CN112887078A - Method and device for editing blocks in block chain - Google Patents

Method and device for editing blocks in block chain Download PDF

Info

Publication number
CN112887078A
CN112887078A CN202110146074.6A CN202110146074A CN112887078A CN 112887078 A CN112887078 A CN 112887078A CN 202110146074 A CN202110146074 A CN 202110146074A CN 112887078 A CN112887078 A CN 112887078A
Authority
CN
China
Prior art keywords
authority
nodes
node
block
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110146074.6A
Other languages
Chinese (zh)
Other versions
CN112887078B (en
Inventor
王帅
褚红梅
才华
孙权
邱震尧
朱涛
章政
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN202110146074.6A priority Critical patent/CN112887078B/en
Publication of CN112887078A publication Critical patent/CN112887078A/en
Application granted granted Critical
Publication of CN112887078B publication Critical patent/CN112887078B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a device for editing a block in a block chain, wherein the method comprises the steps that an authority node generates a block content editing proposal, the block content editing proposal is broadcasted so that the node in the block chain votes for the block content editing proposal, when a node with a preset proportion in the block chain votes for agreement through a preset system rule in the block chain, an accounting node is determined from the authority node in the block chain, and the secret quota of the authority node of a trapdoor forming a chameleon hash function is sent to the accounting node. The secret shares are sent to the accounting node after the node in the block chain is determined to pass the block content editing proposal vote, so that the account node reconstructs the trapdoor of the chameleon hash function after the secret shares are verified, the defect that the trapdoor is controlled by a single node can be avoided, and the safety of data storage is guaranteed.

Description

Method and device for editing blocks in block chain
Technical Field
The present invention relates to the field of blockchain technologies, and in particular, to a method and an apparatus for editing a block in a blockchain.
Background
The block chain is generally considered to have the technical characteristics of difficult tampering and easy traceability. On one hand, the technical characteristic of difficult tampering guarantees the permanent evidence storage and effective source tracing of the uplink data; on the other hand, just because data cannot be edited and deleted once being linked, a block chain (especially a public chain) becomes a data pool for illegal information and illegal transactions, and any person can issue any information at extremely low cost, so that the block chain is in a supervision blank state, and great threats are brought to network security and social stability.
An important reason for the block chain being difficult to tamper is the collision resistance of the hash function. Collision immunity means that it is computationally infeasible to equalize the hash function output values for two different input data. Based on a classical hash algorithm, a hash function (chameleon hash function) with a trap door is provided, and hash collision of any input data can be calculated as long as the trap door is mastered, so that the input of the hash function is changed at will under the condition that the output of the hash function is not changed. However, this solution has the following disadvantages: firstly, the trapdoor is only mastered by a single node, and once the node has malicious behaviors, the historical block data can be modified arbitrarily or the data which should be modified is refused to be modified.
Disclosure of Invention
The embodiment of the invention provides a method and a device for editing a block in a block chain, which can avoid the problem of malicious behavior when a trapdoor is controlled by a single node.
In a first aspect, an embodiment of the present invention provides a method for editing a block in a blockchain, including:
generating a block content editing proposal by using an authority node, wherein the authority node is any one of N authority nodes generated in a block chain;
the authority node broadcasts the block content editing proposal so that a node in the block chain votes for the block content editing proposal; determining an accounting node from authority nodes in the block chain when determining that the nodes with a preset proportion in the block chain cast an agreement ticket through a preset system rule in the block chain;
the authority node sends the secret shares to which the authority nodes forming the trapdoors of the chameleon hash function belong to the accounting node, so that the accounting node reconstructs the trapdoors of the chameleon hash function after determining that at least t secret shares sent by the authority nodes are received, edits the block content in the block content editing proposal according to the trapdoors of the chameleon hash function, and chains up the editing result;
wherein N is a positive integer, and t is a positive integer less than or equal to N.
In the technical scheme, after the node in the block chain is determined to pass the block content editing proposal vote through the system rules preset in the block chain, the secret shares are sent to the accounting node, so that the account node reconstructs the trapdoor of the chameleon hash function after passing the secret share verification, the defect that the trapdoor is controlled by a single node can be avoided, and the safety of data storage is guaranteed.
Optionally, the authority node is any one of N authority nodes generated in the block chain in a voluntary and drawing manner.
Optionally, the accounting node is determined by a system rule preset in the block chain from the authority nodes for voting agreement in the block chain when the nodes with a preset proportion in the block chain are determined and the authority nodes with the proportion larger than the preset number vote agreement.
Optionally, the at least t permission nodes are permission nodes for agreeing to the vote.
Optionally, the accounting node is determined based on a value of a preset number of bits in a hash result after performing hash operation on a consensus value approved by all authority nodes and incapable of being tampered by a system rule preset in the block chain to obtain the hash result.
Optionally, the consensus value used by the system rule preset in the blockchain every time the accounting node is determined is different.
Optionally, after the verification organization generates the trapdoor of the chameleon hash function, the secret share to which the authority node of the trapdoor constituting the chameleon hash function belongs is distributed to the authority node after the trapdoor is split into N secret shares in a verifiable secret sharing manner.
In a second aspect, an embodiment of the present invention provides a method for editing a block in a blockchain, including:
the accounting node acquires a block content editing proposal sent by the authority node and the secret share of the authority node forming a trapdoor of a chameleon hash function; the secret share of the authority nodes of the trapdoors forming the chameleon hash function is sent after the authority nodes broadcast the block content editing proposal and determine accounting nodes from the authority nodes in the block chain when determining that the nodes with preset proportion in the block chain cast an agreement ticket through a preset system rule in the block chain; the authority node is any one of N authority nodes generated in the block chain;
after the accounting node determines that the secret shares sent by at least t permission nodes are received and passes verification, the trapdoor of the chameleon hash function is determined according to the at least t secret shares;
the accounting node edits the block content in the block content editing proposal according to the trapdoor of the chameleon hash function, and links the editing result;
wherein N is a positive integer, and t is a positive integer less than or equal to N.
Optionally, the authority node is any one of N authority nodes generated in the block chain in a voluntary and drawing manner.
Optionally, the accounting node is determined by a system rule preset in the block chain from the authority nodes for voting agreement in the block chain when the nodes with a preset proportion in the block chain are determined and the authority nodes with the proportion larger than the preset number vote agreement.
Optionally, the at least t permission nodes are permission nodes for agreeing to the vote.
Optionally, the accounting node is determined based on a value of a preset number of bits in a hash result after performing hash operation on a consensus value approved by all authority nodes and incapable of being tampered by a system rule preset in the block chain to obtain the hash result.
Optionally, the consensus value used by the system rule preset in the blockchain every time the accounting node is determined is different.
Optionally, after the verification organization generates the trapdoor of the chameleon hash function, the secret share to which the authority node of the trapdoor constituting the chameleon hash function belongs is distributed to the authority node after the trapdoor is split into N secret shares in a verifiable secret sharing manner.
Optionally, the determining, by the accounting node, the trapdoor of the chameleon hash function according to at least t secret shares includes:
and the accounting node inputs the at least t secret shares into a Lagrange difference value formula to obtain a polynomial function, and the polynomial function is solved to obtain the trapdoor of the chameleon hash function.
Optionally, the method further includes:
the accounting node determines whether the editing result is successfully linked, and if so, determines that the accounting node obtains rewards; otherwise, determining the guarantee fee which is punished and not paid by the accounting node.
Optionally, the method further includes:
and after determining that the chain is successfully edited in the editing result, the accounting node informs the certification authority to generate a trapdoor of a new chameleon hash function.
In a third aspect, an embodiment of the present invention provides an apparatus for editing a block in a blockchain, including:
the generating unit is used for generating a block content editing proposal, and the authority node is any one of N authority nodes generated in a block chain;
a processing unit, configured to broadcast the block content editing proposal, so that a node in the block chain votes for the block content editing proposal; determining an accounting node from authority nodes in the block chain when determining that the nodes with a preset proportion in the block chain cast an agreement ticket through a preset system rule in the block chain;
a sending unit, configured to send secret shares belonging to the authority nodes forming the trapdoors of the chameleon hash function to the billing node, so that the billing node reconstructs the trapdoors of the chameleon hash function after determining that secret shares sent by at least t authority nodes are received, edits the block content in the block content editing proposal according to the trapdoors of the chameleon hash function, and chains up an editing result;
wherein N is a positive integer, and t is a positive integer less than or equal to N.
Optionally, the authority node is any one of N authority nodes generated in the block chain in a voluntary and drawing manner.
Optionally, the accounting node is determined by a system rule preset in the block chain from the authority nodes for voting agreement in the block chain when the nodes with a preset proportion in the block chain are determined and the authority nodes with the proportion larger than the preset number vote agreement.
Optionally, the at least t permission nodes are permission nodes for agreeing to the vote.
Optionally, the accounting node is determined based on a value of a preset number of bits in a hash result after performing hash operation on a consensus value approved by all authority nodes and incapable of being tampered by a system rule preset in the block chain to obtain the hash result.
Optionally, the consensus value used by the system rule preset in the blockchain every time the accounting node is determined is different.
Optionally, after the verification organization generates the trapdoor of the chameleon hash function, the secret share to which the authority node of the trapdoor constituting the chameleon hash function belongs is distributed to the authority node after the trapdoor is split into N secret shares in a verifiable secret sharing manner.
In a fourth aspect, an embodiment of the present invention provides an apparatus for editing a block in a blockchain, including:
the system comprises an acquisition unit, a storage unit and a processing unit, wherein the acquisition unit is used for acquiring a block content editing proposal sent by an authority node and a secret share of the authority node forming a trapdoor of a chameleon hash function; the secret share of the authority nodes of the trapdoors forming the chameleon hash function is sent after the authority nodes broadcast the block content editing proposal and determine accounting nodes from the authority nodes in the block chain when determining that the nodes with preset proportion in the block chain cast an agreement ticket through a preset system rule in the block chain; the authority node is any one of N authority nodes generated in the block chain;
the processing unit is used for determining the trapdoor of the chameleon hash function according to at least t secret shares after the secret shares sent by at least t permission nodes are determined to be received and verified; editing the block contents in the block content editing proposal according to the trapdoor of the chameleon hash function, and chaining the editing result;
wherein N is a positive integer, and t is a positive integer less than or equal to N.
Optionally, the authority node is any one of N authority nodes generated in the block chain in a voluntary and drawing manner.
Optionally, the accounting node is determined by a system rule preset in the block chain from the authority nodes for voting agreement in the block chain when the nodes with a preset proportion in the block chain are determined and the authority nodes with the proportion larger than the preset number vote agreement.
Optionally, the at least t permission nodes are permission nodes for agreeing to the vote.
Optionally, the accounting node is determined based on a value of a preset number of bits in a hash result after performing hash operation on a consensus value approved by all authority nodes and incapable of being tampered by a system rule preset in the block chain to obtain the hash result.
Optionally, the consensus value used by the system rule preset in the blockchain every time the accounting node is determined is different.
Optionally, after the verification organization generates the trapdoor of the chameleon hash function, the secret share to which the authority node of the trapdoor constituting the chameleon hash function belongs is distributed to the authority node after the trapdoor is split into N secret shares in a verifiable secret sharing manner.
Optionally, the processing unit is specifically configured to:
and inputting the at least t secret shares into a Lagrange difference formula to obtain a polynomial function, and solving the polynomial function to obtain the trapdoor of the chameleon hash function.
Optionally, the processing unit is further configured to:
determining whether the editing result is successfully linked, if so, determining that the accounting node obtains rewards; otherwise, determining the guarantee fee which is punished and not paid by the accounting node.
Optionally, the processing unit is further configured to:
and after the fact that the chain is successfully edited is determined, informing the certification authority to generate a trap door of a new chameleon hash function.
In a fifth aspect, an embodiment of the present invention further provides a computing device, including:
a memory for storing program instructions;
and the processor is used for calling the program instructions stored in the memory and executing the method for editing the blocks in the block chain according to the obtained program.
In a sixth aspect, an embodiment of the present invention further provides a computer-readable non-volatile storage medium, which includes computer-readable instructions, and when the computer-readable instructions are read and executed by a computer, the computer is caused to execute the method for editing a block in a block chain.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram of a system architecture according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a method for editing a block in a blockchain according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating a method for editing a block in a blockchain according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating a method for editing a block in a blockchain according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an apparatus for editing a block in a blockchain according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an apparatus for editing a block in a blockchain according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 illustrates a system architecture suitable for use in embodiments of the present invention, which may include a plurality of clients 100, a blockchain platform 200, and a plurality of certification authorities 300.
The ue 100 is configured to communicate with the blockchain platform 200, and send the transaction proposal to the blockchain platform 200 for uplink storage. The client 100 is a client of each organization constituting a federation chain.
The certification authority 300 is configured to run a chameleon hash key generation algorithm to generate a public key and a trapdoor of a chameleon hash function.
The blockchain platform 200 is composed of a plurality of blockchain nodes 210, and is in communication with the user terminal 100 and the certification authority 300, and is configured to process and store the transaction proposal sent by the user terminal 100, and distribute the public key and the trapdoor sent by the certification authority 300. The blockchain nodes 210 can communicate with each other, and each blockchain node 210 includes a plurality of blocks for storing the transaction proposal sent by the user terminal 100.
It should be noted that the structure shown in fig. 1 is only an example, and the embodiment of the present invention is not limited thereto.
Based on the above description, fig. 2 shows in detail a flow of a method for editing a tile in a blockchain according to an embodiment of the present invention, where the flow may be performed by an apparatus for editing a tile in a blockchain.
As shown in fig. 2, the process specifically includes:
step 201, the authority node generates a block content editing proposal, and broadcasts the block content editing proposal; to cause nodes in the blockchain to vote for the blockcontent editing proposal; and determining an accounting node from the authority nodes of the block chain when determining that the nodes with the preset proportion in the block chain cast the agreement ticket according to the preset system rule in the block chain.
In the embodiment of the present invention, the authority node may be any one of N authority nodes generated in the block chain, specifically, any one of N authority nodes generated in the block chain in a voluntary and lottery manner. The N is a positive integer.
The blockchain in the embodiment of the invention can be a alliance chain, and N permission nodes are generated in a voluntary and drawing mode. For example, each of the volunteers and the draw, which preferably uses a Verifiable Random Function (VRF), produces half of the authority nodes, and the volunteers take turns each round.
Furthermore, it is provided that the block editing operation is performed by an authority node. Each authority node needs to store a certain amount of guarantee money in the intelligent contract of the alliance chain in advance, and the purpose is to prevent malicious behaviors of the node (for example, once a node initiates a malicious block modification proposal, the guarantee money of the node is penalized).
When the historical block content in the alliance chain needs to be modified, any authority node can initiate a block content editing proposal. The block content editing proposal can comprise information such as original content, block height of the original content, block hash of the original content, target content, modification reason, and proposal signature.
After the block content editing proposal is generated, the block content editing proposal can be broadcast to all nodes in the block chain. Therefore, the node in the block chain votes for the proposal of editing the content of the block, and the voting mainly votes for the rationality of the proposal of editing the content of the block to determine whether the proposal is rational or not. That is, after other nodes on the alliance chain receive the broadcast, the reasonability of the proposal of editing the block content is verified, and whether the editing is agreed or not is voted.
The system rule preset in the block chain can select the accounting node when determining that the nodes in the block chain in the preset proportion cast the agreement ticket. The preset ratio can be set empirically. The system rules may be implemented by intelligent contracts in the blockchain, or by underlying system contracts in the blockchain.
It should be noted that, when determining the accounting node, the system rule may be determined by the following manner:
in a first mode
And when the preset system rule determines the nodes in the block chain in the preset proportion and the authority nodes more than the preset number cast the agreement tickets, determining the accounting nodes from the authority nodes cast the agreement tickets in the block chain. The preset number may be set empirically, it should be noted that at least if t is greater than t, the number of all authority nodes may be required. T is a positive integer less than or equal to N.
The number of the authority nodes which need to meet the agreement ticket throwing is larger than t, and the authority nodes are used for determining the accounting nodes. At this time, at least t permission nodes in the secret shares sent by at least t permission nodes received by the accounting node should also be permission nodes for voting the agreement ticket.
Mode two
When the preset system rule determines that the nodes with the preset proportion in the block chain cast the agreement ticket, the accounting node can be determined from the authority nodes which do not cast the agreement ticket in the block chain.
In this case, the permission node for agreeing to the vote may not be included in the nodes for agreeing to the vote, and at this time, the accounting node may also be determined from the permission nodes for not agreeing to the vote, so as to avoid the problem that the accounting node cannot be elected.
When the accounting node is determined, the preset system rule can perform hash operation on the consensus value which is approved by all authority nodes and cannot be tampered to obtain a hash result, and then the accounting node is determined based on the numerical value of the preset digits in the hash result. The common identification value that is approved by all the authority nodes and cannot be tampered with can be set according to experience, for example, the block size of the previous block, the market price of the bitcoin corresponding to the time of the previous round of block generation, and the like. The preset number of bits can be set empirically, such as the last four bits, the first four bits, and so on of the hash result. And the authority node corresponding to the numerical value of the preset digit is the accounting node. It should be noted that the consensus value used each time the accounting node is determined by the system rule preset in the blockchain is different.
Step 202, the authority node sends the secret share to which the authority node of the trapdoor forming the chameleon hash function belongs to the accounting node.
When the accounting nodes are selected, the authority nodes can send secret shares to which the authority nodes of the trapdoor forming the chameleon hash function belong to the accounting nodes. The authority nodes can be at least m authority nodes for voting the agreement ticket, and also can be at least m authority nodes for not voting the agreement ticket, which are determined by different modes of determining the accounting node. Wherein m is a positive integer less than or equal to N and greater than or equal to t.
Before generating the block content editing proposal, the certification authority needs to generate the trapdoor of the chameleon hash function, and then the trapdoor is divided into N secret shares by a verifiable secret sharing mode and then distributed to each authority node. Wherein a secret share is correspondingly sent to an authority node.
And after determining that secret shares sent by at least t permission nodes are received, the accounting node reconstructs the trapdoor of the chameleon hash function, edits the block content in the block content editing proposal according to the trapdoor of the chameleon hash function, and links the editing result.
For safety, after determining that the editing result is successfully chained, the billing node or the preset system rule may notify the certification authority to generate a trapdoor of a new chameleon hash function for the next round of block editing.
The process executed by the accounting node may be as shown in fig. 3, and specifically includes:
step 301, the accounting node obtains the block content editing proposal sent by the authority node and the secret share of the authority node forming the trapdoor of the chameleon hash function.
The secret share of the authority node of the trapdoor forming the chameleon hash function is sent after the authority node determines the accounting node from the authority nodes in the block chain when broadcasting the block content editing proposal and determining the nodes with the preset proportion in the block chain to cast the agreement ticket through the preset system rule in the block chain.
Step 302, after the accounting node determines that the secret shares sent by at least t permission nodes are received and passes verification, the trapdoor of the chameleon hash function is determined according to at least t secret shares.
Specifically, the accounting node inputs at least t secret shares into a Lagrange difference formula to obtain a polynomial function, and the polynomial function is solved to obtain the trapdoor of the chameleon hash function.
When the secret share is verified, a preset verification formula can be used for verification, and the password share is input into the formula to judge whether the secret share is established.
Step 303, the accounting node edits the block content in the block content editing proposal according to the trapdoor of the chameleon hash function, and links the editing result.
After the billing node obtains the trap of the chameleon hash function, the chameleon hash collision algorithm can be executed according to the trap of the chameleon hash function, a new chameleon random number is determined, the block content in the block content editing proposal is edited, and the hash value of the edited block is ensured to be consistent with the hash value of the block before editing. And the accounting node packs the block contents before and after editing, the transaction signature, the chameleon random number, the VRF random value and the like into a new data block to obtain an editing result, and chaining the editing result.
In addition, the accounting node also determines whether the editing result is successfully linked, and if so, determines that the accounting node obtains the reward; otherwise, determining the guarantee fee which is punished and not paid by the accounting node. That is to say, the embodiment of the present invention is provided with a guarantee fund system, and when the existence of the malicious behavior is found, the guarantee fund is penalized.
In order to better explain the embodiment of the present invention, the flow of editing the tiles in the blockchain will be described below in a specific implementation scenario.
As shown in fig. 4, includes:
at step 401, a federation chain is initialized.
Several commercial organizations or industry organizations build an editable alliance block chain (alliance chain for short), and the hash function of the alliance chain adopts chameleon hash function;
n permission nodes are generated through a voluntary mode and a drawing mode (half of the permission nodes are generated respectively through the voluntary mode and the drawing mode, the drawing mode preferably adopts VRF, the voluntary mode can be carried out in turn in each turn), and the specified block editing operation is implemented by the permission nodes. Each authority node needs to store a certain amount of guarantee money in the intelligent contract of the alliance chain in advance, and the purpose is to prevent malicious behaviors of the node (for example, once a node initiates a malicious block modification proposal, the guarantee money of the node is penalized).
At step 402, trapdoor generation and key distribution.
An Authority Certification Authority (preferably, a China Financial Certification Authority (CFCA) in this embodiment) runs chameleon hash key generation algorithm HG ═ hk, tk, and generates public key hk and trapdoor (private key) tk of the chameleon hash function. Wherein the public key is made public to all nodes.
The trapdoor tk is divided into N secret shares by a verifiable secret sharing mode, the N secret shares are distributed to N authority nodes on a alliance chain, and meanwhile, the trapdoor tk can be reconstructed only when not less than t authority nodes cooperate together (preferably t is more than N/2). The process is as follows:
(1) system parameters: selecting a large prime number p, q is a large prime factor of p-1, g is a q-order element, the triples (p, q, g) are public, t is a threshold value, N is the number of participants, tk is the secret to be shared, and the secret space and the share space are both finite fields GF (p).
(2) Secret distribution: randomly selecting a t-1 degree polynomial f (x) a on GF (p)0+a1x+a2x2+…+at-1xt -1Satisfies the condition that f (0) is a0Tk, then the secret shares tk are calculatedj=f(xj) (mod q) and distributed to the participants, where j ═ 1,2, …, n, while disclosing commitments to coefficients of function f
Figure BDA0002930319010000121
Wherein i ═ (0,1,2, …, t-1).
Step 403, initiate a block content editing proposal.
The alliance chain performs data chaining and block packing operations as the traditional block chain, and executes a chameleon hash generation algorithm to obtain a hash value H of a block which is CH (hk, m; r) (m is the content of the block, and r is a random number). When the historical data content (original content) m in the alliance chain needs to be modified into the target content m ', any authority node can initiate a block content editing proposal psi (the proposal content comprises the original content m, the block height H of the original content, the block hash H of the original content, the target content m', the modification reason Rea and the presenter signature Sig), and then the proposal is broadcast to other nodes in the alliance chain.
At step 404, the node verifies the vote.
After other nodes on the alliance chain receive the broadcast, the reasonability of the proposal content is verified, and whether the proposal content agrees to be edited or not is voted. And if nodes exceeding the preset proportion agree to edit, entering the next step. It should be noted here that at least more than t permission nodes need to be guaranteed to agree.
Step 405, the accounting node selects and reconstructs the trapdoors of the chameleon hash function.
And selecting one accounting node from the authority nodes (marked as m) for voting the agreement, and carrying out block editing and block packaging operations by the accounting node. The specific method comprises the following steps: performing SHA256 operation on a tamper-proof common identification value (such as the block size of the last block and the bitcoin market price corresponding to the last round of block time) approved by all authority nodes, and defining the last four bits (16 system is converted into 10 system) output by SHA256 to determine a unique accounting node, and performing block editing operation by the accounting node.
And the rest nodes for agreeing to the ticket send the trap door secret share held by the rest nodes to the accounting node. After the accounting node collects at least t secret shares and verifies the secret shares, the chameleon hash trapdoor tk can be reconstructed. The specific process is as follows:
(1) and (3) verification algorithm: the accounting node verifies after receiving the secret share
Figure BDA0002930319010000131
j) is determined as (1, 2., N)), if yes, the share is valid, and the next step is carried out;
(2) secret reconstruction: and when at least t secret shares are verified, the accounting node obtains a polynomial function f (x) by using a Lagrangian difference formula, and the function value f (0) is calculated to be the chameleon Hash trapdoor tk.
At step 406, block editing and packaging uplink.
After grasping the trapdoor tk, the accounting node executes a chameleon hash collision algorithm HC (tk, (H, m, r), m '), determines a new chameleon random number r ', modifies the original content m into the target content m ', and simultaneously ensures that the edited chunk hash value is consistent with the chunk hash value before editing, i.e. the chameleon hash verification function HV (hk, m, (H, r)), (H, r ')) (HV (hk, m '))) before and after editing is 1.
And the accounting node packs the block content before and after modification, the transaction signature, the chameleon random number, the VRF random value and the like into a new data block and broadcasts the new data block. And verifying the signature validity by other nodes on the alliance chain, executing a chameleon Hash verification function, and verifying whether the accounting node modifies the content of the specific block on the premise of not changing the Hash value output by the historical block. If the verification is passed, the local blockchain data is updated (note that the historical block content before modification and the signature of the modifier are recorded and stored in a local database for the purpose of facilitating future audit and accountability). If the new block is successfully linked up, the accounting node will get a certain token award; otherwise, if malicious behavior is found to exist, its pre-paid deposit will be penalized.
For safety, after each round of block editing is completed, the chameleon hash trapdoor of the next round is regenerated, and a new secret share is distributed to the nodes on the chain.
The embodiment of the invention has the following beneficial effects:
1. trapdoor distribution and reconstruction based on a verifiable secret sharing scheme.
Aiming at the defect that the chameleon Hash trapdoor is usually controlled by a single node, on the basis of the traditional secret sharing scheme, a verifiable secret sharing mode is provided, and a public commitment and verification algorithm is added to detect a node trying to forge a secret share, so that the credible chameleon Hash trapdoor distribution and reconstruction are realized, and the safety and the credibility of a trapdoor key are guaranteed.
2. Decentralization of tile content editing rights.
The embodiment of the invention generates random accounting nodes (the function is that an attacker cannot know which node is selected in advance) by a method of hashing the constantly changing consensus value of each round, and the accounting nodes carry out block content modification operation, so that the decentralization of the block editing right is realized.
3. Guarantee fund system and voting mechanism.
On one hand, the embodiment of the invention adopts a guarantee fund system to prevent the node from initiating a malicious block content modification proposal; on the other hand, through a voting mechanism, when only nodes exceeding a preset proportion agree to edit the block content, the block editing operation can be implemented, and both the modified content and the signature of a modifier are recorded in a new block, so that audit and accountability are facilitated in the future.
In the embodiment of the invention, the authority node generates a block content editing proposal, broadcasts the block content editing proposal so as to enable the node in the block chain to vote for the block content editing proposal, determines a bookkeeping node from the authority nodes in the block chain when the nodes with preset proportion in the block chain cast an agreement ticket through a preset system rule in the block chain, sends the secret share of the authority nodes forming the trapdoor of the chameleon hash function to the bookkeeping node so as to enable the bookkeeping node to reconstruct the trapdoor of the chameleon hash function after determining to receive the secret shares sent by at least t authority nodes, edits the block content in the block content editing proposal according to the trapdoor of the chameleon hash function, and uplinks the editing result. The secret shares are sent to the accounting node after the node in the block chain is determined to pass the block content editing proposal vote, so that the account node reconstructs the trapdoor of the chameleon hash function after the secret shares are verified, the defect that the trapdoor is controlled by a single node can be avoided, and the safety of data storage is guaranteed.
Based on the same technical concept, fig. 5 exemplarily shows a structure of an apparatus for editing a tile in a blockchain, which can perform a process of editing a tile in a blockchain according to an embodiment of the present invention.
As shown in fig. 5, the apparatus specifically includes:
a generating unit 501, configured to generate a proposal for editing the content of the block, where the authority node is any one of N authority nodes generated in the block chain;
a processing unit 502, configured to broadcast the block content editing proposal, so that a node in the block chain votes for the block content editing proposal; determining an accounting node from authority nodes in the block chain when determining that the nodes with a preset proportion in the block chain cast an agreement ticket through a preset system rule in the block chain;
a sending unit 503, configured to send the secret shares belonging to the authority nodes that form the trapdoors of the chameleon hash function to the billing node, so that the billing node reconstructs the trapdoors of the chameleon hash function after determining that at least t secret shares sent by the authority nodes are received, and edits the block content in the block content editing proposal according to the trapdoors of the chameleon hash function, and chains up the editing result;
wherein N is a positive integer, and t is a positive integer less than or equal to N.
Optionally, the authority node is any one of N authority nodes generated in the block chain in a voluntary and drawing manner.
Optionally, the accounting node is determined by a system rule preset in the block chain from the authority nodes for voting agreement in the block chain when the nodes with a preset proportion in the block chain are determined and the authority nodes with the proportion larger than the preset number vote agreement.
Optionally, the at least t permission nodes are permission nodes for agreeing to the vote.
Optionally, the accounting node is determined based on a value of a preset number of bits in a hash result after performing hash operation on a consensus value approved by all authority nodes and incapable of being tampered by a system rule preset in the block chain to obtain the hash result.
Optionally, the consensus value used by the system rule preset in the blockchain every time the accounting node is determined is different.
Optionally, after the verification organization generates the trapdoor of the chameleon hash function, the secret share to which the authority node of the trapdoor constituting the chameleon hash function belongs is distributed to the authority node after the trapdoor is split into N secret shares in a verifiable secret sharing manner.
Based on the same technical concept, fig. 6 exemplarily shows a structure of an apparatus for editing a tile in a blockchain, which can perform a process of editing a tile in a blockchain according to an embodiment of the present invention.
As shown in fig. 6, the apparatus specifically includes:
an obtaining unit 601, configured to obtain a block content editing proposal sent by an authority node and a secret share of the authority node forming a trapdoor of a chameleon hash function; the secret share of the authority nodes of the trapdoors forming the chameleon hash function is sent after the authority nodes broadcast the block content editing proposal and determine accounting nodes from the authority nodes in the block chain when determining that the nodes with preset proportion in the block chain cast an agreement ticket through a preset system rule in the block chain; the authority node is any one of N authority nodes generated in the block chain;
the processing unit 602 is configured to determine, after determining that the secret shares sent by at least t permission nodes are received and the verification passes, a trapdoor of the chameleon hash function according to the at least t secret shares; editing the block contents in the block content editing proposal according to the trapdoor of the chameleon hash function, and chaining the editing result;
wherein N is a positive integer, and t is a positive integer less than or equal to N.
Optionally, the authority node is any one of N authority nodes generated in the block chain in a voluntary and drawing manner.
Optionally, the accounting node is determined by a system rule preset in the block chain from the authority nodes for voting agreement in the block chain when the nodes with a preset proportion in the block chain are determined and the authority nodes with the proportion larger than the preset number vote agreement.
Optionally, the at least t permission nodes are permission nodes for agreeing to the vote.
Optionally, the accounting node is determined based on a value of a preset number of bits in a hash result after performing hash operation on a consensus value approved by all authority nodes and incapable of being tampered by a system rule preset in the block chain to obtain the hash result.
Optionally, the consensus value used by the system rule preset in the blockchain every time the accounting node is determined is different.
Optionally, after the verification organization generates the trapdoor of the chameleon hash function, the secret share to which the authority node of the trapdoor constituting the chameleon hash function belongs is distributed to the authority node after the trapdoor is split into N secret shares in a verifiable secret sharing manner.
Optionally, the processing unit 602 is specifically configured to:
and inputting the at least t secret shares into a Lagrange difference formula to obtain a polynomial function, and solving the polynomial function to obtain the trapdoor of the chameleon hash function.
Optionally, the processing unit 602 is further configured to:
determining whether the editing result is successfully linked, if so, determining that the accounting node obtains rewards; otherwise, determining the guarantee fee which is punished and not paid by the accounting node.
Optionally, the processing unit 602 is further configured to:
and after the fact that the chain is successfully edited is determined, informing the certification authority to generate a trap door of a new chameleon hash function.
Based on the same technical concept, an embodiment of the present invention further provides a computing device, including:
a memory for storing program instructions;
and the processor is used for calling the program instructions stored in the memory and executing the method for editing the blocks in the block chain according to the obtained program.
Based on the same technical concept, embodiments of the present invention further provide a computer-readable non-volatile storage medium, which includes computer-readable instructions, and when the computer-readable instructions are read and executed by a computer, the computer-readable instructions cause the computer to perform the method for editing the blocks in the block chain.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (36)

1. A method for editing a block in a blockchain, comprising:
generating a block content editing proposal by using an authority node, wherein the authority node is any one of N authority nodes generated in a block chain;
the authority node broadcasts the block content editing proposal so that a node in the block chain votes for the block content editing proposal; determining an accounting node from authority nodes in the block chain when determining that the nodes with a preset proportion in the block chain cast an agreement ticket through a preset system rule in the block chain;
the authority node sends the secret shares to which the authority nodes forming the trapdoors of the chameleon hash function belong to the accounting node, so that the accounting node reconstructs the trapdoors of the chameleon hash function after determining that at least t secret shares sent by the authority nodes are received, edits the block content in the block content editing proposal according to the trapdoors of the chameleon hash function, and chains up the editing result;
wherein N is a positive integer, and t is a positive integer less than or equal to N.
2. The method of claim 1, wherein the permission node is any one of N permission nodes generated by voluntary and lottery in a blockchain.
3. The method of claim 1, wherein the accounting node is determined by a preset system rule in the block chain from authority nodes in the block chain for voting agreement when a preset proportion of the nodes in the block chain is determined and more than a preset number of authority nodes in the block chain vote agreement.
4. The method of claim 1, wherein the at least t authority nodes are the authority nodes that vote consent.
5. The method as claimed in claim 1, wherein the accounting node is determined based on a value of a preset number of bits in a hash result obtained by hashing a common identification value approved by all authority nodes and not tampered with by a preset system rule in the block chain.
6. The method of claim 5, wherein the consensus value used each time the accounting node is determined by a preset system rule in the blockchain is different.
7. The method as claimed in any one of claims 1 to 6, wherein the secret shares to which the authority nodes of the trapdoors constituting the chameleon hash function belong are distributed to the authority nodes after the trapdoors of the chameleon hash function are generated by an authentication authority and the trapdoors are split into N secret shares by means of verifiable secret sharing.
8. A method for editing a block in a blockchain, comprising:
the accounting node acquires a block content editing proposal sent by the authority node and the secret share of the authority node forming a trapdoor of a chameleon hash function; the secret share of the authority nodes of the trapdoors forming the chameleon hash function is sent after the authority nodes broadcast the block content editing proposal and determine accounting nodes from the authority nodes in the block chain when determining that the nodes with preset proportion in the block chain cast an agreement ticket through a preset system rule in the block chain; the authority node is any one of N authority nodes generated in the block chain;
after the accounting node determines that the secret shares sent by at least t permission nodes are received and passes verification, the trapdoor of the chameleon hash function is determined according to the at least t secret shares;
the accounting node edits the block content in the block content editing proposal according to the trapdoor of the chameleon hash function, and links the editing result;
wherein N is a positive integer, and t is a positive integer less than or equal to N.
9. The method of claim 8, wherein the permission node is any one of N permission nodes generated by voluntary and lottery in a blockchain.
10. The method of claim 8, wherein the accounting node is determined by a preset system rule in the block chain from the authority nodes for voting agreement in the block chain when a preset proportion of the nodes in the block chain is determined and more than a preset number of authority nodes vote agreement.
11. The method of claim 8, wherein the at least t authority nodes are the authority nodes that vote consent.
12. The method as claimed in claim 8, wherein the accounting node is determined based on a value of a preset number of bits in a hash result obtained by hashing a common identification value approved by all authority nodes and not tampered with by a preset system rule in the block chain.
13. The method of claim 12, wherein the consensus value used each time the accounting node is determined by a preset system rule in the blockchain is different.
14. The method of claim 8, wherein the secret shares to which the authority nodes of the trapdoors constituting the chameleon hash function belong are distributed to the authority nodes after the trapdoors of the chameleon hash function are generated by an authentication authority and the trapdoors are split into N secret shares by means of verifiable secret sharing.
15. The method of claim 8, wherein the accounting node determining the trapdoor of the chameleon hash function from at least t secret shares comprises:
and the accounting node inputs the at least t secret shares into a Lagrange difference value formula to obtain a polynomial function, and the polynomial function is solved to obtain the trapdoor of the chameleon hash function.
16. The method of claim 8, wherein the method further comprises:
the accounting node determines whether the editing result is successfully linked, and if so, determines that the accounting node obtains rewards; otherwise, determining the guarantee fee which is punished and not paid by the accounting node.
17. The method of any of claims 8 to 16, further comprising:
and after determining that the chain is successfully edited in the editing result, the accounting node informs the certification authority to generate a trapdoor of a new chameleon hash function.
18. An apparatus for editing a block in a blockchain, comprising:
the generating unit is used for generating a block content editing proposal, and the authority node is any one of N authority nodes generated in a block chain;
a processing unit, configured to broadcast the block content editing proposal, so that a node in the block chain votes for the block content editing proposal; determining an accounting node from authority nodes in the block chain when determining that the nodes with a preset proportion in the block chain cast an agreement ticket through a preset system rule in the block chain;
a sending unit, configured to send secret shares belonging to the authority nodes forming the trapdoors of the chameleon hash function to the billing node, so that the billing node reconstructs the trapdoors of the chameleon hash function after determining that secret shares sent by at least t authority nodes are received, edits the block content in the block content editing proposal according to the trapdoors of the chameleon hash function, and chains up an editing result;
wherein N is a positive integer, and t is a positive integer less than or equal to N.
19. The apparatus of claim 18, wherein the permission node is any one of N permission nodes generated by voluntary and lottery in a blockchain.
20. The apparatus of claim 18, wherein the accounting node is determined by a predetermined system rule in the blockchain from the authority nodes casting agreement tickets in the blockchain when a predetermined proportion of the nodes in the blockchain are determined and more than a predetermined number of authority nodes cast agreement tickets.
21. The apparatus of claim 18, wherein the at least t authority nodes are the authority nodes that vote consent.
22. The apparatus of claim 18, wherein the accounting node is determined based on a value of a preset number of bits in a hash result obtained by hashing a common identification value approved by all authority nodes and not tampered with by a preset system rule in the blockchain.
23. The apparatus of claim 22, wherein a consensus value used by a preset system rule in the blockchain each time the accounting node is determined is different.
24. The apparatus of claim 18, wherein the secret shares to which the authority nodes of the trapdoors constituting the chameleon hash function belong are distributed to the authority nodes after the trapdoors of the chameleon hash function are generated by an authentication authority and the trapdoors are split into N secret shares by means of verifiable secret sharing.
25. An apparatus for editing a block in a blockchain, comprising:
the system comprises an acquisition unit, a storage unit and a processing unit, wherein the acquisition unit is used for acquiring a block content editing proposal sent by an authority node and a secret share of the authority node forming a trapdoor of a chameleon hash function; the secret share of the authority nodes of the trapdoors forming the chameleon hash function is sent after the authority nodes broadcast the block content editing proposal and determine accounting nodes from the authority nodes in the block chain when determining that the nodes with preset proportion in the block chain cast an agreement ticket through a preset system rule in the block chain; the authority node is any one of N authority nodes generated in the block chain;
the processing unit is used for determining the trapdoor of the chameleon hash function according to at least t secret shares after the secret shares sent by at least t permission nodes are determined to be received and verified; editing the block contents in the block content editing proposal according to the trapdoor of the chameleon hash function, and chaining the editing result;
wherein N is a positive integer, and t is a positive integer less than or equal to N.
26. The apparatus of claim 25, wherein the permission node is any one of N permission nodes generated by voluntary and lottery in a blockchain.
27. The apparatus of claim 25, wherein the accounting node is determined by a predetermined system rule in the blockchain from the authority nodes casting agreement tickets in the blockchain when a predetermined proportion of the nodes in the blockchain are determined and more than a predetermined number of authority nodes cast agreement tickets.
28. The apparatus of claim 25, wherein the at least t authority nodes are the authority nodes that vote consent.
29. The apparatus of claim 25, wherein the accounting node is determined based on a value of a preset number of bits in a hash result obtained by hashing a common identification value approved by all authority nodes and not tampered with by a preset system rule in the blockchain.
30. The apparatus of claim 29, wherein the consensus value used each time the accounting node is determined by a preset system rule in the blockchain is different.
31. The apparatus of claim 25, wherein the secret shares to which the authority nodes of the trapdoors constituting the chameleon hash function belong are distributed to the authority nodes after the trapdoors of the chameleon hash function are generated by an authentication authority and the trapdoors are split into N secret shares by means of verifiable secret sharing.
32. The apparatus as recited in claim 25, said processing unit to:
and inputting the at least t secret shares into a Lagrange difference formula to obtain a polynomial function, and solving the polynomial function to obtain the trapdoor of the chameleon hash function.
33. The apparatus as recited in claim 25, said processing unit to further:
determining whether the editing result is successfully linked, if so, determining that the accounting node obtains rewards; otherwise, determining the guarantee fee which is punished and not paid by the accounting node.
34. The apparatus of any of claims 25 to 33, wherein the processing unit is further configured to:
and after the fact that the chain is successfully edited is determined, informing the certification authority to generate a trap door of a new chameleon hash function.
35. A computing device, comprising:
a memory for storing program instructions;
a processor for calling program instructions stored in said memory to perform the method of any of claims 1 to 17 in accordance with the obtained program.
36. A computer readable non-transitory storage medium including computer readable instructions which, when read and executed by a computer, cause the computer to perform the method of any one of claims 1 to 17.
CN202110146074.6A 2021-02-02 2021-02-02 Method and device for editing blocks in block chain Active CN112887078B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110146074.6A CN112887078B (en) 2021-02-02 2021-02-02 Method and device for editing blocks in block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110146074.6A CN112887078B (en) 2021-02-02 2021-02-02 Method and device for editing blocks in block chain

Publications (2)

Publication Number Publication Date
CN112887078A true CN112887078A (en) 2021-06-01
CN112887078B CN112887078B (en) 2022-10-14

Family

ID=76056788

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110146074.6A Active CN112887078B (en) 2021-02-02 2021-02-02 Method and device for editing blocks in block chain

Country Status (1)

Country Link
CN (1) CN112887078B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113935715A (en) * 2021-10-21 2022-01-14 中国银行股份有限公司 Technical scheme proposal management method and device based on block chain
CN115118429A (en) * 2022-03-22 2022-09-27 西安电子科技大学 Verifiable and fully editable block chain system, method, equipment and terminal
WO2023035957A1 (en) * 2021-09-09 2023-03-16 华为技术有限公司 Communication method and apparatus

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160072623A1 (en) * 2013-04-30 2016-03-10 Thomson Licensing Threshold encryption using homomorphic signatures
CN106411503A (en) * 2016-11-28 2017-02-15 中国银行股份有限公司 Accounting method, accounting system, voting node and accounting node under block chain voting and accounting mode
CN110086599A (en) * 2019-04-24 2019-08-02 电子科技大学 Hash calculation method and label decryption method based on homomorphism chameleon hash function
US20200201964A1 (en) * 2018-12-20 2020-06-25 International Business Machines Corporation File verification database system
WO2020133326A1 (en) * 2018-12-29 2020-07-02 北京建极练科技有限公司 Blockchain generation method and system, and computer storage medium and electronic device
CN111526009A (en) * 2020-04-09 2020-08-11 西南交通大学 Forward security editable block chain construction method suitable for alliance chain
CN111641712A (en) * 2020-05-29 2020-09-08 深圳市网心科技有限公司 Block chain data updating method, device, equipment, system and readable storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160072623A1 (en) * 2013-04-30 2016-03-10 Thomson Licensing Threshold encryption using homomorphic signatures
CN106411503A (en) * 2016-11-28 2017-02-15 中国银行股份有限公司 Accounting method, accounting system, voting node and accounting node under block chain voting and accounting mode
US20200201964A1 (en) * 2018-12-20 2020-06-25 International Business Machines Corporation File verification database system
WO2020133326A1 (en) * 2018-12-29 2020-07-02 北京建极练科技有限公司 Blockchain generation method and system, and computer storage medium and electronic device
CN110086599A (en) * 2019-04-24 2019-08-02 电子科技大学 Hash calculation method and label decryption method based on homomorphism chameleon hash function
CN111526009A (en) * 2020-04-09 2020-08-11 西南交通大学 Forward security editable block chain construction method suitable for alliance chain
CN111641712A (en) * 2020-05-29 2020-09-08 深圳市网心科技有限公司 Block chain data updating method, device, equipment, system and readable storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
李梦炜: "基于联盟区块链的中国福利彩票***设计", 《信息技术与网络安全》 *
束红: "基于陷门哈希函数的无证书签密方案", 《淮阳师范学院学报》 *
袁勇等: "可编辑区块链:模型、技术与方法", 《自动化学报》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023035957A1 (en) * 2021-09-09 2023-03-16 华为技术有限公司 Communication method and apparatus
CN113935715A (en) * 2021-10-21 2022-01-14 中国银行股份有限公司 Technical scheme proposal management method and device based on block chain
CN115118429A (en) * 2022-03-22 2022-09-27 西安电子科技大学 Verifiable and fully editable block chain system, method, equipment and terminal

Also Published As

Publication number Publication date
CN112887078B (en) 2022-10-14

Similar Documents

Publication Publication Date Title
CN112887078B (en) Method and device for editing blocks in block chain
CN113794675B (en) Distributed Internet of things intrusion detection method and system based on block chain and federal learning
EP3449452B1 (en) Implementing logic gate functionality using a blockchain
Li et al. Toward blockchain-based fair and anonymous ad dissemination in vehicular networks
Ziegeldorf et al. Coinparty: Secure multi-party mixing of bitcoins
Abbade et al. Blockchain applied to vehicular odometers
CN113129518B (en) Electric vehicle charging system and resource management method thereof
CN111723387A (en) Block chain-based data decryption method and device
CN110912705A (en) Distributed electronic voting method and system based on block chain
CN112801778B (en) Alliance type bad asset block chain system
CN113256297A (en) Data processing method, device and equipment based on block chain and readable storage medium
CN112291062B (en) Voting method and device based on block chain
Qu et al. A electronic voting protocol based on blockchain and homomorphic signcryption
CN103812864A (en) Sybil attack detection method in online social network
CN111131298A (en) POC (Point of sale) efficient consensus mechanism based on credit decentralization and implementation method
Asfia et al. A blockchain construct for energy trading against sybil attacks
Maffiola et al. Goliath: A decentralized framework for data collection in intelligent transportation systems
Wang et al. Housing rental scheme based on redactable blockchain
Kiruthika et al. Fusion of IoT, blockchain and artificial intelligence for developing smart cities
Anjan et al. Blockchain based E-voting system for India using UIDAI’s Aadhaar
Bezuidenhout et al. Permissionless blockchain systems as pseudo-random number generators for decentralized consensus
Kamuni et al. Secure energy market against cyber attacks using blockchain
Hu et al. Blockchain‐Enhanced Fair and Efficient Energy Trading in Industrial Internet of Things
Li et al. Cryptoeconomics: Economic Mechanisms Behind Blockchains
Blum et al. Superlight–A permissionless, light-client only blockchain with self-contained proofs and BLS signatures

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant