检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:姚爽 张大伟[1,2] 李勇 王伟[1,2] YAO Shuang;ZHANG Da-Wei;LI Yong;WANG Wei(School of Computer and Information Technology,Beijing Jiaotong University,Beijing 100044,China;Beijing Key Laboratory of Security and Privacy in Intelligent Transportation,Beijing 100044,China;School of Electronic and Information Engineering,Beijing Jiaotong University,Beijing 100044,China)
机构地区:[1]北京交通大学计算机与信息技术学院,北京100044 [2]智能交通数据安全与隐私保护技术北京市重点实验室,北京100044 [3]北京交通大学电子信息工程学院,北京100044
出 处:《密码学报》2022年第4期596-618,共23页Journal of Cryptologic Research
基 金:国家自然科学基金(U21A20463);国家重点研发计划(2020YFB2103802,2018YFC0832300,2018YFC-0832303)。
摘 要:区块链技术是一种去中心化、多方共识、公开透明的新型计算范式,由于其交易数据具有全网分发、多方共识和公开存储验证的特点,因此用户交易内容的隐私保护面临着极大的挑战.本文对现有区块链交易内容隐私保护技术进行研究.首先,在明确区块链交易内容隐私保护含义的基础上,分析了区块链交易内容和交易身份隐私保护在设计思路和实现技术上的差异,厘清了区块链交易内容隐私保护所面临的威胁和挑战;其次,从区块链的交易内容隐藏、隐藏交易验证和隐藏交易监管三个方面比较分析了目前主流区块链平台的交易内容隐私保护技术,详细介绍了不同方案的设计架构、安全机制、密码算法和安全协议等内容,并对比剖析了不同方案在实现架构、算法设计、保护粒度和性能开销方面的优缺点.最后,从监管需求、架构设计和算法优化等方面对未来区块链交易内容隐私保护的研究方向进行了展望.Blockchain technology is a new computation paradigm that is decentralized,multi-party consensual and transparent.Transaction content privacy in blockchain is facing huge challenge for the reason that the blockchain transaction data is distributed over the whole internet,confirmed by multi-parties,stored and verified publicly.This paper focuses on the protection of transaction contents privacy in blockchain.First,the differences in design ideas and implementation technologies between blockchain transaction content and transaction identity privacy protection are analyzed.The specific meaning of privacy protection of blockchain transaction content is clarified.Specially,the security threats and challenges in the blockchain transaction scenario are presented.Second,the transaction contents privacy technology of the present main blockchain platforms are analyzed from aspects of transaction contents hiding,verification of the hidden transaction and regulation of the hidden transaction.Furthermore,a detailed description is given,which includes different transaction contents privacy protection scheme’s architecture design,security mechanism,cryptographic algorithm and protocols.Their advantages and disadvantages are compared.Finally,some suggestions about possible future research directions are given in terms of regulation requirements,architecture design and algorithm optimization.
分 类 号:TP309.7[自动化与计算机技术—计算机系统结构]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.33