• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Diao Yiqing, Ye Ayong, Zhang Jiaomei, Deng Huina, Zhang Qiang, Cheng Baorong. A Dual Privacy Protection Method Based on Group Signature and Homomorphic Encryption for Alliance Blockchain[J]. Journal of Computer Research and Development, 2022, 59(1): 172-181. DOI: 10.7544/issn1000-1239.20200576
Citation: Diao Yiqing, Ye Ayong, Zhang Jiaomei, Deng Huina, Zhang Qiang, Cheng Baorong. A Dual Privacy Protection Method Based on Group Signature and Homomorphic Encryption for Alliance Blockchain[J]. Journal of Computer Research and Development, 2022, 59(1): 172-181. DOI: 10.7544/issn1000-1239.20200576

A Dual Privacy Protection Method Based on Group Signature and Homomorphic Encryption for Alliance Blockchain

Funds: This work was supported by the National Natural Science Foundation of China (61972096, 61771140, 61872088, 61872090), the Natural Science Foundation of Fujian Province(2018J01780), and the Science Foundation of Fujian Educational Bureau (JAT170115).
More Information
  • Published Date: December 31, 2021
  • The account book of blockchain is open and transparent to realize the traceability and verifiability of transactions. However, this makes the privacy of blockchain users be an urgent problem. In order to solve the problem of transaction amount and identity exposure of both parties in alliance chain transaction, a privacy protection method of alliance chain based on group signature and homomorphic encryption is proposed. This method can protect the identity of the payee and the privacy of the transaction amount on the premise of meeting the traceability and verifiability of the transaction. In this scheme, the concept of group in group signature is combined with the alliance chain properly and we propose the concept of partial identity anonymity to make the user identity anonymous to other secondary nodes but verifiable to the primary nodes. Then the additive homomorphism property of Paillier homomorphism encryption is used to verify the legitimacy of the transaction and protect the privacy of the transaction amount. A four-step verification method for the main nodes is proposed, and through verifying the group signature, account ownership and the validity of the transaction amount, it realizes the supervision of the main nodes on the legality of the transaction. Through analysis, the scheme can resist tamper attacks and public key replacement attacks, and the transaction legitimacy is verified to be reasonable. Finally, by comparing with other schemes, the calculation cost of this scheme is reasonable.
  • Related Articles

    [1]Wang Haitao, Li Zhanhuai, Zhang Xiao, Bu Hailong, Kong Lanxin, Zhao Xiaonan. Virtual Machine Resources Allocation Methods Based on History Data[J]. Journal of Computer Research and Development, 2019, 56(4): 779-789. DOI: 10.7544/issn1000-1239.2019.20170831
    [2]Liu Weijie, Wang Lina, Tan Cheng, Xu Lai. A Virtual Machine Introspection Triggering Mechanism Based on VMFUNC[J]. Journal of Computer Research and Development, 2017, 54(10): 2310-2320. DOI: 10.7544/issn1000-1239.2017.20170452
    [3]Shi Yuan, Zhang Huanguo, Wu Fusheng. A Method of Constructing the Model of Trusted Virtual Machine Migration[J]. Journal of Computer Research and Development, 2017, 54(10): 2284-2295. DOI: 10.7544/issn1000-1239.2017.20170465
    [4]Luo Yang, Xia Chunhe, Li Yazhuo, Wei Zhao, Liang Xiaoyan. A Polymorphic Shellcode Detection Method Based on Dual-Mode Virtual Machine[J]. Journal of Computer Research and Development, 2014, 51(8): 1704-1714. DOI: 10.7544/issn1000-1239.2014.20121149
    [5]Cai Wanwei, Tai Yunfang, Liu Qi, Zhang Ge. Memory Virtulization on MIPS Architecture[J]. Journal of Computer Research and Development, 2013, 50(10): 2247-2252.
    [6]Zhang Xiang, Huo Zhigang, Ma Jie, Meng Dan. Fast and Live Whole-System Migration of Virtual Machines[J]. Journal of Computer Research and Development, 2012, 49(3): 661-668.
    [7]Wang Kai, Hou Zifeng. A Relaxed Co-Scheduling Method of Virtual CPUs on Xen Virtual Machines[J]. Journal of Computer Research and Development, 2012, 49(1): 118-127.
    [8]Wang Kai, Hou Zifeng. An Adaptive Scheduling Method of Weight Parameter Adjustment on Virtual Machines[J]. Journal of Computer Research and Development, 2011, 48(11): 2094-2102.
    [9]Jin Hai, Zhong Alin, Wu Song, and Shi Xuanhua. Virtual Machine VCPU Scheduling in the Multi-core Environment:Issues and Challenges[J]. Journal of Computer Research and Development, 2011, 48(7): 1216-1224.
    [10]Chen Hui, Chen Yiyun, Wu Ping, and Xiang Sen. A Typed Low-Level Language Used in Java Virtual Machine[J]. Journal of Computer Research and Development, 2006, 43(1): 15-22.
  • Cited by

    Periodical cited type(4)

    1. 崔建群 ,晏晖然 ,常亚楠 ,高梦楠 ,马致远 . 融合协同过滤和相遇概率预测的DTN路由算法. 小型微型计算机系统. 2025(03): 735-743 .
    2. 王新科,高瑞敏. 基于DTN路由的多通路精准灌溉系统布局设计. 农机化研究. 2024(07): 141-145 .
    3. 陈启航,马大玮,张世伟,肖玲娜,李成俊. 一种基于地理位置信息的机会网络路由. 通信技术. 2022(08): 1020-1025 .
    4. 涂芳,曾铭,邓左祥. 车联网ABC及研究综述. 科技视界. 2022(28): 1-4 .

    Other cited types(1)

Catalog

    Article views (695) PDF downloads (560) Cited by(5)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return