• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
高级检索

一次变色龙哈希函数及其在可修正区块链中的应用

高伟, 陈利群, 唐春明, 张国艳, 李飞

高伟, 陈利群, 唐春明, 张国艳, 李飞. 一次变色龙哈希函数及其在可修正区块链中的应用[J]. 计算机研究与发展, 2021, 58(10): 2310-2318. DOI: 10.7544/issn1000-1239.2021.20210653
引用本文: 高伟, 陈利群, 唐春明, 张国艳, 李飞. 一次变色龙哈希函数及其在可修正区块链中的应用[J]. 计算机研究与发展, 2021, 58(10): 2310-2318. DOI: 10.7544/issn1000-1239.2021.20210653
Gao Wei, Chen Liqun, Tang Chunming, Zhang Guoyan, Li Fei. One-Time Chameleon Hash Function and Its Application in Redactable Blockchain[J]. Journal of Computer Research and Development, 2021, 58(10): 2310-2318. DOI: 10.7544/issn1000-1239.2021.20210653
Citation: Gao Wei, Chen Liqun, Tang Chunming, Zhang Guoyan, Li Fei. One-Time Chameleon Hash Function and Its Application in Redactable Blockchain[J]. Journal of Computer Research and Development, 2021, 58(10): 2310-2318. DOI: 10.7544/issn1000-1239.2021.20210653
高伟, 陈利群, 唐春明, 张国艳, 李飞. 一次变色龙哈希函数及其在可修正区块链中的应用[J]. 计算机研究与发展, 2021, 58(10): 2310-2318. CSTR: 32373.14.issn1000-1239.2021.20210653
引用本文: 高伟, 陈利群, 唐春明, 张国艳, 李飞. 一次变色龙哈希函数及其在可修正区块链中的应用[J]. 计算机研究与发展, 2021, 58(10): 2310-2318. CSTR: 32373.14.issn1000-1239.2021.20210653
Gao Wei, Chen Liqun, Tang Chunming, Zhang Guoyan, Li Fei. One-Time Chameleon Hash Function and Its Application in Redactable Blockchain[J]. Journal of Computer Research and Development, 2021, 58(10): 2310-2318. CSTR: 32373.14.issn1000-1239.2021.20210653
Citation: Gao Wei, Chen Liqun, Tang Chunming, Zhang Guoyan, Li Fei. One-Time Chameleon Hash Function and Its Application in Redactable Blockchain[J]. Journal of Computer Research and Development, 2021, 58(10): 2310-2318. CSTR: 32373.14.issn1000-1239.2021.20210653

一次变色龙哈希函数及其在可修正区块链中的应用

基金项目: 国家自然科学基金项目(61772147);全国统计科研项目(2020LY016,2021LY029);山东省自然科学基金项目(ZR2019MF062);山东省重点研发计划项目(2020RKB01114);山东省高校科技计划项目(J18A326)
详细信息
  • 中图分类号: TP309

One-Time Chameleon Hash Function and Its Application in Redactable Blockchain

Funds: This work was supported by the National Natural Science Foundation of China (61772147), the National Statistics Research Program (2020LY016, 2021LY029), the Natural Science Foundation of Shandong Province (ZR2019MF062), the Key Research and Development Program of Shandong Province (2020RKB01114), and Shandong University Science and Technology Program (J18A326).
  • 摘要: 提出了称作一次变色龙哈希函数的新密码学原语:同一哈希值的2个原像(一次碰撞)不会暴露任何陷门信息,而同一哈希值的3个原像(二次碰撞)则会暴露部分陷门信息,但足以导致严重的安全危害.基于经典的RSA困难问题构造了简单高效的一次变色龙哈希函数方案,并在随机预言模型下证明了其安全性.应用该一次变色龙哈希函数方案,进一步高效实现了对每个区块仅允许至多一次修正的可修正区块链,而任何区块的二次修改都将导致区块链崩溃的惩罚.对区块链进行有效治理是网络空间安全治理的关键领域,而可修正区块链则构成了区块链监管和治理的最核心技术.所提出的可修正区块链方案具有高效和修正权限契合实际需求的两大特点,有望为区块链监管(尤其是链上有害数据的事后治理)提供有力的技术参考.
    Abstract: A new cryptographic primitive called a one-time chameleon Hash function is proposed for the first time. For this new primitive, two pre-images of the same Hash value (i.e. one collision) will not expose any trapdoor information, while three pre-images of the same Hash value (i.e. two collisions) will expose some trapdoor information, but it is enough to cause some serious security hazards. An efficient one-time chameleon Hash function scheme is constructed based on the classical RSA hard problem. Then its security is proved based on the RSA assumption in the random oracle model. By using this one-time chameleon Hash function scheme, a redactable blockchain scheme is further implemented efficiently, which only allows one redaction at most for each block, and any second redaction of the block will result in the penalty of the blockchain crash. Effective governance of blockchain is the key area of cyberspace security governance, and the redactable blockchain constitutes the most core technology of blockchain supervision and governance. The redactable blockchain scheme proposed in this paper has two characteristics of high efficiency and redacting restrictions compatible with the practical demand. So it is expected to provide a powerful technical method for blockchain supervision (especially for the post-governance of harmful data stored on the chain).
  • 期刊类型引用(10)

    1. 杨秀璋,彭国军,刘思德,田杨,李晨光,傅建明. 面向APT攻击的溯源和推理研究综述. 软件学报. 2025(01): 203-252 . 百度学术
    2. 申国霞,常鑫. 基于可信密码模块的网络信道潜在攻击挖掘. 信息技术. 2023(10): 152-156+162 . 百度学术
    3. 谢峥,路广平,付安民. 一种可扩展的实时多步攻击场景重构方法. 信息安全研究. 2023(12): 1173-1179 . 百度学术
    4. 黄维贵,孙怡峰,欧旺,王玉宾. 基于不确定攻击图的违规外联风险分析. 信息工程大学学报. 2022(05): 570-577 . 百度学术
    5. 王文娟,杜学绘,单棣斌. 基于动态概率攻击图的云环境攻击场景构建方法. 通信学报. 2021(01): 1-17 . 百度学术
    6. 潘亚峰,朱俊虎,周天阳. APT攻击场景重构方法综述. 信息工程大学学报. 2021(01): 55-60+80 . 百度学术
    7. 罗智勇,杨旭,刘嘉辉,许瑞. 基于贝叶斯攻击图的网络入侵意图分析模型. 通信学报. 2020(09): 160-169 . 百度学术
    8. 王硕,王建华,汤光明,裴庆祺,张玉臣,刘小虎. 一种智能高效的最优渗透路径生成方法. 计算机研究与发展. 2019(05): 929-941 . 本站查看
    9. 吴东,郭春,申国伟. 一种基于多因素的告警关联方法. 计算机与现代化. 2019(06): 30-37 . 百度学术
    10. 韩宜轩,秦元庆. 基于因果关联的电力工控系统攻击场景还原. 信息技术. 2019(08): 41-44+48 . 百度学术

    其他类型引用(12)

计量
  • 文章访问数: 
  • HTML全文浏览量:  0
  • PDF下载量: 
  • 被引次数: 22
出版历程
  • 发布日期:  2021-09-30

目录

    /

    返回文章
    返回