows for step 2:
Step 2.1. verifying node executes CH-POW algorithm repeatedly, finds the nonce value for meeting proof of work requirement.
Step 2.2. according to the nonce value of any verifying node, by network when the transaction of intra block for the previous period is remembered
Record carries out being packed into new block.
According to the format of the nonce value that is calculated of verifying node and wound generation block, by network within for the previous period
Transaction record be packaged and inserted into new block, the transaction record that each transaction record integrates is collected and is placed on block body
It is interior, the nonce value being calculated is placed in block head, and new block is propagated in a network.The transaction note being packed into
Record concentrate contain ought the user in Intranet network for the previous period Transaction Information, also additionally contain a service charge, and hand
The higher block that continues to pay dues can be more confirmed as soon as possible.
Step 2.3. examines the correctness of new block by verifying node, if upchecking, which is added
Add to license chain tail portion;If examining failure, the new block is abandoned.
Any verifying node can examine the correctness of new block, and the content of inspection includes but is not limited to:(1) transaction label
The correctness of name;(2) whether the discoloration cryptographic Hash g of block meets g=Ghash (tran set ‖ root ‖ timestamp ‖ hk ‖
r);(3) whether the cryptographic Hash h of block is correct, that is, judges in cryptographic Hash that the content that the block includes is calculated and block head
Cryptographic Hash it is whether consistent.If upchecking, which is added to license chain tail portion, meanwhile, verifying node continues
It finds and meets the nonce value that the target value of proof of work requires, is i.e. verifying node continues to dig mine behind the block;If examining
Failure, then abandon the new block.
Verifying node when two and its above has found the nonce value of the different requirements for meeting proof of work
When, bifurcated will occur for license chain, at this point, still deferring to the optimal principle of long-chain.I.e.:Each verifying node can choose in them
Continue to dig mine behind the block of any publication, but system only follows longest chain.Therefore, if after some verifying node
Face with block it is less, this bifurcated is just abandoned automatically.
In step 3, it is according to the method that chain manages the block in mechanism supervision license chain:By chain control mechanism write-in intelligence
Contract, intelligent contract periodically check whether the block in network meets block control condition, if any block in network
Transaction record concentrates a certain transaction record to meet block control condition, then is abnormal by the block of block control condition is met
Block.
Specific step is as follows for step 3:
Step 3.1. generates new transaction record collection tran-set' according to the transaction record collection tran-set of abnormal block,
And by include transaction record collection tran-set' request modification content propagate in a network, enter step 3.2.
When there is abnormal transaction record in any node (verifying node or accessed node) discovery block, by different
Any number of transaction records modification in normal block generates new transaction record collection tran-set', will (tran-set', h,
Reason it) is broadcasted in a network as modification request.Wherein, h indicates the cryptographic Hash of the exception block, and reason indicates that request is repaired
The reason of changing and foundation.
Step 3.2. verifies node and receives modification request content, and manages mechanism according to chain and judge whether modify request content
It is legal, if legal, then enter step 3.3;If it is illegal, then the modification request content is abandoned.Verifying node is receiving modification
After request, judge whether modification request is legal according to the block control condition in chain control mechanism defined in wound generation block.
All verifying nodes of step 3.3. are put to the vote according to DBFT algorithm, if all verifying nodes can reach common understanding,
Enter step 3.4;If all verifying nodes cannot reach common understanding, the modification request content is abandoned.Since DBFT algorithm is supported
Dynamic mechanism of permitting the entrance, therefore, the verifying node with the right to vote is both from list node.I.e.:The new verifying being added in real time
Node may participate in the verifying of a new round, and the verifying node being revoked does not have the right to vote.
All verifying nodes of step 3.4. limit door tk fragment according to the Hash of grasp and participate in chameleon hash algorithm jointly
The solution is denoted as r', enters step 3.5 by the calculating of Ghash.Each verifying node will be obtained by way of threshold secret sharing
The tk fragment arrived calculates the solution r' of Gcol algorithm as input, common participation, and calculation formula is as follows:
R '=Gcol (tran set ' | | root ' | | timestamp ', tk, g)
Wherein, finally obtained r' is the random value for meeting Ghash algorithm, i.e. r' can satisfy:
Ghash (tran set ‖ root ‖ timestamp, hk, r)=g=Ghash (tran set ' | | root ' | |
timestamp′,hk′,r′)
It follows that the cryptographic Hash of modified block, there is no variation, block content has obtained legal modification.
All verifying nodes of step 3.5. regard transaction each in transaction record collection tran-set' record as leaf node,
The root node root' for calculating Merkle Hash tree searches corresponding target block on license chain according to (r', root'), is used in combination
(r, root, tran-set) in new (r', root', tran-set') replacement target block.So as to complete to exceptions area
Modified block content can be read in the modification of block, any node.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (10)
1. a kind of license chain construction and management-control method based on chameleon hash function, which is characterized in that include the following steps:
Step 1. defines chain control mechanism and manages mechanism initialization license chain according to chain;
Step 2. adds new block into license chain;
Step 3. manages the block in mechanism supervision license chain according to chain, manages to the block for not meeting chain control mechanism.
2. a kind of license chain construction and management-control method based on chameleon hash function according to claim 1, feature
It is, the chain control mechanism includes block format and block control condition, wherein block format includes block head and block
Body, the block head include cryptographic Hash pre-hash, the random number nonce, workload of version number version, a upper block
Prove difficulty value complex, timestamp timestamp, Merkle Hash root vertex root, chameleon random number r, discoloration is breathed out
Uncommon value g;The block body includes the transaction record collection tran-set of multiple transaction record compositions.
3. a kind of license chain construction and management-control method based on chameleon hash function according to claim 2, feature
It is, the block control condition is to distinguish the standard of normal blocks and abnormal block, will be met any in block control condition
It is required that block be denoted as abnormal block;The block manages condition:(1) the countries concerned's safety and cyberspace safety;(2)
It is related break laws and violate discipline, terrified crime;(3) in relation to personal or unit great privacy leakage;(4) in relation to false or mistake friendship
Easily;(5) mistake as caused by artificial or machine error.
4. a kind of license chain construction and management-control method based on chameleon hash function according to claim 2, feature
It is, in the step 1, specific step is as follows for initialization license chain:
Step 1.1. selects impact resistant hash function H and chameleon hash function G;
Step 1.2. access node into license chain, and selected part node is as verifying node;
Hash key hk is calculated according to chameleon hash function G by step 1.3. and Hash limits door tk, according to the verifying of selection
The number of node split to Hash limit door tk and be fragmentated, and all verifying nodes grasp one of fragment;
Step 1.4. limits door according to block format, impact resistant hash function H, chameleon hash function G, Hash key hk and Hash
Tk defines the CH-POW algorithm of the cryptographic Hash for calculation block;
Step 1.5 is managed mechanism, impact resistant hash function H, chameleon hash function G, CH-POW algorithm and DBFT by chain and is calculated
Method generates wound generation block.
5. a kind of license chain construction and management-control method based on chameleon hash function, special according to claim 3 and 4
Sign is that the chain control mechanism further includes block control operation, and the method for the block control operation is:Execute DBFT algorithm
And combines all verifying nodes and the content in abnormal block is managed.
6. a kind of license chain construction and management-control method based on chameleon hash function according to claim 1, feature
It is, specific step is as follows for the step 2:
Step 2.1. calculates the nonce value of verifying node according to CH-POW algorithm;
Step 2.2. according to the nonce value of any verifying node, by network when the transaction record of intra block for the previous period into
Row is packed into new block;
Step 2.3. examines the correctness of new block by verifying node, if upchecking, which is added to
Permit chain tail portion;If examining failure, the new block is abandoned.
7. a kind of license chain construction and management-control method based on chameleon hash function according to claim 4, feature
It is, the chameleon hash function G includes three subalgorithms, respectively:
(1) key schedule:A security parameter a is inputted, Hash key hk is exported and Hash limits door tk;
(2) chameleon hash algorithm:The message m for inputting Hash key hk, random number r and a random length, exports a change
Color cryptographic Hash g;
(3) collision algorithm:The message m of input discoloration cryptographic Hash g, Hash limit door tk and a random length ', export one at random
Number r'.
8. a kind of license chain construction and management-control method based on chameleon hash function, special according to claim 3 and 7
Sign is that specific step is as follows for the step 3:
Step 3.1. generates new transaction record collection tran-set' according to the transaction record collection tran-set of abnormal block, and will
Include transaction record collection tran-set' request modification content propagate in a network, enter step 3.2;
Step 3.2. verifies node and receives modification request content, and manages mechanism according to chain and judge to modify whether request content closes
Method then enters step 3.3 if legal;If it is illegal, then the modification request content is abandoned;
All verifying nodes of step 3.3. are put to the vote according to DBFT algorithm, if all verifying nodes can reach common understanding, are entered
Step 3.4;If all verifying nodes cannot reach common understanding, the modification request content is abandoned;
All verifying nodes of step 3.4. limit the meter that door tk fragment participates in chameleon hash function G jointly according to the Hash of grasp
It calculates, which is denoted as r', enters step 3.5;
All verifying nodes of step 3.5. regard transaction each in transaction record collection tran-set' record as leaf node, calculate
The root node root' of Merkle Hash tree searches corresponding target block on license chain according to r' and root', and with r',
Root' and tran-set' replaces corresponding value in abnormal block.
9. a kind of license chain construction and management-control method based on chameleon hash function according to claim 8, feature
It is, the chain control mechanism further includes that control requires, and the control requires to include modified transaction record collection tran-set'
In each transaction record require to meet following required:(1) each transaction record is correct credible;(2) each pen
Transaction record not will lead to honeysuckle;(3) each transaction record not will lead to user account remaining sum and be negative;(4) transaction record collection
Each transaction record ' in tran-set 'i(1≤i≤n) is inputted as leaf node, and calculating Merkle Hash tree obtains defeated
Value root' should be identical as the root value before modification out;The control requires to further include that the block obtained after modifying should meet
Each is required below:(1) permit being consistent property of chain;(2) parameter of modified block must be correct.
10. a kind of license chain construction and management-control method based on chameleon hash function according to claim 3, feature
It is, is according to the method that chain manages the block in mechanism supervision license chain:Intelligent contract is written into chain control mechanism, intelligence is closed
About periodically check whether the block in network meets block control condition, if the transaction record of any block is concentrated in network
A certain transaction record meets block control condition, then is abnormal block by the block for meeting block control condition.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810675840.6A CN108830602B (en) | 2018-06-27 | 2018-06-27 | Permission chain construction and management and control method based on chameleon hash function |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810675840.6A CN108830602B (en) | 2018-06-27 | 2018-06-27 | Permission chain construction and management and control method based on chameleon hash function |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108830602A true CN108830602A (en) | 2018-11-16 |
CN108830602B CN108830602B (en) | 2022-03-29 |
Family
ID=64139025
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810675840.6A Active CN108830602B (en) | 2018-06-27 | 2018-06-27 | Permission chain construction and management and control method based on chameleon hash function |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108830602B (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109547194A (en) * | 2018-12-11 | 2019-03-29 | 安徽大学 | Lattice-based chameleon hash function construction method |
CN109542577A (en) * | 2018-11-30 | 2019-03-29 | 北京小米移动软件有限公司 | Advertisement update method, device and computer readable storage medium |
CN109559123A (en) * | 2018-12-10 | 2019-04-02 | 大科数据(深圳)有限公司 | A kind of point-to-point network processing method of mixed type |
CN110020547A (en) * | 2019-01-31 | 2019-07-16 | 阿里巴巴集团控股有限公司 | A kind of data hiding method, device and equipment |
CN110086599A (en) * | 2019-04-24 | 2019-08-02 | 电子科技大学 | Hash calculation method and label decryption method based on homomorphism chameleon hash function |
CN110377609A (en) * | 2019-06-17 | 2019-10-25 | 北京航空航天大学 | Intelligent contract Dynamical Deployment and evolution method and device based on block chain |
CN110457297A (en) * | 2019-07-10 | 2019-11-15 | 北京航空航天大学 | Editable block catenary system and method based on more authorization center encryption attributes |
CN111147228A (en) * | 2019-12-28 | 2020-05-12 | 西安电子科技大学 | Ethernet IoT entity based lightweight authentication method, system and intelligent terminal |
CN111211904A (en) * | 2019-12-13 | 2020-05-29 | 杭州复杂美科技有限公司 | Consensus method, device and storage medium |
CN111753335A (en) * | 2020-08-28 | 2020-10-09 | 支付宝(杭州)信息技术有限公司 | Editing method and device for block content |
CN111966696A (en) * | 2019-05-20 | 2020-11-20 | 深圳市网安计算机安全检测技术有限公司 | Method, device and equipment for updating data in block chain |
CN112054990A (en) * | 2020-07-21 | 2020-12-08 | 杜晓楠 | Method for preventing Hash flood attack in blockchain system, computer readable medium and blockchain system |
CN112070501A (en) * | 2020-11-10 | 2020-12-11 | 支付宝(杭州)信息技术有限公司 | Block chain transaction initiating and verifying method and system |
CN112272092A (en) * | 2020-08-30 | 2021-01-26 | 河南大学 | Data editing method applied to block chain |
CN112307513A (en) * | 2020-11-23 | 2021-02-02 | 从法信息科技有限公司 | Uplink document security management method and device based on time domain consensus and electronic equipment |
CN112468302A (en) * | 2020-10-23 | 2021-03-09 | 湖南天河国云科技有限公司 | Editable blockchain based on verifiable multiparty secret sharing |
CN113794556A (en) * | 2021-09-10 | 2021-12-14 | 福建师范大学 | PCH revocable method and system oriented to programmable block chain protocol |
CN114331451A (en) * | 2021-10-27 | 2022-04-12 | 东北大学 | Data modification method on block chain based on double hash chains |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105978696A (en) * | 2016-05-09 | 2016-09-28 | 北京航空航天大学 | Revocable quick data outsourcing packaging method and device |
CN106878000A (en) * | 2017-03-06 | 2017-06-20 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | A kind of alliance's chain common recognition method and system |
WO2017145004A1 (en) * | 2016-02-23 | 2017-08-31 | nChain Holdings Limited | Universal tokenisation system for blockchain-based cryptocurrencies |
US20170338957A1 (en) * | 2016-05-23 | 2017-11-23 | Accenture Global Solutions Limited | Rewritable blockchain |
CN107563754A (en) * | 2017-08-17 | 2018-01-09 | 杭州云象网络技术有限公司 | A kind of storage of serial number information and verification method based on block chain |
CN107819583A (en) * | 2016-09-13 | 2018-03-20 | 渡边浩志 | The anti-abuse technology of key |
CN108009778A (en) * | 2017-12-25 | 2018-05-08 | 南京思利华信息科技有限公司 | A kind of supply chain management method |
CN108111312A (en) * | 2017-12-28 | 2018-06-01 | 电子科技大学 | Intelligent terminal safety communication method based on block chain |
-
2018
- 2018-06-27 CN CN201810675840.6A patent/CN108830602B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017145004A1 (en) * | 2016-02-23 | 2017-08-31 | nChain Holdings Limited | Universal tokenisation system for blockchain-based cryptocurrencies |
CN105978696A (en) * | 2016-05-09 | 2016-09-28 | 北京航空航天大学 | Revocable quick data outsourcing packaging method and device |
US20170338957A1 (en) * | 2016-05-23 | 2017-11-23 | Accenture Global Solutions Limited | Rewritable blockchain |
CN107819583A (en) * | 2016-09-13 | 2018-03-20 | 渡边浩志 | The anti-abuse technology of key |
CN106878000A (en) * | 2017-03-06 | 2017-06-20 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | A kind of alliance's chain common recognition method and system |
CN107563754A (en) * | 2017-08-17 | 2018-01-09 | 杭州云象网络技术有限公司 | A kind of storage of serial number information and verification method based on block chain |
CN108009778A (en) * | 2017-12-25 | 2018-05-08 | 南京思利华信息科技有限公司 | A kind of supply chain management method |
CN108111312A (en) * | 2017-12-28 | 2018-06-01 | 电子科技大学 | Intelligent terminal safety communication method based on block chain |
Non-Patent Citations (3)
Title |
---|
GIUSEPPE ATENIESE ET AL.: "Redactable Blockchain or Rewriting History in Bitcoin and Friends", 《2017 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY》 * |
LENGXUE789: "PoW挖矿算法原理", 《HTTPS://BLOG.CSDN.NET/LENGXUE789/ARTICLE/DETAILS/79998866》 * |
张小松 等: "大数据产业化中的核心安全", 《信息安全研究》 * |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109542577A (en) * | 2018-11-30 | 2019-03-29 | 北京小米移动软件有限公司 | Advertisement update method, device and computer readable storage medium |
CN109559123A (en) * | 2018-12-10 | 2019-04-02 | 大科数据(深圳)有限公司 | A kind of point-to-point network processing method of mixed type |
CN109547194A (en) * | 2018-12-11 | 2019-03-29 | 安徽大学 | Lattice-based chameleon hash function construction method |
CN109547194B (en) * | 2018-12-11 | 2021-08-27 | 安徽大学 | Lattice-based chameleon hash function construction method |
CN110020547A (en) * | 2019-01-31 | 2019-07-16 | 阿里巴巴集团控股有限公司 | A kind of data hiding method, device and equipment |
CN110086599A (en) * | 2019-04-24 | 2019-08-02 | 电子科技大学 | Hash calculation method and label decryption method based on homomorphism chameleon hash function |
CN111966696B (en) * | 2019-05-20 | 2023-10-13 | 深圳市网安计算机安全检测技术有限公司 | Method, device and equipment for updating data in block chain |
CN111966696A (en) * | 2019-05-20 | 2020-11-20 | 深圳市网安计算机安全检测技术有限公司 | Method, device and equipment for updating data in block chain |
CN110377609A (en) * | 2019-06-17 | 2019-10-25 | 北京航空航天大学 | Intelligent contract Dynamical Deployment and evolution method and device based on block chain |
CN110377609B (en) * | 2019-06-17 | 2021-11-02 | 北京航空航天大学 | Intelligent contract dynamic deployment and evolution method and device based on block chain |
CN110457297A (en) * | 2019-07-10 | 2019-11-15 | 北京航空航天大学 | Editable block catenary system and method based on more authorization center encryption attributes |
CN110457297B (en) * | 2019-07-10 | 2022-02-15 | 北京航空航天大学 | Editable block chain system and method based on multi-authority attribute encryption |
CN111211904A (en) * | 2019-12-13 | 2020-05-29 | 杭州复杂美科技有限公司 | Consensus method, device and storage medium |
CN111147228A (en) * | 2019-12-28 | 2020-05-12 | 西安电子科技大学 | Ethernet IoT entity based lightweight authentication method, system and intelligent terminal |
CN111147228B (en) * | 2019-12-28 | 2022-04-01 | 西安电子科技大学 | Ethernet IoT entity based lightweight authentication method, system and intelligent terminal |
CN112054990A (en) * | 2020-07-21 | 2020-12-08 | 杜晓楠 | Method for preventing Hash flood attack in blockchain system, computer readable medium and blockchain system |
CN112054990B (en) * | 2020-07-21 | 2022-09-16 | 杜晓楠 | Method for preventing Hash flood attack in blockchain system, computer readable medium and blockchain system |
CN111753335B (en) * | 2020-08-28 | 2023-09-01 | 支付宝(杭州)信息技术有限公司 | Editing method and device for block content |
CN111753335A (en) * | 2020-08-28 | 2020-10-09 | 支付宝(杭州)信息技术有限公司 | Editing method and device for block content |
CN112272092A (en) * | 2020-08-30 | 2021-01-26 | 河南大学 | Data editing method applied to block chain |
CN112468302A (en) * | 2020-10-23 | 2021-03-09 | 湖南天河国云科技有限公司 | Editable blockchain based on verifiable multiparty secret sharing |
CN112468302B (en) * | 2020-10-23 | 2024-05-24 | 湖南天河国云科技有限公司 | Editable blockchain based on verifiable multiparty secret sharing |
CN112070501B (en) * | 2020-11-10 | 2021-03-02 | 支付宝(杭州)信息技术有限公司 | Block chain transaction initiating and verifying method and system |
CN112884477A (en) * | 2020-11-10 | 2021-06-01 | 支付宝(杭州)信息技术有限公司 | Block chain transaction initiating and verifying method and system |
CN112070501A (en) * | 2020-11-10 | 2020-12-11 | 支付宝(杭州)信息技术有限公司 | Block chain transaction initiating and verifying method and system |
CN112307513A (en) * | 2020-11-23 | 2021-02-02 | 从法信息科技有限公司 | Uplink document security management method and device based on time domain consensus and electronic equipment |
CN113794556A (en) * | 2021-09-10 | 2021-12-14 | 福建师范大学 | PCH revocable method and system oriented to programmable block chain protocol |
CN113794556B (en) * | 2021-09-10 | 2023-05-23 | 福建师范大学 | PCH revocable method and system for collectable blockchain protocol |
CN114331451A (en) * | 2021-10-27 | 2022-04-12 | 东北大学 | Data modification method on block chain based on double hash chains |
Also Published As
Publication number | Publication date |
---|---|
CN108830602B (en) | 2022-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108830602A (en) | A kind of license chain construction and management-control method based on chameleon hash function | |
Zamyatin et al. | Xclaim: Trustless, interoperable, cryptocurrency-backed assets | |
Hanifatunnisa et al. | Blockchain based e-voting recording system design | |
Chen et al. | A survey on blockchain systems: Attacks, defenses, and privacy preservation | |
CN111464518B (en) | Method and device for sending and verifying cross-link communication data | |
CN110097467A (en) | A kind of side chain test method for intelligent contract safety and stability | |
Winn | Open Systems, Free Markets, and Regulation of Internet Commerce | |
Anderson | Liability and computer security: Nine principles | |
CN108681966A (en) | A kind of information monitoring method and device based on block chain | |
Acharjamayum et al. | Blockchain: a tale of peer to peer security | |
CN111066283A (en) | System and method for communicating, storing and processing data provided by entities on a blockchain network | |
CN106789090A (en) | Public key infrastructure system and semi-random participating certificate endorsement method based on block chain | |
CN107526766A (en) | Data organization method and development environment system | |
CN109753817A (en) | Medical information secure storage scheme based on block chain | |
CN111369730B (en) | Voting processing method and device based on block chain | |
Agbesi et al. | Electronic voting recording system based on blockchain technology | |
CN105072085B (en) | A kind of stream rule legitimacy authentication method under software defined network | |
CN108989118A (en) | A kind of privately owned block chain deployment tool of enterprise-level based on GO language | |
CN107908932A (en) | A kind of digital cash based on L algorithms is false proof and verification method, system and equipment | |
CN110719168B (en) | Hierarchical anonymous voting method based on block chain | |
CN112039927A (en) | Management method of network security vulnerability response platform based on block chain technology | |
US20230092436A1 (en) | Framework for demaraction of digital assets | |
TWM586416U (en) | Implementing a multi-center, distributed verification system for transactions based on blockchain technology | |
Yoshihama et al. | Study on integrity and privacy requirements of distributed ledger technologies | |
CN109690550A (en) | Digital asset framework |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |