CN110457297A - Editable block catenary system and method based on more authorization center encryption attributes - Google Patents

Editable block catenary system and method based on more authorization center encryption attributes Download PDF

Info

Publication number
CN110457297A
CN110457297A CN201910620208.6A CN201910620208A CN110457297A CN 110457297 A CN110457297 A CN 110457297A CN 201910620208 A CN201910620208 A CN 201910620208A CN 110457297 A CN110457297 A CN 110457297A
Authority
CN
China
Prior art keywords
transaction
attribute
block chain
key
authorization center
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910620208.6A
Other languages
Chinese (zh)
Other versions
CN110457297B (en
Inventor
张宗洋
李彤
胡斌
荣康
刘建伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Beijing University of Aeronautics and Astronautics
Original Assignee
Beijing University of Aeronautics and Astronautics
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Aeronautics and Astronautics filed Critical Beijing University of Aeronautics and Astronautics
Priority to CN201910620208.6A priority Critical patent/CN110457297B/en
Publication of CN110457297A publication Critical patent/CN110457297A/en
Application granted granted Critical
Publication of CN110457297B publication Critical patent/CN110457297B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of editable block catenary system and method based on more authorization center encryption attributes, wherein, system includes: authentication and attribute key distribution module, and whether the identity for verifying each node meets preset condition, and distributes attribute key for user subject;Transaction preprocessing module, for being pre-processed by chameleon hash function to transaction after initiating transaction and before being included in block;Module is revised in transaction, for the transaction content of more New Transaction, and is calculated chameleon hash collision, and be updated in vain to transaction content, and calculate chameleon hash collision, is revised with complete swap.According to the system of inventive embodiments, block chain can be safeguarded in time under special circumstances, delete the junk data on block chain, ensure the stable development of personal information security and society, establish the improvement rule on block chain, the suitable application area for widening block chain facilitates the sound development of block chain application.

Description

Editable block catenary system and method based on more authorization center encryption attributes
Technical field
The present invention relates to alliance's block chain technical field, in particular to a kind of compiling based on more authorization center encryption attributes Collect block catenary system and method.
Background technique
Currently, due to the technologies such as bit coin, ether mill, intelligent contract based on block chain technology are like a raging fire, increasingly at It is ripe, attract the sight of domestic and international large quantities of experts and scholars.Block chain is one kind under peer to peer environment, by transparent and can Letter rule, constructs retrospective piece of linked data structure, realizes and manage the mode of issued transaction, and there is distribution to go to center The characteristic feature of four aspects such as change, anti-counterfeiting and anti-tamper, transparent credible and high reliability.Wherein, block chain data are not Can tamper refer to the historical trading data on block chain once confirm cannot be modified, this feature has ensured block chain The reliability and integrality of data.It makes the point to point network in a decentralization, completely without any third-party Trust authority can complete the transmitting and transfer of value.
However, exactly can not tamper to the promotion and application of block chain bring obstruction.Firstly, can not tamper bring Legal risk, any illegal contents for being embedded into block chain can not will be deleted forever, bring supervision aspect to regulatory authority Trouble;Secondly, the appearance of more and more intelligence contracts means that program must start a leak, once deployment can not be modified again, TheDAO project such as 2016 is just suffered heavy losses;Finally, EU Committee proposes " power of passing into silence " protection, it is most basic to want Asking exactly any can delete completely about personal privacy information from internet, this means that can not usurping for block chain The conflict of essence will be occurred with the laws and regulations of similar " power of passing into silence " by changing characteristic, it would be highly desirable to be improved.
Summary of the invention
The present invention is directed to solve at least some of the technical problems in related technologies.
For this purpose, an object of the present invention is to provide a kind of editable block chains based on more authorization center encryption attributes System, the system can be conducive under special circumstances in time safeguard block chain, delete the junk data on block chain.
It is another object of the present invention to propose a kind of editable block chain side based on more authorization center encryption attributes Method.
In order to achieve the above objectives, one aspect of the present invention embodiment propose it is a kind of based on more authorization center encryption attributes can Edit block catenary system, comprising: whether authentication and attribute key distribution module, the identity for verifying each node meet Preset condition, and be that user subject distributes attribute key by more authorization center attributes;Transaction preprocessing module, for sending out It rises after trading and before being included in block, transaction is pre-processed by chameleon hash function;Module is revised in transaction, for updating The transaction content of the transaction, and chameleon hash collision is calculated, and be updated in vain to the transaction content, and calculate change Color dragon Hash collision, to complete to revise the transaction.
The editable block catenary system based on more authorization center encryption attributes of the embodiment of the present invention, can be in special circumstances Block chain is safeguarded in time down, deletes the junk data on block chain, ensures the stabilization of personal information security and society Development establishes the improvement rule on block chain, widens the suitable application area of block chain, facilitate the sound development of block chain application.
In addition, the editable block catenary system according to the above embodiment of the present invention based on more authorization center encryption attributes is also It can have following additional technical characteristic:
Further, in one embodiment of the invention, further includes: transaction verification module, for after revising, Local block chain data are verified and updated for other users.
Further, in one embodiment of the invention, the transaction verification module is further used for having changed The transaction content is broadcasted, and is verified to new transaction content and transaction reviser, with after being verified, the whole network Update the local block chain data being locally stored.
Further, in one embodiment of the invention, the authentication and attribute key distribution module are further For the parameter initialization to each attribute authority, and public and private key is generated, it is related to attribute authority application in user When the private key of attribute, each attribute authority is controlled to relative users and distributes the attribute key.
Optionally, in one embodiment of the invention, the preset condition legal can have for the identity of each node Effect.
In order to achieve the above objectives, another aspect of the present invention embodiment proposes a kind of based on more authorization center encryption attributes Editable block chain method, comprising the following steps: whether the identity for verifying each node meets preset condition, and by awarding more Weighing hub attribute is that user subject distributes attribute key;After initiating transaction and before being included in block, pass through chameleon hash function Transaction is pre-processed;The transaction content of the transaction is updated, and calculates chameleon hash collision, and in the transaction It is invalid that appearance is updated to, and calculates chameleon hash collision, to complete to revise the transaction.
The editable block chain method based on more authorization center encryption attributes of the embodiment of the present invention, can be in special circumstances Block chain is safeguarded in time down, deletes the junk data on block chain, ensures the stabilization of personal information security and society Development establishes the improvement rule on block chain, widens the suitable application area of block chain, facilitate the sound development of block chain application.
In addition, the editable block chain method according to the above embodiment of the present invention based on more authorization center encryption attributes is also It can have following additional technical characteristic:
Further, in one embodiment of the invention, further includes: after revising, for other users verifying and Update local block chain data.
Further, in one embodiment of the invention, described that local block chain number is verified and updated for other users According to, comprising: the transaction content changed is broadcasted, and new transaction content and transaction reviser are verified, With after being verified, the whole network updates the local block chain data being locally stored.
Further, in one embodiment of the invention, whether the identity of each node of verifying meets default item Part, and be that user subject distributes attribute key by more authorization center attributes, comprising: to the parameter of each attribute authority Initialization, and public and private key is generated, in private key of the user to attribute authority application association attributes, control each attribute Authorization center distributes the attribute key to relative users.
Optionally, in one embodiment of the invention, the preset condition legal can have for the identity of each node Effect.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partially become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, in which:
Fig. 1 is the box according to the editable block catenary system based on more authorization center encryption attributes of the embodiment of the present invention Schematic diagram;
Fig. 2 is the editable block chain schematic diagram based on more authorization center encryption attributes according to the embodiment of the present invention;
Fig. 3 is the flow chart distributed according to the authentication of one embodiment of the invention and attribute key;
Fig. 4 is the pretreated flow chart of transaction according to one embodiment of the invention;
Fig. 5 is the flow chart revised according to the transaction of one embodiment of the invention;
Fig. 6 is the flow chart according to the transaction verification of one embodiment of the invention;
Fig. 7 is the process according to the editable block chain method based on more authorization center encryption attributes of the embodiment of the present invention Figure;
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.
The editable based on more authorization center encryption attributes proposed according to embodiments of the present invention is described with reference to the accompanying drawings Block catenary system and method describe to propose according to embodiments of the present invention first with reference to the accompanying drawings.
Fig. 1 is the box according to the editable block catenary system based on more authorization center encryption attributes of the embodiment of the present invention Schematic diagram
As shown in Figure 1, being somebody's turn to do the editable block catenary system based on more authorization center encryption attributes includes: authentication and category Property key distribution module 100, transaction preprocessing module 200 and transaction revise module 300.
Wherein, it is default whether the identity that authentication and attribute key distribution module 100 are used to verify each node meets Condition, and be that user subject distributes attribute key by more authorization center attributes.
Optionally, in one embodiment of the invention, preset condition can be legal effectively for the identity of each node.
It is understood that as shown in Fig. 2, verifying the body of each node in authentication and attribute key distribution phase The whether legal effective and attribute authority of part is that user subject distributes attribute key.
Further, in one embodiment of the invention, authentication and attribute key distribution module 100 are further used In the parameter initialization to each attribute authority, and public and private key is generated, in user to attribute authority application correlation category Property private key when, control each attribute authority to relative users distribute attribute key.
Specifically, as shown in Fig. 2, authentication and attribute key distribution phase, including authentication process itself, attribute authority Center initialization procedure, user apply for that attribute key process and attribute authority distribute cipher key processes.Authentication process itself is Whether the identity that CA verifies each node is legal effectively;Attribute authority initialization procedure, that is, each attribute authority ginseng Number initialization and the generation of public and private key;User applies attribute key process, that is, user to attribute authority application association attributes Private key;Attribute authority distributes cipher key processes, that is, each attribute authority and distributes key to relative users.
For example, in identity audit and attribute key distribution phase, identity audit and attribute key distribution phase include Identity review process, attribute authority initialization procedure, user apply for that attribute key process and attribute authority distribution are close Key process.Identity review process, that is, CA checks whether the identity of each node in alliance's chain is effectively legal;At the beginning of attribute authority The generation of beginning process, that is, each attribute authority parameter initialization and public and private key;User applies for that attribute key process is used Private key of the family to attribute authority application association attributes;Attribute authority distributes cipher key processes, that is, each attribute authority Distribute key to relative users.
As shown in figure 3, the process of identity audit and attribute key distribution phase is as follows:
Step 1.CA is responsible for verifying the identity of each node in alliance's chain.It only just can be by the user of CA agency qualification It participates in business on block chain process, each user is owned by the global identifier (Global of unique identification oneself identity Identifier, GID).
The more a attribute authority AA of step 2.1, AA2..., AAnManage the attribute in an Attribute domain alone respectively, solely It is vertical to execute initialization procedure, without cooperation, the specific steps are as follows:
It is N=p that step 2-1., which selects a rank,1p2p3Bilinear Groups G, wherein p1、p2、p3It is prime number, selects one Bilinear map e:G × G → G on group GT, and group Gp1It is to generate member as p1Group G subgroup;
Step 2-2. is to the attribute a in each Attribute domaini, attribute authority AAjRandomly select αi,yi∈ZN, calculateWherein PKjIt is the encryption key of encryption attribute, SKjIt is attribute key meter The master key of calculation.
The each user of step 3. submits the GID of oneself and to attribute authority AAjApply for attribute aiAttribute key.
Step 4.AAjUse SKjFor each entity computation attribute aiAttribute key Ki,GID, the specific steps are as follows:
The hash function H of step 4-1. selection impact resistant1:{0,1}*→G;
Step 4-2. is for attribute ai, calculate
Step 5.AAjBy Ki,GIDWith the key PK for encryption attributejEncryption is sent to each entity.
Transaction preprocessing module 200 is used for after initiating transaction and before being included in block, by chameleon hash function to friendship Easily pre-processed.
It is understood that as shown in Fig. 2, being handed over using chameleon hash function editable in transaction pretreatment stage It is easy to handle.In other words, before being included in block after initiating transaction, transaction publisher carries out the transaction using chameleon hash function pre- Processing.
For example, in transaction pretreatment stage, transaction pretreatment is i.e. before being included in block after transaction is initiated, to the transaction It is pre-processed using chameleon hash function.
As shown in figure 4, the process of transaction pretreatment stage is as follows:
If some user A of step 1. wants to initiate an editable transaction, A needs to generate chameleon in local initialization The Hash key of hash function and long-term trap door key, the specific steps are as follows:
Step 1-1. random selection prime number e meets e > n and n ∈ N is natural number;
Step 1-2. chooses the hash function of different prime number ps, q and impact resistant
Step 1-3. enables hk=(n, H2), tk=(p, q), wherein hk is the Hash key for calculating chameleon hash, Tk is the long-term trap door key for calculating chameleon hash collision.
Transaction content motion is sent to endorsement node by step 2. transaction publisher A, waits endorsement node to transaction verification.
For step 3. after endorsing node audit, transaction publisher A carries out the transaction using chameleon hash function Pretreatment, the specific steps are as follows:
Step 3-1. chooses random numberChoose different prime number ps ', q ', calculate n '=p ' q ' and n ' and n it is coprime, Remember that (p ', q ') is interim trap door key etd;
Step 3-2. calculates chameleon hash functional value h=H to transaction m using Hash key hk2(m)re(mod nn′);
Step 3-3. randomly chooses a secret s ∈ ZNWith random number y2,…,yl,t2,…,tl∈ZNComposition vector υ= (s,y2,…,yn)∈ZNWith vector ω=(0, t2,…,tn)∈ZN
Step 3-4. is in ZNMiddle selection random number rx, enable λx=Axυ and ωx=Axω, for every a line of matrix A Ax, ciphertext c is calculated to etd:
Step 4. transaction is stored as (h, c) form after the pretreatment of chameleon hash function, wait ordering joint sequence and It is packaged into block, then ordering joint is broadcast to block the host node of its hetero-organization.After host node receives block, one will do it Series checks whether verifying block is effective.If verifying is effectively, account book data mode is updated.
Transaction content of the module 300 for more New Transaction is revised in transaction, and calculates chameleon hash collision, and to transaction Content update is invalid, and calculates chameleon hash collision, is revised with complete swap.
It is understood that transaction reviser revises certain transaction as shown in Fig. 2, revising the stage in transaction.Wherein, Including transaction renewal process and transaction deletion process.The content of the renewable transaction of the renewal process, that is, authorized party that trades, and calculate change The collision of color dragon Hash;Deletion process, that is, the authorized party that trades is invalid to the content update of transaction, and calculates chameleon hash collision.
For example, it is revised the stage in transaction, the stage of revising of trading includes transaction renewal process and transaction deletion process.It hands over The content of easy renewal process, that is, authorized party more New Transaction, and calculate chameleon hash collision;Trade deletion process, that is, authorized party couple The content update of transaction is invalid, and calculates chameleon hash collision.
As shown in figure 5, to revise the process in stage as follows for transaction:
If step 1. is traded, (B possesses the attribute key set { K for meeting the transaction to the desired modification transaction of reviser Bi,GID), B can be to the transaction long-term trap door key tk of publisher A application, the specific steps are as follows:
Step 1-1.B initiates to apply for long-term trap door key tk request to A;
Tk use access control matrix A identical with transaction preprocessing process is carried out encryption attribute by step 1-2.A, is sent To B;
Step 1-3.B uses attribute key set { Ki,GIDAfter decryption, long-term trap door key tk can get.
Step 2. transaction reviser B uses attribute key set { K to ciphertext ci,GIDThe interim trap door key of decryption acquisition Etd, the specific steps are as follows:
Step 2-1. calculates oneself user identifier GID cryptographic Hash H1(GID), if the category that transaction reviser B possesses Property key set { Kρ(x),GIDIn the linear combination of all properties incidence matrix row be equal to (1,0 ..., 0), then for each x, hand over Easy reviser B is calculated:
Step 2-2. transaction reviser B selectivity constant cx∈ZNSo that ∑xcxAx=(1,0 ..., 0), then calculates
Obtain interim trap door key etd=c0/e(g1,g1)s
Step 3. will introduce two distinct types of modification demand respectively below:
If transaction reviser B wants to update transaction content, that is to say, that transaction m is updated to m ', then it can be according to interim trapdoor The inverse element d that key etd=(p ', q ') and long-term trap door key tk=(p, q) calculate e makesFrom And calculate collision r '=(xr of chameleon hash functione(H2(m′)-1))d(mod nn′).So far transaction content modification is completed.
If transaction reviser B wants to delete transaction content (the data field of more New Transaction be full stop), formalization be denoted as by Transaction m is updated to m ", then can calculate e's according to interim trap door key etd=(p ', q ') and long-term trap door key tk=(p, q) Inverse element d makesTo calculate collision r "=(xr of chameleon hash functione(H2(m″)-1))d (mod nn′).So far transaction content modification is completed.
Further, in one embodiment of the invention, the system 10 of the embodiment of the present invention further include: transaction verification mould Block.Wherein, transaction verification module is used for after revising, and local block chain data are verified and updated for other users.
It is understood that as shown in Fig. 2, in the transaction verification stage, after transaction is revised, for other users verifying and Update local block chain data.
Wherein, in one embodiment of the invention, transaction verification module is further used for the transaction content changed It is broadcasted, and new transaction content and transaction reviser is verified, with after being verified, the whole network update is locally stored Local block chain data.
Specifically, as shown in Fig. 2, the transaction verification stage include more new content broadcasting process, endorsement node verification process and The whole network renewal process.More new content broadcasting process, that is, authorized party broadcasts the transaction content changed;Endorsement node verification Process is that endorsement node verifies new transaction content and transaction reviser;After the whole network renewal process is verified, entirely Net updates the block chain data being locally stored.
For example, the transaction verification stage includes that more new content broadcasting process, endorsement node verification process and the whole network update Process.More new content broadcasting process, that is, authorized party broadcasts the transaction content changed;Node verification process of endorsing i.e. endorsement node Verify new transaction content and transaction reviser;After the whole network renewal process is verified, the whole network updates the block being locally stored Chain data.
As shown in figure 5, the process in transaction verification stage is as follows:
The step 1. reviser B that trades will be sent to endorsement after private key signature using oneself of (m ', r ', h) or (m ", r ", h) Node.
Step 2. endorsement node verification transaction reviser's identity and new transaction content, the specific steps are as follows:
The signature of step 2-1. endorsement node verification transaction reviser executes following steps, otherwise not if being verified Execute modification.
Step 2-2. endorsement node verification H2(m′)re(mod nn ') or H2(m″)reWhether (mod nn ') is equal to h, if testing Card passes through, then executes following steps, and node of otherwise endorsing does not execute modification.
Step 3. endorsement node is broadcasted New Transaction content (m ', h) or (m ", h), and the whole network is updated storage in local Transaction content m is m ' or m ", and so far transaction content verifies.
To sum up, the editable block catenary system according to an embodiment of the present invention based on more authorization center encryption attributes, passes through Above-mentioned identity audit and attribute key distribution phase, trade and revise stage and transaction verification stage, needle at transaction pretreatment stage Editable purpose is realized to alliance's chain, is conducive under special circumstances in time safeguard block chain, is deleted on block chain Junk data ensures the stable development of personal information security and society, establishes the improvement rule on block chain, improves block chain Risk resistivity, avoid System splitting;The suitable application area for widening block chain facilitates the sound development of block chain application.
The editable based on more authorization center encryption attributes proposed according to embodiments of the present invention is described referring next to attached drawing Block chain method.
Fig. 7 is the process according to the editable block chain method based on more authorization center encryption attributes of the embodiment of the present invention Figure.
As shown in fig. 7, the Fig. 7 is the editable block based on more authorization center encryption attributes according to the embodiment of the present invention The flow chart of chain method the following steps are included:
Step S701: whether the identity for verifying each node meets preset condition, and is by more authorization center attributes User subject distributes attribute key.
Optionally, in one embodiment of the invention, preset condition can be legal effectively for the identity of each node.
Further, in one embodiment of the invention, whether the identity for verifying each node meets preset condition, and And distribute attribute key by more authorization center attributes for user subject, comprising: initial to the parameter of each attribute authority Change, and generate public and private key, in private key of the user to attribute authority application association attributes, controls each attribute authority Distribute attribute key to relative users.
Step S702: after initiating transaction and before being included in block, transaction is pre-processed by chameleon hash function.
Step S703: the transaction content of more New Transaction, and chameleon hash collision is calculated, and be updated to transaction content In vain, and chameleon hash collision is calculated, is revised with complete swap.
In addition, in one embodiment of the invention, further includes: after revising, verify and update for other users Local block chain data.
Further, in one embodiment of the invention, local block chain data, packet are verified and updated for other users It includes: the transaction content changed is broadcasted, and new transaction content and transaction reviser are verified, with logical in verifying Later, the whole network updates the local block chain data being locally stored.
It should be noted that the aforementioned solution to the editable block catenary system embodiment based on more authorization center encryption attributes The editable block chain method based on more authorization center encryption attributes that explanation is also applied for the embodiment is released, it is no longer superfluous herein It states.
To sum up, the editable block chain method according to an embodiment of the present invention based on more authorization center encryption attributes, passes through Above-mentioned identity audit and attribute key distribution phase, trade and revise stage and transaction verification stage, needle at transaction pretreatment stage Editable purpose is realized to alliance's chain, is conducive under special circumstances in time safeguard block chain, is deleted on block chain Junk data ensures the stable development of personal information security and society, establishes the improvement rule on block chain, improves block chain Risk resistivity, avoid System splitting;The suitable application area for widening block chain facilitates the sound development of block chain application.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or N number of embodiment or example.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present invention, " N number of " is meant that at least two, such as two, three Deng unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes One or it is more N number of for realizing custom logic function or process the step of executable instruction code module, segment or portion Point, and the range of the preferred embodiment of the present invention includes other realization, wherein can not press shown or discussed suitable Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be of the invention Embodiment person of ordinary skill in the field understood.
Expression or logic and/or step described otherwise above herein in flow charts, for example, being considered use In the order list for the executable instruction for realizing logic function, may be embodied in any computer-readable medium, for Instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be held from instruction The instruction fetch of row system, device or equipment and the system executed instruction) it uses, or combine these instruction execution systems, device or set It is standby and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, stores, communicates, propagates or pass Defeated program is for instruction execution system, device or equipment or the dress used in conjunction with these instruction execution systems, device or equipment It sets.The more specific example (non-exhaustive list) of computer-readable medium include the following: being electrically connected with one or N number of wiring Socket part (electronic device), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), Erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk read-only storage (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other suitable Jie Matter, because can then be edited, be interpreted or when necessary with other for example by carrying out optical scanner to paper or other media Suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that N number of step or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.Such as, if realized with hardware in another embodiment, following skill well known in the art can be used Any one of art or their combination are realized: have for data-signal is realized the logic gates of logic function from Logic circuit is dissipated, the specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene can compile Journey gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage medium In matter, which when being executed, includes the steps that one or a combination set of embodiment of the method.
It, can also be in addition, each functional unit in each embodiment of the present invention can integrate in a processing module It is that each unit physically exists alone, can also be integrated in two or more units in a module.Above-mentioned integrated mould Block both can take the form of hardware realization, can also be realized in the form of software function module.The integrated module is such as Fruit is realized and when sold or used as an independent product in the form of software function module, also can store in a computer In read/write memory medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above The embodiment of the present invention is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as to limit of the invention System, those skilled in the art can be changed above-described embodiment, modify, replace and become within the scope of the invention Type.

Claims (10)

1. a kind of editable block catenary system based on more authorization center encryption attributes characterized by comprising
Authentication and attribute key distribution module, whether the identity for verifying each node meets preset condition, and leads to Excessive authorization center attribute is that user subject distributes attribute key;
Transaction preprocessing module, for being carried out by chameleon hash function to transaction after initiating transaction and before being included in block Pretreatment;And
Module is revised in transaction, for updating the transaction content of the transaction, and calculates chameleon hash collision, and to the friendship Easy content update is invalid, and calculates chameleon hash collision, to complete to revise the transaction.
2. system according to claim 1, which is characterized in that further include:
Transaction verification module, for local block chain data after revising, to be verified and updated for other users.
3. system according to claim 2, which is characterized in that the transaction verification module is further used for having changed The transaction content is broadcasted, and is verified to new transaction content and transaction reviser, with after being verified, the whole network Update the local block chain data being locally stored.
4. system according to claim 1, which is characterized in that the authentication and attribute key distribution module are further For the parameter initialization to each attribute authority, and public and private key is generated, it is related to attribute authority application in user When the private key of attribute, each attribute authority is controlled to relative users and distributes the attribute key.
5. system according to claim 1-4, which is characterized in that the preset condition is the identity of each node It is legal effective.
6. a kind of editable block chain method based on more authorization center encryption attributes, which comprises the following steps:
Whether the identity for verifying each node meets preset condition, and is that user subject distribution belongs to by more authorization center attributes Property key;
After initiating transaction and before being included in block, transaction is pre-processed by chameleon hash function;And
The transaction content of the transaction is updated, and calculates chameleon hash collision, and be updated in vain to the transaction content, And chameleon hash collision is calculated, to complete to revise the transaction.
7. according to the method described in claim 6, it is characterized by further comprising:
After revising, local block chain data are verified and updated for other users.
8. the method according to the description of claim 7 is characterized in that described verify for other users and update local block chain number According to, comprising:
The transaction content changed is broadcasted, and new transaction content and transaction reviser are verified, with After being verified, the whole network updates the local block chain data being locally stored.
9. according to the method described in claim 6, it is characterized in that, whether the identity of each node of verifying meets default item Part, and be that user subject distributes attribute key by more authorization center attributes, comprising:
To the parameter initialization of each attribute authority, and public and private key is generated, it is related to attribute authority application in user When the private key of attribute, each attribute authority is controlled to relative users and distributes the attribute key.
10. the method according to claim 6, which is characterized in that the preset condition is the body of each node Part is legal effectively.
CN201910620208.6A 2019-07-10 2019-07-10 Editable block chain system and method based on multi-authority attribute encryption Active CN110457297B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910620208.6A CN110457297B (en) 2019-07-10 2019-07-10 Editable block chain system and method based on multi-authority attribute encryption

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910620208.6A CN110457297B (en) 2019-07-10 2019-07-10 Editable block chain system and method based on multi-authority attribute encryption

Publications (2)

Publication Number Publication Date
CN110457297A true CN110457297A (en) 2019-11-15
CN110457297B CN110457297B (en) 2022-02-15

Family

ID=68482643

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910620208.6A Active CN110457297B (en) 2019-07-10 2019-07-10 Editable block chain system and method based on multi-authority attribute encryption

Country Status (1)

Country Link
CN (1) CN110457297B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111339209A (en) * 2020-05-19 2020-06-26 鹏城实验室 Information management method and information management system based on block chain
CN111460497A (en) * 2020-03-30 2020-07-28 中南大学 Editable block chain system
CN111526009A (en) * 2020-04-09 2020-08-11 西南交通大学 Forward security editable block chain construction method suitable for alliance chain
CN112070501A (en) * 2020-11-10 2020-12-11 支付宝(杭州)信息技术有限公司 Block chain transaction initiating and verifying method and system
CN112272092A (en) * 2020-08-30 2021-01-26 河南大学 Data editing method applied to block chain
CN112380584A (en) * 2021-01-13 2021-02-19 北京笔新互联网科技有限公司 Block chain data updating method and device, electronic equipment and storage medium
CN112468302A (en) * 2020-10-23 2021-03-09 湖南天河国云科技有限公司 Editable blockchain based on verifiable multiparty secret sharing
CN113268542A (en) * 2021-05-10 2021-08-17 西安交通大学 Block chain rewriting method and system based on multi-party authorization
CN113378213A (en) * 2021-04-20 2021-09-10 华南农业大学 Block chain safety deleting method capable of recording and tracing
CN113536389A (en) * 2021-06-15 2021-10-22 复旦大学 Fine-grained controllable decentralized editable block chain construction method and system
WO2022242337A1 (en) * 2021-05-18 2022-11-24 华为技术有限公司 Method and apparatus for blockchain editing

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104601605A (en) * 2015-02-28 2015-05-06 北方工业大学 Efficient privacy protection auditing scheme based on chameleon hash function in cloud storage
US20170374033A1 (en) * 2016-06-23 2017-12-28 International Business Machines Corporation Authentication via revocable signatures
CN108830602A (en) * 2018-06-27 2018-11-16 电子科技大学 A kind of license chain construction and management-control method based on chameleon hash function
CN109559124A (en) * 2018-12-17 2019-04-02 重庆大学 A kind of cloud data safety sharing method based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104601605A (en) * 2015-02-28 2015-05-06 北方工业大学 Efficient privacy protection auditing scheme based on chameleon hash function in cloud storage
US20170374033A1 (en) * 2016-06-23 2017-12-28 International Business Machines Corporation Authentication via revocable signatures
CN108830602A (en) * 2018-06-27 2018-11-16 电子科技大学 A kind of license chain construction and management-control method based on chameleon hash function
CN109559124A (en) * 2018-12-17 2019-04-02 重庆大学 A kind of cloud data safety sharing method based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李佩丽等: "《可更改区块链技术研究》", 《密码学报》 *

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111460497A (en) * 2020-03-30 2020-07-28 中南大学 Editable block chain system
CN111460497B (en) * 2020-03-30 2023-04-07 中南大学 Editable block chain system
CN111526009A (en) * 2020-04-09 2020-08-11 西南交通大学 Forward security editable block chain construction method suitable for alliance chain
CN111339209A (en) * 2020-05-19 2020-06-26 鹏城实验室 Information management method and information management system based on block chain
CN112272092A (en) * 2020-08-30 2021-01-26 河南大学 Data editing method applied to block chain
CN112468302B (en) * 2020-10-23 2024-05-24 湖南天河国云科技有限公司 Editable blockchain based on verifiable multiparty secret sharing
CN112468302A (en) * 2020-10-23 2021-03-09 湖南天河国云科技有限公司 Editable blockchain based on verifiable multiparty secret sharing
CN112884477A (en) * 2020-11-10 2021-06-01 支付宝(杭州)信息技术有限公司 Block chain transaction initiating and verifying method and system
CN112070501A (en) * 2020-11-10 2020-12-11 支付宝(杭州)信息技术有限公司 Block chain transaction initiating and verifying method and system
CN112380584B (en) * 2021-01-13 2021-04-16 北京笔新互联网科技有限公司 Block chain data updating method and device, electronic equipment and storage medium
CN112380584A (en) * 2021-01-13 2021-02-19 北京笔新互联网科技有限公司 Block chain data updating method and device, electronic equipment and storage medium
CN113378213A (en) * 2021-04-20 2021-09-10 华南农业大学 Block chain safety deleting method capable of recording and tracing
CN113378213B (en) * 2021-04-20 2022-06-21 华南农业大学 Block chain safety deleting method capable of recording and tracing
CN113268542A (en) * 2021-05-10 2021-08-17 西安交通大学 Block chain rewriting method and system based on multi-party authorization
WO2022242337A1 (en) * 2021-05-18 2022-11-24 华为技术有限公司 Method and apparatus for blockchain editing
CN113536389A (en) * 2021-06-15 2021-10-22 复旦大学 Fine-grained controllable decentralized editable block chain construction method and system

Also Published As

Publication number Publication date
CN110457297B (en) 2022-02-15

Similar Documents

Publication Publication Date Title
CN110457297A (en) Editable block catenary system and method based on more authorization center encryption attributes
US20240005310A1 (en) Implementing logic gate functionality using a blockchain
JP7489422B2 (en) TOKENATION METHOD AND SYSTEM FOR CARRYING OUT EXCHANGES ON A BLOCKCHAIN
KR101987692B1 (en) Registry and Automation Management Methods for Smart Contracts in Blockchain Enforcement
Yaga et al. Blockchain technology overview
CN109583885A (en) Bout controls rewritable block chain
US20230135256A1 (en) Apparatus for proportional calculation regarding non-fungible tokens
US20170250796A1 (en) Trans Vernam Cryptography: Round One
US20190149337A1 (en) Implementing logic gate functionality using a blockchain
CN112950220B (en) Enterprise digital identity management system and method based on blockchain
Jiang et al. A privacy-preserving e-commerce system based on the blockchain technology
CN109547500A (en) A kind of data sharing method and system for protecting user data ownership
CN109600366A (en) The method and device of protection user data privacy based on block chain
Gayvoronskaya et al. Blockchain
US11334884B2 (en) Encapsulated security tokens for electronic transactions
CN109446259A (en) Data processing method and device, processor and storage medium
Khandelwal et al. Certificate verification system using blockchain
Pérez‐Solà et al. BArt: Trading digital contents through digital assets
Guo et al. A lightweight NFT auction protocol for cross-chain environment
Ai et al. B2IPTS: A blockchain-based intellectual property transaction framework
Dramé-Maigné Blockchain and access control: towards a more secure Internet of Things
Antal et al. Distributed Ledger Technology Review and Decentralized Applications Development Guidelines. Future Internet 2021, 13, 62
Lukina et al. Electronic payment systems and blockchain as a constituent part
Appelbaum Consensus Mechanisms and Related Issues
Khandelwal Storing Student Records Using Blockchain and IPFS

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant