• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Diao Yiqing, Ye Ayong, Zhang Jiaomei, Deng Huina, Zhang Qiang, Cheng Baorong. A Dual Privacy Protection Method Based on Group Signature and Homomorphic Encryption for Alliance Blockchain[J]. Journal of Computer Research and Development, 2022, 59(1): 172-181. DOI: 10.7544/issn1000-1239.20200576
Citation: Diao Yiqing, Ye Ayong, Zhang Jiaomei, Deng Huina, Zhang Qiang, Cheng Baorong. A Dual Privacy Protection Method Based on Group Signature and Homomorphic Encryption for Alliance Blockchain[J]. Journal of Computer Research and Development, 2022, 59(1): 172-181. DOI: 10.7544/issn1000-1239.20200576

A Dual Privacy Protection Method Based on Group Signature and Homomorphic Encryption for Alliance Blockchain

Funds: This work was supported by the National Natural Science Foundation of China (61972096, 61771140, 61872088, 61872090), the Natural Science Foundation of Fujian Province(2018J01780), and the Science Foundation of Fujian Educational Bureau (JAT170115).
More Information
  • Published Date: December 31, 2021
  • The account book of blockchain is open and transparent to realize the traceability and verifiability of transactions. However, this makes the privacy of blockchain users be an urgent problem. In order to solve the problem of transaction amount and identity exposure of both parties in alliance chain transaction, a privacy protection method of alliance chain based on group signature and homomorphic encryption is proposed. This method can protect the identity of the payee and the privacy of the transaction amount on the premise of meeting the traceability and verifiability of the transaction. In this scheme, the concept of group in group signature is combined with the alliance chain properly and we propose the concept of partial identity anonymity to make the user identity anonymous to other secondary nodes but verifiable to the primary nodes. Then the additive homomorphism property of Paillier homomorphism encryption is used to verify the legitimacy of the transaction and protect the privacy of the transaction amount. A four-step verification method for the main nodes is proposed, and through verifying the group signature, account ownership and the validity of the transaction amount, it realizes the supervision of the main nodes on the legality of the transaction. Through analysis, the scheme can resist tamper attacks and public key replacement attacks, and the transaction legitimacy is verified to be reasonable. Finally, by comparing with other schemes, the calculation cost of this scheme is reasonable.
  • Related Articles

    [1]Wang Haitao, Li Zhanhuai, Zhang Xiao, Bu Hailong, Kong Lanxin, Zhao Xiaonan. Virtual Machine Resources Allocation Methods Based on History Data[J]. Journal of Computer Research and Development, 2019, 56(4): 779-789. DOI: 10.7544/issn1000-1239.2019.20170831
    [2]Liu Weijie, Wang Lina, Tan Cheng, Xu Lai. A Virtual Machine Introspection Triggering Mechanism Based on VMFUNC[J]. Journal of Computer Research and Development, 2017, 54(10): 2310-2320. DOI: 10.7544/issn1000-1239.2017.20170452
    [3]Shi Yuan, Zhang Huanguo, Wu Fusheng. A Method of Constructing the Model of Trusted Virtual Machine Migration[J]. Journal of Computer Research and Development, 2017, 54(10): 2284-2295. DOI: 10.7544/issn1000-1239.2017.20170465
    [4]Luo Yang, Xia Chunhe, Li Yazhuo, Wei Zhao, Liang Xiaoyan. A Polymorphic Shellcode Detection Method Based on Dual-Mode Virtual Machine[J]. Journal of Computer Research and Development, 2014, 51(8): 1704-1714. DOI: 10.7544/issn1000-1239.2014.20121149
    [5]Cai Wanwei, Tai Yunfang, Liu Qi, Zhang Ge. Memory Virtulization on MIPS Architecture[J]. Journal of Computer Research and Development, 2013, 50(10): 2247-2252.
    [6]Zhang Xiang, Huo Zhigang, Ma Jie, Meng Dan. Fast and Live Whole-System Migration of Virtual Machines[J]. Journal of Computer Research and Development, 2012, 49(3): 661-668.
    [7]Wang Kai, Hou Zifeng. A Relaxed Co-Scheduling Method of Virtual CPUs on Xen Virtual Machines[J]. Journal of Computer Research and Development, 2012, 49(1): 118-127.
    [8]Wang Kai, Hou Zifeng. An Adaptive Scheduling Method of Weight Parameter Adjustment on Virtual Machines[J]. Journal of Computer Research and Development, 2011, 48(11): 2094-2102.
    [9]Jin Hai, Zhong Alin, Wu Song, and Shi Xuanhua. Virtual Machine VCPU Scheduling in the Multi-core Environment:Issues and Challenges[J]. Journal of Computer Research and Development, 2011, 48(7): 1216-1224.
    [10]Chen Hui, Chen Yiyun, Wu Ping, and Xiang Sen. A Typed Low-Level Language Used in Java Virtual Machine[J]. Journal of Computer Research and Development, 2006, 43(1): 15-22.
  • Cited by

    Periodical cited type(2)

    1. 刘海峰,徐丽丽,武堂颖. 无线传感器网络恶意信标干扰信号协同过滤方法. 传感技术学报. 2024(11): 1971-1975 .
    2. 崔莉,周钧锴,王念,肖京,季宇宣,姜美驰. 便携式非特异性腰痛测量系统研制. 中国医疗器械杂志. 2021(05): 473-478 .

    Other cited types(2)

Catalog

    Article views (693) PDF downloads (560) Cited by(4)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return