• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin. A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290. DOI: 10.7544/issn1000-1239.2021.20200751
Citation: Liu Feng, Yang Jie, Li Zhibin, Qi Jiayin. A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain[J]. Journal of Computer Research and Development, 2021, 58(2): 281-290. DOI: 10.7544/issn1000-1239.2021.20200751

A Secure Multi-Party Computation Protocol for Universal Data Privacy Protection Based on Blockchain

Funds: This work was supported by the National Key Research and Development Program of China (2017YFB0803304) and the National Natural Science Foundation of China (72042004).
More Information
  • Published Date: January 31, 2021
  • Recent years, how to protect user privacy data on the blockchain reasonably and efficiently is a key issue in the current blockchain technology field. Based on this, in this paper, a secure multi-party computation protocol is designed based on the Pedersen commitment and Schnorr protocol (protocol of blockchain based on Pedersen commitment linked schnorr protocol for multi-party computation, BPLSM). Through constructing the structure of the protocol and carrying out formal proof calculations, it is confirmed that the protocol can be integrated into the blockchain network to merge different private messages for efficient signing under anonymity. In addition, by analyzing the nature and security of the protocol, it can be proved that the overhead about computation of the general-purpose privacy computing scheme using the BPLSM protocol on the blockchain is low, and it also has strong information imperceptibility. In the end, experimental simulation results show that the time cost of BPLSM protocol verification in a small-scale multi-party transaction with a fixed number of people is about 83.5% lower than that of the current mainstream BLS signature.
  • Related Articles

    [1]An Haoyang, He Debiao, Bao Zijian, Peng Cong, Luo Min. Ring Signature Based on the SM9 Digital Signature And Its Application in Blockchain Privacy Protection[J]. Journal of Computer Research and Development, 2023, 60(11): 2545-2554. DOI: 10.7544/issn1000-1239.202330265
    [2]Peng Cong, Luo Min, He Debiao, Huang Xinyi. Adaptor Signature Scheme Based on the SM2 Digital Signature Algorithm[J]. Journal of Computer Research and Development, 2021, 58(10): 2278-2286. DOI: 10.7544/issn1000-1239.2021.20210645
    [3]Xie Jia, Hu Yupu, Jiang Mingming. Lattice-Based Forward Secure Proxy Signatures[J]. Journal of Computer Research and Development, 2021, 58(3): 583-597. DOI: 10.7544/issn1000-1239.2021.20200321
    [4]Ma Jinhua, Liu Jianghua, Wu Wei, Huang Xinyi. Survey on Redactable Signatures[J]. Journal of Computer Research and Development, 2017, 54(10): 2144-2152. DOI: 10.7544/issn1000-1239.2017.20170646
    [5]Chen Hu, Zhu Changjie, Song Rushun. Efficient Certificateless Signature and Group Signature Schemes[J]. Journal of Computer Research and Development, 2010, 47(2): 231-237.
    [6]Li Huixian, Cai Wandong, Pang Liaojun. A Secure Dynamic Threshold Signature Scheme[J]. Journal of Computer Research and Development, 2007, 44(9): 1545-1549.
    [7]Li Rupeng, Yu Jia, Li Guowen, Li Daxing. Forward Secure Group Signature Schemes with Efficient Revocation[J]. Journal of Computer Research and Development, 2007, 44(7): 1219-1226.
    [8]Zhong Jun and He Dake. A Kind of Group Signature Scheme with Authorization[J]. Journal of Computer Research and Development, 2007, 44(5): 748-755.
    [9]Li Yunfa, Zou Deqing, Han Zongfen, and Qiang Weizhong. Research on Group Signature Scheme with Forward Security[J]. Journal of Computer Research and Development, 2006, 43(12): 2069-2075.
    [10]Lü Xin, Feng Dengguo. Founding Computationally Secure Quantum Cryptography Protocols Based on Bit Commitment[J]. Journal of Computer Research and Development, 2005, 42(11): 1918-1923.
  • Cited by

    Periodical cited type(35)

    1. 余庚,刘登志. 面向物联网的多类型数据聚合隐私保护方案. 物联网技术. 2025(04): 58-60+63 .
    2. 邵俊. 基于区块链的输电线路数据安全存储与防篡改模型. 电工技术. 2025(01): 73-78 .
    3. 汤宇为. 基于零信任安全模型的轨道交通数据隐私保护. 电子设计工程. 2024(01): 187-190+195 .
    4. 朱郭诚,何德彪,安浩杨,彭聪. 基于区块链和SM9数字签名的代理投票方案. 信息网络安全. 2024(01): 36-47 .
    5. 孙志娟. 深度学习视域下高校教师研究型教学模式研究. 金融理论与教学. 2024(01): 89-95 .
    6. 罗焱,何梦颖. 基于跨域认证协议的区块链数据同态加密仿真. 计算机仿真. 2024(03): 426-430 .
    7. 赵成国,张岩杰,王军. 4PL供应链融资体系多方安全隐私计算的信息共享机制研究. 经济师. 2024(05): 7-10 .
    8. 全斌. 基于Docker容器的航天网络隐私数据安全防护控制研究. 计算机测量与控制. 2024(05): 201-207+214 .
    9. 樊凯,周自横,袁望凇,纪世元. 基于区块链的安全多方计算研究现状与展望. 信息对抗技术. 2024(03): 41-62 .
    10. 李凤岐,宋晴晴,徐辉,杜学峰,高嘉隆,佟宁,王德广. 面向工业物联网的区块链高效拜占庭容错共识算法. 通信学报. 2024(05): 165-177 .
    11. 李鸣,宋文鹏,宗燕,刘冕宸. 基于区块链的元宇宙生态体系架构. 计算机研究与发展. 2024(09): 2364-2383 . 本站查看
    12. 霍如,王志浩,邵子豪,黄韬. 面向空间信息网络的免配对无证书链上接入认证方法. 通信学报. 2024(08): 136-148 .
    13. 王旭峰,王慧泉,简炬华,陈能放. 基于近似匹配模型的电网数据隐私防护建模研究. 自动化技术与应用. 2024(10): 144-147 .
    14. 戚力彦,汤国龙,汪洋,王萍. 基于可信身份检索的电力物联网数据隐私保护方法研究. 电子设计工程. 2024(23): 61-65 .
    15. 洪朝群,张锴,张伟霖,罗进开,张珂杰. 基于区块链的差分隐私机制在公共数据要素化中的应用. 海峡科学. 2024(10): 95-104 .
    16. 陈艳杰,曹威,郝胜华,陈磊. 量化节点信息熵下涉密工业网安全防护研究. 计算机仿真. 2023(01): 423-427 .
    17. 杨瑞仙,李兴芳,王栋,臧国全. 隐私计算的溯源、现状及展望. 情报理论与实践. 2023(07): 158-167 .
    18. 李莉,李涛,杜慧娜. 适用于区块链溯源场景的门限签名方案. 计算机工程与设计. 2023(09): 2586-2592 .
    19. 汪垚. 区块链技术在软件定义物联网安全中的应用探析. 科技资讯. 2023(22): 13-17 .
    20. 郭彩彩,金瑜. CASESC:基于以太坊智能合约的云审计方案. 计算机科学. 2023(12): 368-376 .
    21. 刘忻,王家寅,杨浩睿,张瑞生. 一种基于区块链和secGear框架的车联网认证协议. 信息网络安全. 2022(01): 27-36 .
    22. 王延昭,唐华云,黄烁,马凯迪. 债券市场基础设施数字化转型探索. 武汉金融. 2022(03): 53-59 .
    23. 张帅,项伟. 基于区块链对溯源数据的多方共享系统. 计算机系统应用. 2022(06): 394-399 .
    24. 祝毅鸣. 群智感知环境下基于节点分类的数据隐私保护增强机制研究. 长江信息通信. 2022(07): 47-49 .
    25. 刘炜,唐琮轲,马杰,刘宇昭,田钊,佘维. 区块链在隐私计算中的应用研究进展. 郑州大学学报(理学版). 2022(06): 12-23 .
    26. 宋晓玲,刘勇,董景楠,黄勇飞. 元宇宙中区块链的应用与展望. 网络与信息安全学报. 2022(04): 45-65 .
    27. 章迪平,赵婷. 区块链创新环境空间关联及影响因素研究. 浙江科技学院学报. 2022(04): 285-296 .
    28. 陆丽娜,尹丽红,于啸,尹居峰,尚士杰. 基于区块链的农业科学数据管理场景模型构建研究. 情报科学. 2022(09): 20-25+37 .
    29. 王延昭,范皓,唐华云,李荣,赵栓. 数字债券长期演进体系构想. 武汉金融. 2022(10): 79-88 .
    30. 张慧茹,汪美荃,李光顺. 区块链安全与隐私保护前沿技术发展现状. 信息技术与网络安全. 2021(05): 7-12 .
    31. 刘悦. 安全与隐私保护研究综述. 电子技术与软件工程. 2021(09): 259-260 .
    32. 胡志达. 大数据平台数据的安全管理体系架构设计. 江苏科技信息. 2021(13): 25-28 .
    33. 段新华. 基于同态加密的区块链交易数据隐私保护系统设计. 信息与电脑(理论版). 2021(13): 68-70 .
    34. 易治军. 基于多方安全计算技术的消费者金融信息保护研究. 黑龙江金融. 2021(09): 75-77 .
    35. 蒋凯元. 多方安全计算研究综述. 信息安全研究. 2021(12): 1161-1165 .

    Other cited types(20)

Catalog

    Article views (2324) PDF downloads (1259) Cited by(55)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return