Journal of Computer Applications ›› 2025, Vol. 45 ›› Issue (5): 1564-1572.DOI: 10.11772/j.issn.1001-9081.2024050607
• Cyber security • Previous Articles
Gaimei GAO1, Miaolian DU1(), Chunxia LIU1, Yuli YANG2, Weichao DANG1, Guoxia DI1
Received:
2024-05-14
Revised:
2024-08-07
Accepted:
2024-08-30
Online:
2024-09-04
Published:
2025-05-10
Contact:
Miaolian DU
About author:
GAO Gaimei, born in 1978, Ph. D., associate professor. Her research interests include blockchain, network security, cryptography.Supported by:
高改梅1, 杜苗莲1(), 刘春霞1, 杨玉丽2, 党伟超1, 邸国霞1
通讯作者:
杜苗莲
作者简介:
高改梅(1978—),女,山西吕梁人,副教授,博士,CCF会员,主要研究方向:区块链、网络安全、密码学基金资助:
CLC Number:
Gaimei GAO, Miaolian DU, Chunxia LIU, Yuli YANG, Weichao DANG, Guoxia DI. Privacy protection method for consortium blockchain based on SM2 linkable ring signature[J]. Journal of Computer Applications, 2025, 45(5): 1564-1572.
高改梅, 杜苗莲, 刘春霞, 杨玉丽, 党伟超, 邸国霞. 基于SM2可链接环签名的联盟链隐私保护方法[J]. 《计算机应用》唯一官方网站, 2025, 45(5): 1564-1572.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2024050607
符号 | 含义 |
---|---|
加法循环群 | |
安全参数 | |
有限域 | |
安全哈希函数 | |
订单编号 | |
交易金额明文 | |
消息 | |
环公钥集合 | |
使用Paillier同态加密 | |
使用SM2数字签名算法进行签名 | |
交易双方交易金额相等的零知识证明证据 | |
交易金额大于零的零知识证明证据 | |
TO交易余额大于零的零知识证明证据 | |
链接标签 | |
SM2LRS签名 |
Tab. 1 Symbols and their meanings
符号 | 含义 |
---|---|
加法循环群 | |
安全参数 | |
有限域 | |
安全哈希函数 | |
订单编号 | |
交易金额明文 | |
消息 | |
环公钥集合 | |
使用Paillier同态加密 | |
使用SM2数字签名算法进行签名 | |
交易双方交易金额相等的零知识证明证据 | |
交易金额大于零的零知识证明证据 | |
TO交易余额大于零的零知识证明证据 | |
链接标签 | |
SM2LRS签名 |
方案 | Sign | Verify | Confirm |
---|---|---|---|
CARS[ | |||
AAST-CARS[ | |||
CALRS[ | |||
PPMCB-SM2LRS |
Tab. 2 Comparison of computational overhead of four schemes
方案 | Sign | Verify | Confirm |
---|---|---|---|
CARS[ | |||
AAST-CARS[ | |||
CALRS[ | |||
PPMCB-SM2LRS |
配置 | 参数 |
---|---|
处理器 | Intel Core i7-7700HQ@2.80 GHz |
内存 | 8 GB |
操作系统 | Ubuntu 16.04 |
IDE | Visual Studio Code 1.87.2 |
编程语言 | Golang 1.13.6 |
Docker | Version 20.10.11 |
FISCO BCOS | Version 2.9.0 |
Tab. 3 Experimental environment
配置 | 参数 |
---|---|
处理器 | Intel Core i7-7700HQ@2.80 GHz |
内存 | 8 GB |
操作系统 | Ubuntu 16.04 |
IDE | Visual Studio Code 1.87.2 |
编程语言 | Golang 1.13.6 |
Docker | Version 20.10.11 |
FISCO BCOS | Version 2.9.0 |
方案 | 交易金额 隐私保护 | 身份隐私保护 | 可追溯性 | 数据模型 | 应用 范围 |
---|---|---|---|---|---|
文献[ | 是 | 否 | 是 | 账户模型 | 联盟链 |
文献[ | 否 | 是 | 是 | UTXO | 联盟链 |
文献[ | 是 | 否 | 是 | 账户模型 | 联盟链 |
文献[ | 是 | 是 | 否 | UTXO | 联盟链 |
文献[ | 否 | 是 | 是 | UTXO | 公有链 |
本文方案 | 是 | 是 | 是 | 账户模型 | 联盟链 |
Tab. 4 Comparison of functional characteristics of different schemes
方案 | 交易金额 隐私保护 | 身份隐私保护 | 可追溯性 | 数据模型 | 应用 范围 |
---|---|---|---|---|---|
文献[ | 是 | 否 | 是 | 账户模型 | 联盟链 |
文献[ | 否 | 是 | 是 | UTXO | 联盟链 |
文献[ | 是 | 否 | 是 | 账户模型 | 联盟链 |
文献[ | 是 | 是 | 否 | UTXO | 联盟链 |
文献[ | 否 | 是 | 是 | UTXO | 公有链 |
本文方案 | 是 | 是 | 是 | 账户模型 | 联盟链 |
1 | BELOTTI M, BOŽIĆ N, PUJOLLE G, et al. A vademecum on blockchain technologies: when, which, and how[J]. IEEE Communications Surveys and Tutorials, 2019, 21(4): 3796-3838. |
2 | 邵奇峰,金澈清,张召,等.区块链技术:架构及进展[J].计算机学报,2018,41(5):969-988. |
SHAO Q F, JIN C Q, ZHANG Z, et al. Blockchain technology: architecture and research progress[J]. Chinese Journal of Computers, 2018, 41(5): 969-988. | |
3 | 孙爽,唐华云,丁旋,等.面向联盟链的隐私保护技术综述[J].重庆邮电大学学报(自然科学版),2024,36(1): 9-19. |
SUN S, TANG H Y, DING X, et al. Overview of privacy protection technology for consortium blockchain[J]. Journal of Chongqing University of Posts and Telecommunications (Natural Science Edition), 2024, 36(1): 9-19. | |
4 | LIU J K, WEI V K, WONG D S. Linkable spontaneous anonymous group signature for ad hoc groups[C]// Proceedings of the 9th Australasian Conference on Information Security and Privacy, LNCS 3108. Berlin: Springer, 2004: 325-335. |
5 | LIU X, ZHANG M, ZHENG Y, et al. A linkable ring signature electronic cash scheme based on blockchain[C]// Proceedings of the 2020 3rd International Conference on Smart BlockChain (SmartBlock). Piscataway: IEEE, 2020: 1-4. |
6 | RUSSO A, ANTA A F, VASCO M I G, et al. Chirotonia: a scalable and secure e-voting framework based on blockchains and linkable ring signatures[C]// Proceedings of the 2021 IEEE International Conference on Blockchain (Blockchain). Piscataway: IEEE, 2021: 417-424. |
7 | JIANG Z L, PAN Y, FAN M, et al. Local energy trading platform based on privacy-preserving blockchain with linkable ring signature[C]// Proceedings of the 2022 4th International Conference on Data Intelligence and Security. Piscataway: IEEE, 2022: 134-141. |
8 | 李龚亮,贺东博,郭兵,等.基于零知识证明的区块链隐私保护算法[J].华中科技大学学报(自然科学版),2020,48(7):112-116. |
LI G L, HE D B, GUO B, et al. Blockchain privacy protection algorithm based on zero-knowledge proof[J]. Journal of Huazhong University of Science and Technology (Natural Science Edition), 2020, 48(7): 112-116. | |
9 | 张学旺,黎志鸿,林金朝.基于公平盲签名和分级加密的联盟链隐私保护方案[J].通信学报,2022,43(8):131-141. |
ZHANG X W, LI Z H, LIN J Z. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain[J]. Journal on Communications, 2022, 43(8): 131-141. | |
10 | RAN L, PENG C, XU D, et al. Blockchain privacy disclosure risk assessment scheme based on improved Paillier algorithm[C]// Proceedings of the 2022 IEEE 24th International Conference on High Performance Computing & Communications; 8th International Conference on Data Science & Systems; 20th International Conference on Smart City; 8th International Conference on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys). Piscataway: IEEE, 2022: 1881-1887. |
11 | ZHANG X, YE C. A novel privacy protection of permissioned blockchains with conditionally anonymous ring signature[J]. Cluster Computing, 2022, 25(2): 1221-1235. |
12 | JIANG Y, HE M, ZHANG X, et al. Blockchain-based anonymous authentication mechanism with semi-TTP for VANETs[C]// Proceedings of the 2021 IEEE 6th International Conference on Cloud Computing and Big Data Analytics. Piscataway: IEEE, 2021: 657-666. |
13 | ZHOU Q, ZHENG Y L, CHEN M H, et al. A conditionally anonymous linkable ring signature for blockchain privacy protection [J]. Computer Systems Science and Engineering, 2023, 47(3): 2851-2867. |
14 | 范青,何德彪,罗敏,等.基于SM2数字签名算法的环签名方案[J].密码学报,2021,8(4):710-723. |
FAN Q, HE D B, LUO M, et al. A ring signature scheme based on SM2 digital signature algorithm[J]. Journal of Cryptologic Research, 2021,8(4): 710-723. | |
15 | 冯琦,何德彪,罗敏,等.移动互联网环境下轻量级SM2两方协同签名[J].计算机研究与发展,2020,57(10):2136-2146. |
FENG Q, HE D B, LUO M, et al. Efficient two-party SM2 signing protocol for mobile internet[J]. Journal of Computer Research and Development, 2020,57(10): 2136-2146. | |
16 | ZHANG Y, WANG Q, LU N, et al. Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the evidence-storage system[C]// Proceedings of the 2022 International Conference on Blockchain and Trustworthy Systems, CCIS 1679. Singapore: Springer, 2022: 122-133. |
17 | 刁一晴,叶阿勇,张娇美,等.基于群签名和同态加密的联盟链双重隐私保护方法[J].计算机研究与发展,2022,59(1):172-181. |
DIAO Y Q, YE A Y, ZHANG J M, et al. A dual privacy protection method based on group signature and homomorphic encryption for alliance blockchain [J]. Journal of Computer Research and Development 2022, 59(1): 172-181. | |
18 | 伍前红,张键红,王育民.简单证明一个承诺值在特定区间内[J].电子学报,2004,32(7):1071-1073. |
WU Q H, ZHANG J H, WANG Y M. Simple proof that a committed number is in a specific interval [J]. Acta Electronica Sinica, 2004, 32(7): 1071-1073. | |
19 | 张奥,白晓颖.区块链隐私保护研究与实践综述[J].软件学报,2020,31(5):1406-1434. |
ZHANG A, BAI X Y. Survey of research and practices on blockchain privacy protection[J]. Journal of Software, 2020, 31(5): 1406-1434. | |
20 | 杨亚涛,蔡居良,张筱薇,等.基于SM9算法可证明安全的区块链隐私保护方案[J].软件学报,2019,30(6):1692-1704. |
YANG Y T, CAI J L, ZHANG X W, et al. Privacy preserving scheme in block chain with provably secure based on the SM9 algorithm [J]. Journal of Software, 2019, 30(6): 1692-1704.. | |
21 | 张小艳,李秦伟,付福杰.基于数字承诺的区块链交易金额保密验证方法[J].计算机科学,2021,48(9):324-329. |
ZHANG X Y, LI Q W, FU F J. Secret verification method of blockchain transaction amount based on digital commitment [J]. Computer Science, 2021, 48(9): 324-329. | |
22 | 霍鑫磊,龙宇,谷大武.一种基于联盟链的兼具授权监管与隐私保护方案[J].小型微型计算机系统,2023,44(3):589-595. |
HUO X L, LONG Y, GU D W. Privacy protection and authorization supervision scheme based on consortium chain[J]. Journal of Chinese Computer Systems, 2023, 44(3): 589-595. | |
23 | 宋靖文,张大伟,韩旭,等.区块链中可监管的身份隐私保护方案[J].软件学报,2023,34(7):3292-3312. |
SONG J W, ZHANG D W, HAN X, et al. Supervised identity privacy protection scheme in blockchain [J]. Journal of Software, 2023, 34(7): 3292-3312. |
[1] | Xinyan WANG, Jiacheng DU, Lihong ZHONG, Wangwang XU, Boyu LIU, Wei SHE. Vertical federated learning enterprise emission prediction model with integration of electricity data [J]. Journal of Computer Applications, 2025, 45(2): 518-525. |
[2] | Baoyin WANG, Hongmei XUE, Qilie LIU, Tao GUO. Privacy-preserving random consensus asset cross-chain scheme [J]. Journal of Computer Applications, 2025, 45(2): 497-505. |
[3] | Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG. Consortium blockchain modification method based on chameleon hash and verifiable secret sharing [J]. Journal of Computer Applications, 2024, 44(7): 2087-2092. |
[4] | Xuebin CHEN, Zhiqiang REN, Hongyang ZHANG. Review on security threats and defense measures in federated learning [J]. Journal of Computer Applications, 2024, 44(6): 1663-1672. |
[5] | Peiqian LIU, Shuilian WANG, Zihao SHEN, Hui WANG. Location privacy protection algorithm based on trajectory perturbation and road network matching [J]. Journal of Computer Applications, 2024, 44(5): 1546-1554. |
[6] | Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding [J]. Journal of Computer Applications, 2024, 44(3): 811-818. |
[7] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. |
[8] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[9] | Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Traceability storage model of charity system oriented to master-slave chain [J]. Journal of Computer Applications, 2024, 44(12): 3751-3758. |
[10] | Rui GAO, Xuebin CHEN, Zucuan ZHANG. Dynamic social network privacy publishing method for partial graph updating [J]. Journal of Computer Applications, 2024, 44(12): 3831-3838. |
[11] | Miao JIA, Zhongyuan YAO, Weihua ZHU, Tingting GAO, Xueming SI, Xiang DENG. Progress and prospect of zero-knowledge proof enabling blockchain [J]. Journal of Computer Applications, 2024, 44(12): 3669-3677. |
[12] | Peng FANG, Fan ZHAO, Baoquan WANG, Yi WANG, Tonghai JIANG. Development, technologies and applications of blockchain 3.0 [J]. Journal of Computer Applications, 2024, 44(12): 3647-3657. |
[13] | Yifan WANG, Shaofu LIN, Yunjiang LI. Highway free-flow tolling method based on blockchain and zero-knowledge proof [J]. Journal of Computer Applications, 2024, 44(12): 3741-3750. |
[14] | Xuebin CHEN, Changsheng QU. Overview of backdoor attacks and defense in federated learning [J]. Journal of Computer Applications, 2024, 44(11): 3459-3469. |
[15] | Chaoying YAN, Ziyi ZHANG, Yingnan QU, Qiuyu LI, Dixiang ZHENG, Lijun SUN. Double auction carbon trading based on consortium blockchain [J]. Journal of Computer Applications, 2024, 44(10): 3240-3245. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||