Journal of Computer Applications ›› 2025, Vol. 45 ›› Issue (2): 497-505.DOI: 10.11772/j.issn.1001-9081.2024020235
• Cyber security • Previous Articles
Baoyin WANG1, Hongmei XUE1, Qilie LIU1,2, Tao GUO3()
Received:
2024-03-05
Revised:
2024-05-11
Accepted:
2024-05-27
Online:
2024-07-19
Published:
2025-02-10
Contact:
Tao GUO
About author:
WANG Baoyin, born in 1999, M. S. candidate. His research interests include blockchain, cryptography.Supported by:
通讯作者:
郭涛
作者简介:
王宝银(1999—),男,河北承德人,硕士研究生,主要研究方向:区块链、密码学基金资助:
CLC Number:
Baoyin WANG, Hongmei XUE, Qilie LIU, Tao GUO. Privacy-preserving random consensus asset cross-chain scheme[J]. Journal of Computer Applications, 2025, 45(2): 497-505.
王宝银, 薛红梅, 刘期烈, 郭涛. 基于隐私保护的随机共识资产跨链方案[J]. 《计算机应用》唯一官方网站, 2025, 45(2): 497-505.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2024020235
符号 | 含义 |
---|---|
Sk_a | 用户Alice的私钥 |
Pk_a | 用户Alice的公钥 |
PK_* | 跨链目的地址 |
Cpk | 密钥交换端服务端身份标识 |
Csk | 密钥交换服务端私钥 |
AY/BY | Alice与Bob的中间密钥 |
K* | 交换后的密钥 |
H() | 哈希映射函数 |
Tab. 1 Description of key negotiation symbols
符号 | 含义 |
---|---|
Sk_a | 用户Alice的私钥 |
Pk_a | 用户Alice的公钥 |
PK_* | 跨链目的地址 |
Cpk | 密钥交换端服务端身份标识 |
Csk | 密钥交换服务端私钥 |
AY/BY | Alice与Bob的中间密钥 |
K* | 交换后的密钥 |
H() | 哈希映射函数 |
符号 | 含义 |
---|---|
Seed | 交易参数种子 |
Pk/Prk | 公证人公钥、私钥 |
i | 参数的层级 |
SIGi | 公证人签名参数 |
ri | 交易的轮数 |
P | 公证人选取条件 |
Ni/Ns | 待选公证人/被选中公证人 |
CRi/CR^ | 公证人i的证明/证明集合 |
cri | 最高优先级公证人 |
vi/ | 对于消息vi共识后下一轮要广播的消息定义为 |
n(vi) | 消息vi数目 |
t | 达成共识满足n(vi)>2t+1 |
Outi/bi | 二元输出0或1 |
消息 | |
#1i(0) | 第1步公证人i收到0的数 |
Tab. 2 Description of immediate consensus symbols
符号 | 含义 |
---|---|
Seed | 交易参数种子 |
Pk/Prk | 公证人公钥、私钥 |
i | 参数的层级 |
SIGi | 公证人签名参数 |
ri | 交易的轮数 |
P | 公证人选取条件 |
Ni/Ns | 待选公证人/被选中公证人 |
CRi/CR^ | 公证人i的证明/证明集合 |
cri | 最高优先级公证人 |
vi/ | 对于消息vi共识后下一轮要广播的消息定义为 |
n(vi) | 消息vi数目 |
t | 达成共识满足n(vi)>2t+1 |
Outi/bi | 二元输出0或1 |
消息 | |
#1i(0) | 第1步公证人i收到0的数 |
参数名称 | 参数值 |
---|---|
有限域GF素数M | 74 |
有限域GF扩展度k | 233 |
基点x坐标xG | 0fac9dfcbac8313bb2139f1bb755fe f65bc391f8b36f8f8eb7371fd558b |
基点y坐标yG | 1006a08a41903350678e58528beb f8a0beff867a7ca36716f7e01f81052 |
椭圆方程系数A2 | 1 |
椭圆方程系数A6 | 066647ede6c332c7f8c0923bb5821 3b333b20e9ce4281fe115f7d8f90ad |
Tab. 3 Parameter configuration
参数名称 | 参数值 |
---|---|
有限域GF素数M | 74 |
有限域GF扩展度k | 233 |
基点x坐标xG | 0fac9dfcbac8313bb2139f1bb755fe f65bc391f8b36f8f8eb7371fd558b |
基点y坐标yG | 1006a08a41903350678e58528beb f8a0beff867a7ca36716f7e01f81052 |
椭圆方程系数A2 | 1 |
椭圆方程系数A6 | 066647ede6c332c7f8c0923bb5821 3b333b20e9ce4281fe115f7d8f90ad |
方案 | 时延 | 方案 | 时延 |
---|---|---|---|
文献[ | 0.522 | 文献[ | 0.145 |
文献[ | 1.103 | 本文方案 | 0.086 |
Tab. 4 Comparison of total delay of key exchange and key pair generation
方案 | 时延 | 方案 | 时延 |
---|---|---|---|
文献[ | 0.522 | 文献[ | 0.145 |
文献[ | 1.103 | 本文方案 | 0.086 |
1 | HASHEMI JOO M, NISHIKAWA Y, DANDAPANI K. Cryptocurrency, a successful application of blockchain technology[J]. Managerial Finance, 2020, 46(6): 715-733. |
2 | SCHWIDEROWSKI J, PEDERSEN A B, BECK R. Crypto tokens and token systems[J]. Information Systems Frontiers, 2024, 26(1): 319-332. |
3 | LOHACHAB A, GARG S, KANG B, et al. Towards interconnected blockchains: a comprehensive review of the role of interoperability among disparate blockchains[J]. ACM Computing Surveys, 2022, 54(7): No.135. |
4 | DAS D, BANERJEE S, CHATTERJEE P, et al. Blockchain for intelligent transportation systems: applications, challenges, and opportunities[J]. IEEE Internet of Things Journal, 2023, 10(21): 18961-18970. |
5 | 毕红亮,陈艳姣,伊心静,等. 基于博弈的加密货币交易市场用户决策优化分析[J]. 软件学报, 2023, 34(12):5477-5500. |
BI H L, CHEN Y J, YI X J, et al. Game-based optimization analysis of cryptocurrency trading market[J]. Journal of Software, 2023, 34(12): 5477-5500. | |
6 | 蔡维德,王荣,何娟,等. 分布式数字资产交易平台的问题与评估[J]. 软件学报, 2022, 33(2):410-433. |
TSAI W T, WANG R, HE J, et al. Decentralized digital asset exchanges: issues and evaluation[J]. Journal of Software, 2022, 33(2):410-433. | |
7 | CAI J, ZHOU Y, HU T, et al. PTLC: protect the identity privacy during cross-chain asset transaction more effectively[C]// Proceedings of the IEEE 22nd International Conference on Software Quality, Reliability, and Security Companion. Piscataway: IEEE, 2022: 70-78. |
8 | HARISH A R, LIU X L, LI M, et al. Blockchain-enabled digital assets tokenization for cyber-physical traceability in E-commerce logistics financing[J]. Computers in Industry, 2023, 150: No.103956. |
9 | Beosin. Q3 2022 global blockchain ecological security report[R]. HongKong: Beosin, 2022. |
10 | Analytica Oxford. Poly Network attack underlines growing DeFi risks[EB/OL]. [2023-11-10].. |
11 | DIFFIE W, HELLMAN M. New directions in cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6):644-654. |
12 | LU S, PEI J, ZHAO R, et al. CCIO: a cross-chain interoperability approach for consortium blockchains based on oracle[J]. Sensors, 2023, 23(4): No.1864. |
13 | WU T Y, LEE Z, YANG L, et al. Provably secure authentication key exchange scheme using fog nodes in vehicular ad hoc networks[J]. The Journal of Supercomputing, 2021, 77: 6992-7020. |
14 | JIANG J, ZHANG Y, ZHU Y, et al. DCIV: decentralized cross-chain data integrity verification with blockchain[J]. Journal of King Saud University — Computer and Information Sciences, 2022, 34(10 Pt A): 7988-7999. |
15 | MA Z, WANG J, GAI K, et al. Fully homomorphic encryption-based privacy-preserving scheme for cross edge blockchain network[J]. Journal of Systems Architecture, 2023, 134: No.102782. |
16 | 孙国梓,万明发,王钰,等. 区块链交易隐私保护技术研究进展[J]. 南京邮电大学学报(自然科学版), 2024, 44(4):30-43. |
SUN G Z, WAN M F, WANG Y, et al. A survey on privacy protection technology for blockchain transactions[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), 2024, 44(4):30-43. | |
17 | BAGHBANIJAM S, SANAEI H, FARAJZADEH M. An improved authentication & key exchange protocol based on ECDH for WSNs[C]// Proceedings of the 30th International Conference on Electrical Engineering. Piscataway: IEEE, 2022: 563-569. |
18 | XIONG A, LIU G, ZHU Q, et al. A notary group-based cross-chain mechanism[J]. Digital Communications and Networks, 2022, 8(6): 1059-1067. |
19 | YIN Z, ZHANG B, XU J, et al. Bool Network: an open, distributed, secure cross-chain notary platform[J]. IEEE Transactions on Information Forensics and Security, 2022, 17: 3465-3478. |
20 | YI H. A post-quantum blockchain notary scheme for cross-blockchain exchange[J]. Computers and Electrical Engineering, 2023, 110: No.108832. |
21 | REN Y, LV Z, XIONG N N, et al. HCNCT: a cross-chain interaction scheme for the blockchain-based Metaverse[J]. ACM Transactions on Multimedia Computing, Communications and Applications, 2024, 20(7): No.188. |
22 | BENSEBA K. Permutation polynomials over finite fields and their application to cryptography[D/OL]. [2024-01-10].. |
23 | 韦鹏程,杨华千,黄思行,等. 混沌伪随机序列及其应用研究[M]. 北京:科学出版社, 2019:111-117. |
WEI P C, YANG H Q, HUANG S X, et al. Research on chaotic pseudo-random sequences and their applications[M]. Beijing: Science Press, 2019: 111-117. | |
24 | DEVAL V, DWIVEDI V K, DIXIT A, et al. Mobile smart contracts: exploring scalability challenges and consensus mechanisms[J]. IEEE Access, 2024, 12: 34265-34288. |
25 | ITALIS O, PIERRE S, QUINTERO A. Privacy-preserving model for biometric-based authentication and key derivation function[J]. Journal of Information Security and Applications, 2023, 78: No.103624. |
26 | DUAN L, SUN Y, NI W, et al. Attacks against cross-chain systems and defense approaches: a contemporary survey[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(8): 1647-1667. |
27 | YU B, FENG L, ZHU H, et al. MeHLDT: a multielement hash lock data transfer mechanism for on-chain and off-chain[J]. Peer-to-Peer Networking and Applications, 2023, 16(4): 1927-1943. |
28 | YUAN H, FEI S, YAN Z. Technologies of blockchain interoperability: a survey[J]. Digital Communications and Networks, 2023(In Press): No.008. |
29 | 臧文洋,吕进来. 基于门限签名的时间轮换公证人组模型研究[J]. 计算机科学, 2024, 51(8):403-411. |
ZANG W Y, LYU J L. Study on time rotation notary group model based on threshold signature[J]. Computer Science, 2024, 51(8):403-411. |
[1] | Xuebin CHEN, Zhiqiang REN, Hongyang ZHANG. Review on security threats and defense measures in federated learning [J]. Journal of Computer Applications, 2024, 44(6): 1663-1672. |
[2] | Peiqian LIU, Shuilian WANG, Zihao SHEN, Hui WANG. Location privacy protection algorithm based on trajectory perturbation and road network matching [J]. Journal of Computer Applications, 2024, 44(5): 1546-1554. |
[3] | Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding [J]. Journal of Computer Applications, 2024, 44(3): 811-818. |
[4] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. |
[5] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[6] | Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Traceability storage model of charity system oriented to master-slave chain [J]. Journal of Computer Applications, 2024, 44(12): 3751-3758. |
[7] | Peng FANG, Fan ZHAO, Baoquan WANG, Yi WANG, Tonghai JIANG. Development, technologies and applications of blockchain 3.0 [J]. Journal of Computer Applications, 2024, 44(12): 3647-3657. |
[8] | Yifan WANG, Shaofu LIN, Yunjiang LI. Highway free-flow tolling method based on blockchain and zero-knowledge proof [J]. Journal of Computer Applications, 2024, 44(12): 3741-3750. |
[9] | Rui GAO, Xuebin CHEN, Zucuan ZHANG. Dynamic social network privacy publishing method for partial graph updating [J]. Journal of Computer Applications, 2024, 44(12): 3831-3838. |
[10] | Miao JIA, Zhongyuan YAO, Weihua ZHU, Tingting GAO, Xueming SI, Xiang DENG. Progress and prospect of zero-knowledge proof enabling blockchain [J]. Journal of Computer Applications, 2024, 44(12): 3669-3677. |
[11] | Xuebin CHEN, Changsheng QU. Overview of backdoor attacks and defense in federated learning [J]. Journal of Computer Applications, 2024, 44(11): 3459-3469. |
[12] | Hui ZHOU, Yuling CHEN, Xuewei WANG, Yangwen ZHANG, Jianjiang HE. Deep shadow defense scheme of federated learning based on generative adversarial network [J]. Journal of Computer Applications, 2024, 44(1): 223-232. |
[13] | Shuo HUANG, Yanhui LI, Jianqiu CAO. PrivSPM: frequent sequential pattern mining algorithm under local differential privacy [J]. Journal of Computer Applications, 2023, 43(7): 2057-2064. |
[14] | Ran ZHAI, Xuebin CHEN, Guopeng ZHANG, Langtao PEI, Zheng MA. Improved K-anonymity privacy protection algorithm based on different sensitivities [J]. Journal of Computer Applications, 2023, 43(5): 1497-1503. |
[15] | Chunyong YIN, Rui QU. Federated learning algorithm based on personalized differential privacy [J]. Journal of Computer Applications, 2023, 43(4): 1160-1168. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||