A block chain anonymous transport protocol based on ring signature

An anonymous transmission and data transmission protocol technology, applied in the field of blockchain anonymous transmission protocol, can solve the problems of poor transmission efficiency, low transmission security, low source reliability and data security, etc., to improve efficiency and efficiency. The effect of communication transmission, increasing source credibility and data security

Active Publication Date: 2018-12-28
SICHUAN UNIV
View PDF4 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a block chain anonymous transmission protocol based on ring signatures, which solves the problem of poor communication efficiency and low transmission security in the existing block chain data transmission protocol, and the block chain The source credibility and data security of the sending and receiving parties are low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A block chain anonymous transport protocol based on ring signature
  • A block chain anonymous transport protocol based on ring signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] A ring-signature-based block chain anonymous transmission protocol provided by a preferred embodiment of the present invention includes the following steps:

[0047] Step 1: The data sender anonymously broadcasts the transmission request;

[0048] Step 2: Sign the communication information of the transmission request, then anonymously authenticate the source identity credibility of the data sender, obtain the credible mechanism and parameters of the transmission request, and issue the transmission request;

[0049] Step 2.1: Sign the communication information of the transmission request through the ring signature self-certification algorithm and the parallel signature algorithm;

[0050] Step 2.2: Use the ring signature verification algorithm to anonymously authenticate the source identity credibility of the data sender;

[0051] Step 2.3: If a rebellious or malicious node is found during the transmission process, the identity of the rebellious node is traced and revok...

Embodiment 2

[0062] On the basis of Embodiment 1, the preferred embodiment of the present invention further includes

[0063] Step 5: Prove the security of the anonymous data transmission protocol;

[0064] Step 5.1: Analyze the types of on-chain or off-chain adversaries, attack conditions, attack forms, attack processes, and attack effects that nodes on the blockchain may face during data transmission;

[0065] Step 5.2: According to the possible attacks analyzed in step 5.1, establish corresponding security threat models respectively, and comprehensively and accurately simulate the environment under attack;

[0066] Step 5.3: After converting the security threat model in step 5.2 into a formal description of attacks in the blockchain environment, construct a challenge response security model for each security target. The security model describes multiple different layers, different objects and different Blockchain attacks for security requirements, and corresponding mathematically diffi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a block chain anonymous transmission protocol based on ring signature, belonging to the technical field of network security. The method comprises steps of 1,anomynously broadcasting a transmission request by a data sender; 2, signing the communication information of the transmission request, anonymously authenticating the trustworthiness of the information source identity of the data sender, obtaining the trustworthiness mechanism and parameters of the transmission request, and issuing the transmission request; 3, the data sender broadcasts and transmits data accordingto the negotiation mechanism and parameters of the step 2; 4, anonymously receiving, verifying and restoring the content of the data by the receiver; Step 5: proving the security of the anonymous datatransfer protocol. The invention solves the problems of poor transmission efficiency and low transmission security of the data transmission protocol on the existing block chain, as well as low sourcereliability and data security of the sending and receiving sides on the block chain, and the invention also solves the problems of low transmission efficiency and low transmission security of the data transmission protocol on the existing block chain.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to a block chain anonymous transmission protocol based on a ring signature. Background technique [0002] Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. It is mainly used in art, law, development, real estate, Internet of Things, insurance and financial industries. It is a chronological A chained data structure that combines data blocks in a sequential manner, and a cryptographically guaranteed non-tamperable and unforgeable distributed ledger. It has the advantages of decentralization, openness, autonomy, information cannot be tampered with, and anonymity. [0003] At present, due to the limited on-chain data processing capability of the blockchain, on the other hand, because the off-chain data cannot be effectively synchronized with the on-chain data,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3255H04L63/08
Inventor 张小松黄可牛伟纳
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products