Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Permissioned blockchain constructing and controlling method based on Chameleon hash function

A hash function, chameleon technology, applied in the field of permission chain construction and control based on the chameleon hash function, can solve the problems of illegal content or wrong transaction information amending the law, criminal financial order, inability to supervise, etc., and achieve high-efficiency mechanism controllable , improve safety and ensure the effect of safe operation

Active Publication Date: 2018-11-16
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF8 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a license based on the chameleon hash function in order to solve the problem that the illegal content or wrong transaction information in the license chain cannot be modified and the law cannot be supervised to cause crime and the financial order is destroyed. Chain structure and control method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Permissioned blockchain constructing and controlling method based on Chameleon hash function

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] A permission chain construction and management method based on the chameleon hash function provided by the preferred embodiment of the present invention includes the following steps:

[0047] Step 1. Define the chain management mechanism and initialize the permission chain according to the chain management mechanism.

[0048] Step 2. Add a new block to the permissioned chain.

[0049] Step 3. Supervise the blocks in the permission chain according to the chain control mechanism, and control the blocks that do not meet the chain control mechanism.

[0050] Among them, the chain control mechanism includes block format and block control conditions. The block format includes block header and block body, and the block size is 1M. The block header includes the version number version, the hash value pre-hash of the previous block, the random number nonce, the workload proof difficulty value complex, the timestamp timestamp, the Merkle hash tree root node root, the chameleon r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a permissioned blockchain constructing and controlling method based on a Chameleon hash function, wherein the method relates to the field of network security technology. The method comprises the following steps of 1, defining a blockchain control mechanism and initializing the permissioned blockchain according to the blockchain control mechanism; 2, packing transaction records of a block in the network for forming a new block, and adding the new block into the permissioned blockchain; and 3, monitoring the blocks in the permissioned blockchain according to the blockchain control mechanism, and controlling the blocks which do not accord with the blockchain control mechanism. The permissioned blockchain constructing and controlling method realizes global real-time monitoring of all nodes to malicious information and error transaction information on the block; any accessing node can report the error block to the verifying node; controlling of the whole permissionedblockchain by the verifying node is realized through constructing the permissioned blockchain; In a partially de-centering environment, controlling of the permissioned blockchain is realized. All verifying nodes perform effective modification on the blocks through calculating Chameleon hash collision and DBFT consensus, thereby realizing high safety and high controllability of the permissioned blockchain.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a permission chain construction and control method based on the chameleon hash function. Background technique [0002] The concept of blockchain was first formally proposed in 2008, and it can be used to realize public ledgers and unchangeable transaction records in a decentralized environment. Technically, blockchains are often divided into permissionless chains and permissioned chains. The permissionless chain, also known as the public chain, refers to a completely decentralized environment represented by Bitcoin, where any node can participate in the audit and verification of blocks. Permissioned chains include consortium chains and private chains, which refer to the authorization of only a part of verification nodes to participate in the verification of audit blocks, and are characterized by partial decentralization. At present, most commercial applications are sti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q20/06G06Q20/40
CPCG06Q20/065G06Q20/3827G06Q20/3829G06Q20/401
Inventor 张小松黄可牛伟纳
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products