高级检索

    中继链环境下一种2阶段跨链访问控制机制

    A Two-Stage Cross-Chain Access Control Mechanism in Relay Chain Environment

    • 摘要: 随着区块链技术的迅速发展,数据等资产已不满足于只在单个区块链上流通,因此跨链技术应运而生. 跨链技术改善了区块链数据孤岛问题,但也为数据在不同区块链上的传输与共享带来了新的挑战. 一方面,不同区块链用户存储数据方式通常不同,各区块链数据验证方式往往也不统一. 因此,其他区块链上的用户可能传输虚假或者不一致的数据,导致数据难以被有效验证其真实性和一致性,从而影响跨链访问控制的可靠性. 另一方面,虽然当前代理重加密技术能有效实现1对1的访问控制,但单一代理存在中心化问题,以及在跨链场景下面临多用户并发导致的访问控制时间开销大的问题. 针对上述问题,提出中继链环境下一种2阶段跨链访问控制机制,分别从数据验证和代理重加密阶段2个阶段进行设计. 在数据验证阶段,为确保加密数据的来源真实性和一致性,结合Fiat-Shamir启发式与星际文件系统(interplanetary file system, IPFS),设计一种数据验证方法对数据进行快速验证,使得加密数据可被用户正确接收,加密数据在IPFS中安全存储以缓解链上存储压力;在代理重加密阶段,设计一种改进的阈值代理重加密方法,以有效应对多用户场景下的访问控制,基于重加密更新算法对重加密过程进行优化,在实现去中心化重加密的同时,降低重加密的时间开销,并有效提高多用户访问控制的重加密事务处理效率. 实验结果表明,所提出的机制在数据验证方面的开销较小,并在多用户场景下加密、重加密及解密过程开销均优于对比方法.

       

      Abstract: With the rapid development of blockchain technology, assets such as data are no longer satisfied with circulating only on a single blockchain, so cross-chain technology has emerged. Cross-chain technology has improved the problem of blockchain data islands, but it has also brought new challenges to the transmission and sharing of data on different blockchains. On the one hand, different blockchain users usually store data in different ways, and the data verification methods of each blockchain are often not unified. Therefore, users on other blockchains may transmit false or inconsistent data, making it difficult to effectively verify the authenticity and consistency of the data, thereby affecting the reliability of cross-chain access control. On the other hand, although the current proxy re-encryption technology can effectively implement one-to-one access control, a single proxy has a centralization problem and faces the problem of high access control time overhead caused by multi-user concurrency in cross-chain scenarios. In response to the above problems, a two-stage cross-chain access control mechanism in the relay chain environment is proposed, which is designed from two stages: data verification and proxy re-encryption. In the data verification stage, to ensure the authenticity and consistency of the source of encrypted data, combined with the Fiat-Shamir heuristic and IPFS, a data verification method is designed to quickly verify the data, so that the encrypted data can be correctly received by the user, the encrypted data is securely stored in IPFS to relieve the storage pressure on the chain. In the proxy re-encryption stage, an improved threshold proxy re-encryption method is designed to effectively deal with access control in multi-user scenarios, and the re-encryption process is optimized based on the re-encryption update algorithm. While achieving decentralized re-encryption, the time overhead of re-encryption is reduced, and the efficiency of re-encryption transaction processing for multi-user access control is effectively improved. Experimental results show that the proposed mechanism has a small overhead in data verification, and the overhead of encryption, re-encryption, and decryption processes in multi-user scenarios is better than the comparison method.

       

    /

    返回文章
    返回