Journal of Computer Applications ›› 2025, Vol. 45 ›› Issue (2): 497-505.DOI: 10.11772/j.issn.1001-9081.2024020235
• Cyber security • Previous Articles
Baoyin WANG1, Hongmei XUE1, Qilie LIU1,2, Tao GUO3(
)
Received:2024-03-05
Revised:2024-05-11
Accepted:2024-05-27
Online:2024-07-19
Published:2025-02-10
Contact:
Tao GUO
About author:WANG Baoyin, born in 1999, M. S. candidate. His research interests include blockchain, cryptography.Supported by:通讯作者:
郭涛
作者简介:王宝银(1999—),男,河北承德人,硕士研究生,主要研究方向:区块链、密码学基金资助:CLC Number:
Baoyin WANG, Hongmei XUE, Qilie LIU, Tao GUO. Privacy-preserving random consensus asset cross-chain scheme[J]. Journal of Computer Applications, 2025, 45(2): 497-505.
王宝银, 薛红梅, 刘期烈, 郭涛. 基于隐私保护的随机共识资产跨链方案[J]. 《计算机应用》唯一官方网站, 2025, 45(2): 497-505.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2024020235
| 符号 | 含义 |
|---|---|
| Sk_a | 用户Alice的私钥 |
| Pk_a | 用户Alice的公钥 |
| PK_* | 跨链目的地址 |
| Cpk | 密钥交换端服务端身份标识 |
| Csk | 密钥交换服务端私钥 |
| AY/BY | Alice与Bob的中间密钥 |
| K* | 交换后的密钥 |
| H() | 哈希映射函数 |
Tab. 1 Description of key negotiation symbols
| 符号 | 含义 |
|---|---|
| Sk_a | 用户Alice的私钥 |
| Pk_a | 用户Alice的公钥 |
| PK_* | 跨链目的地址 |
| Cpk | 密钥交换端服务端身份标识 |
| Csk | 密钥交换服务端私钥 |
| AY/BY | Alice与Bob的中间密钥 |
| K* | 交换后的密钥 |
| H() | 哈希映射函数 |
| 符号 | 含义 |
|---|---|
| Seed | 交易参数种子 |
| Pk/Prk | 公证人公钥、私钥 |
| i | 参数的层级 |
| SIGi | 公证人签名参数 |
| ri | 交易的轮数 |
| P | 公证人选取条件 |
| Ni/Ns | 待选公证人/被选中公证人 |
| CRi/CR^ | 公证人i的证明/证明集合 |
| cri | 最高优先级公证人 |
| vi/ | 对于消息vi共识后下一轮要广播的消息定义为 |
| n(vi) | 消息vi数目 |
| t | 达成共识满足n(vi)>2t+1 |
| Outi/bi | 二元输出0或1 |
| 消息 | |
| #1i(0) | 第1步公证人i收到0的数 |
Tab. 2 Description of immediate consensus symbols
| 符号 | 含义 |
|---|---|
| Seed | 交易参数种子 |
| Pk/Prk | 公证人公钥、私钥 |
| i | 参数的层级 |
| SIGi | 公证人签名参数 |
| ri | 交易的轮数 |
| P | 公证人选取条件 |
| Ni/Ns | 待选公证人/被选中公证人 |
| CRi/CR^ | 公证人i的证明/证明集合 |
| cri | 最高优先级公证人 |
| vi/ | 对于消息vi共识后下一轮要广播的消息定义为 |
| n(vi) | 消息vi数目 |
| t | 达成共识满足n(vi)>2t+1 |
| Outi/bi | 二元输出0或1 |
| 消息 | |
| #1i(0) | 第1步公证人i收到0的数 |
| 参数名称 | 参数值 |
|---|---|
| 有限域GF素数M | 74 |
| 有限域GF扩展度k | 233 |
| 基点x坐标xG | 0fac9dfcbac8313bb2139f1bb755fe f65bc391f8b36f8f8eb7371fd558b |
| 基点y坐标yG | 1006a08a41903350678e58528beb f8a0beff867a7ca36716f7e01f81052 |
| 椭圆方程系数A2 | 1 |
| 椭圆方程系数A6 | 066647ede6c332c7f8c0923bb5821 3b333b20e9ce4281fe115f7d8f90ad |
Tab. 3 Parameter configuration
| 参数名称 | 参数值 |
|---|---|
| 有限域GF素数M | 74 |
| 有限域GF扩展度k | 233 |
| 基点x坐标xG | 0fac9dfcbac8313bb2139f1bb755fe f65bc391f8b36f8f8eb7371fd558b |
| 基点y坐标yG | 1006a08a41903350678e58528beb f8a0beff867a7ca36716f7e01f81052 |
| 椭圆方程系数A2 | 1 |
| 椭圆方程系数A6 | 066647ede6c332c7f8c0923bb5821 3b333b20e9ce4281fe115f7d8f90ad |
| 方案 | 时延 | 方案 | 时延 |
|---|---|---|---|
| 文献[ | 0.522 | 文献[ | 0.145 |
| 文献[ | 1.103 | 本文方案 | 0.086 |
Tab. 4 Comparison of total delay of key exchange and key pair generation
| 方案 | 时延 | 方案 | 时延 |
|---|---|---|---|
| 文献[ | 0.522 | 文献[ | 0.145 |
| 文献[ | 1.103 | 本文方案 | 0.086 |
| 1 | HASHEMI JOO M, NISHIKAWA Y, DANDAPANI K. Cryptocurrency, a successful application of blockchain technology[J]. Managerial Finance, 2020, 46(6): 715-733. |
| 2 | SCHWIDEROWSKI J, PEDERSEN A B, BECK R. Crypto tokens and token systems[J]. Information Systems Frontiers, 2024, 26(1): 319-332. |
| 3 | LOHACHAB A, GARG S, KANG B, et al. Towards interconnected blockchains: a comprehensive review of the role of interoperability among disparate blockchains[J]. ACM Computing Surveys, 2022, 54(7): No.135. |
| 4 | DAS D, BANERJEE S, CHATTERJEE P, et al. Blockchain for intelligent transportation systems: applications, challenges, and opportunities[J]. IEEE Internet of Things Journal, 2023, 10(21): 18961-18970. |
| 5 | 毕红亮,陈艳姣,伊心静,等. 基于博弈的加密货币交易市场用户决策优化分析[J]. 软件学报, 2023, 34(12):5477-5500. |
| BI H L, CHEN Y J, YI X J, et al. Game-based optimization analysis of cryptocurrency trading market[J]. Journal of Software, 2023, 34(12): 5477-5500. | |
| 6 | 蔡维德,王荣,何娟,等. 分布式数字资产交易平台的问题与评估[J]. 软件学报, 2022, 33(2):410-433. |
| TSAI W T, WANG R, HE J, et al. Decentralized digital asset exchanges: issues and evaluation[J]. Journal of Software, 2022, 33(2):410-433. | |
| 7 | CAI J, ZHOU Y, HU T, et al. PTLC: protect the identity privacy during cross-chain asset transaction more effectively[C]// Proceedings of the IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion. Piscataway: IEEE, 2022: 70-78. |
| 8 | HARISH A R, LIU X L, LI M, et al. Blockchain-enabled digital assets tokenization for cyber-physical traceability in E-commerce logistics financing[J]. Computers in Industry, 2023, 150: No.103956. |
| 9 | Beosin. Q3 2022 global blockchain ecological security report[R]. HongKong: Beosin, 2022. |
| 10 | Analytica Oxford. Poly Network attack underlines growing DeFi risks[EB/OL]. [2023-11-10].. |
| 11 | DIFFIE W, HELLMAN M. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6):644-654. |
| 12 | LU S, PEI J, ZHAO R, et al. CCIO: a cross-chain interoperability approach for consortium blockchains based on oracle[J]. Sensors, 2023, 23(4): No.1864. |
| 13 | WU T Y, LEE Z, YANG L, et al. Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks[J]. The Journal of Supercomputing, 2021, 77: 6992-7020. |
| 14 | JIANG J, ZHANG Y, ZHU Y, et al. DCIV: decentralized cross-chain data integrity verification with blockchain[J]. Journal of King Saud University — Computer and Information Sciences, 2022, 34(10 Pt A): 7988-7999. |
| 15 | MA Z, WANG J, GAI K, et al. Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network[J]. Journal of Systems Architecture, 2023, 134: No.102782. |
| 16 | 孙国梓,万明发,王钰,等. 区块链交易隐私保护技术研究进展[J]. 南京邮电大学学报(自然科学版), 2024, 44(4):30-43. |
| SUN G Z, WAN M F, WANG Y, et al. A survey on privacy protection technology for blockchain transactions[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), 2024, 44(4):30-43. | |
| 17 | BAGHBANIJAM S, SANAEI H, FARAJZADEH M. An improved authentication & key exchange protocol based on ECDH for WSNs[C]// Proceedings of the 30th International Conference on Electrical Engineering. Piscataway: IEEE, 2022: 563-569. |
| 18 | XIONG A, LIU G, ZHU Q, et al. A notary group-based cross-chain mechanism[J]. Digital Communications and Networks, 2022, 8(6): 1059-1067. |
| 19 | YIN Z, ZHANG B, XU J, et al. Bool Network: an open, distributed, secure cross-chain notary platform[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 3465-3478. |
| 20 | YI H. A post-quantum blockchain notary scheme for cross-blockchain exchange[J]. Computers and Electrical Engineering, 2023, 110: No.108832. |
| 21 | REN Y, LV Z, XIONG N N, et al. HCNCT: a cross-chain interaction scheme for the blockchain-based Metaverse[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2024, 20(7): No.188. |
| 22 | BENSEBA K. Permutation polynomials over finite fields and their application to cryptography[D/OL]. [2024-01-10].. |
| 23 | 韦鹏程,杨华千,黄思行,等. 混沌伪随机序列及其应用研究[M]. 北京:科学出版社, 2019:111-117. |
| WEI P C, YANG H Q, HUANG S X, et al. Research on chaotic pseudo-random sequences and their applications[M]. Beijing: Science Press, 2019: 111-117. | |
| 24 | DEVAL V, DWIVEDI V K, DIXIT A, et al. Mobile smart contracts: exploring scalability challenges and consensus mechanisms[J]. IEEE Access, 2024, 12: 34265-34288. |
| 25 | ITALIS O, PIERRE S, QUINTERO A. Privacy-preserving model for biometric-based authentication and key derivation function[J]. Journal of Information Security and Applications, 2023, 78: No.103624. |
| 26 | DUAN L, SUN Y, NI W, et al. Attacks against cross-chain systems and defense approaches: a contemporary survey[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(8): 1647-1667. |
| 27 | YU B, FENG L, ZHU H, et al. MeHLDT: a multielement hash lock data transfer mechanism for on-chain and off-chain[J]. Peer-to-Peer Networking and Applications, 2023, 16(4): 1927-1943. |
| 28 | YUAN H, FEI S, YAN Z. Technologies of blockchain interoperability: a survey[J]. Digital Communications and Networks, 2023(In Press): No.008. |
| 29 | 臧文洋,吕进来. 基于门限签名的时间轮换公证人组模型研究[J]. 计算机科学, 2024, 51(8):403-411. |
| ZANG W Y, LYU J L. Study on time rotation notary group model based on threshold signature[J]. Computer Science, 2024, 51(8):403-411. |
| [1] | Xuebin CHEN, Zhiqiang REN, Hongyang ZHANG. Review on security threats and defense measures in federated learning [J]. Journal of Computer Applications, 2024, 44(6): 1663-1672. |
| [2] | Peiqian LIU, Shuilian WANG, Zihao SHEN, Hui WANG. Location privacy protection algorithm based on trajectory perturbation and road network matching [J]. Journal of Computer Applications, 2024, 44(5): 1546-1554. |
| [3] | Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding [J]. Journal of Computer Applications, 2024, 44(3): 811-818. |
| [4] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. |
| [5] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
| [6] | Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Traceability storage model of charity system oriented to master-slave chain [J]. Journal of Computer Applications, 2024, 44(12): 3751-3758. |
| [7] | Peng FANG, Fan ZHAO, Baoquan WANG, Yi WANG, Tonghai JIANG. Development, technologies and applications of blockchain 3.0 [J]. Journal of Computer Applications, 2024, 44(12): 3647-3657. |
| [8] | Yifan WANG, Shaofu LIN, Yunjiang LI. Highway free-flow tolling method based on blockchain and zero-knowledge proof [J]. Journal of Computer Applications, 2024, 44(12): 3741-3750. |
| [9] | Rui GAO, Xuebin CHEN, Zucuan ZHANG. Dynamic social network privacy publishing method for partial graph updating [J]. Journal of Computer Applications, 2024, 44(12): 3831-3838. |
| [10] | Miao JIA, Zhongyuan YAO, Weihua ZHU, Tingting GAO, Xueming SI, Xiang DENG. Progress and prospect of zero-knowledge proof enabling blockchain [J]. Journal of Computer Applications, 2024, 44(12): 3669-3677. |
| [11] | Xuebin CHEN, Changsheng QU. Overview of backdoor attacks and defense in federated learning [J]. Journal of Computer Applications, 2024, 44(11): 3459-3469. |
| [12] | Hui ZHOU, Yuling CHEN, Xuewei WANG, Yangwen ZHANG, Jianjiang HE. Deep shadow defense scheme of federated learning based on generative adversarial network [J]. Journal of Computer Applications, 2024, 44(1): 223-232. |
| [13] | Shuo HUANG, Yanhui LI, Jianqiu CAO. PrivSPM: frequent sequential pattern mining algorithm under local differential privacy [J]. Journal of Computer Applications, 2023, 43(7): 2057-2064. |
| [14] | Ran ZHAI, Xuebin CHEN, Guopeng ZHANG, Langtao PEI, Zheng MA. Improved K-anonymity privacy protection algorithm based on different sensitivities [J]. Journal of Computer Applications, 2023, 43(5): 1497-1503. |
| [15] | Chunyong YIN, Rui QU. Federated learning algorithm based on personalized differential privacy [J]. Journal of Computer Applications, 2023, 43(4): 1160-1168. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||