Unlock instant, AI-driven research and patent intelligence for your innovation.

A blockchain anonymous transmission method based on ring signature

An anonymous transmission and ring signature technology, applied in the field of network security, can solve the problems of low transmission security, poor transmission efficiency, low source credibility and data security, etc., to achieve efficient communication transmission, improve efficiency, and increase trust Effects of source trustworthiness and data security

Active Publication Date: 2020-09-29
SICHUAN UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to: provide a block chain anonymous transmission method based on ring signature, which solves the problem of poor transmission efficiency and low transmission security in the communication aspect of the data transmission protocol on the existing block chain, and the block chain The source credibility and data security of the sending and receiving parties are low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blockchain anonymous transmission method based on ring signature
  • A blockchain anonymous transmission method based on ring signature

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] A ring-signature-based block chain anonymous transmission method provided by a preferred embodiment of the present invention includes the following steps:

[0047] Step 1: The data sender anonymously broadcasts the transmission request;

[0048] Step 2: The data sender signs the communication information of the transmission request, then anonymously authenticates the source identity credibility of the data sender, obtains the credible mechanism and parameters of the transmission request, and issues the transmission request;

[0049] Step 2.1: The data sender signs the communication information of the transmission request through the ring signature self-certification algorithm and the parallel signature algorithm;

[0050] Step 2.2: The data receiver anonymously authenticates the source identity credibility of the data sender through the ring signature verification algorithm;

[0051] Step 2.3: If a rebellious or malicious node is found during the transmission process, ...

Embodiment 2

[0062] On the basis of Embodiment 1, the preferred embodiment of the present invention further includes

[0063] Step 5: Prove the security of the anonymous data transmission protocol;

[0064] Step 5.1: Analyze the types of on-chain or off-chain adversaries, attack conditions, attack forms, attack processes, and attack effects that nodes on the blockchain may face during data transmission;

[0065] Step 5.2: According to the possible attacks analyzed in step 5.1, establish corresponding security threat models respectively, and comprehensively and accurately simulate the environment under attack;

[0066] Step 5.3: After converting the security threat model in step 5.2 into a formal description of attacks in the blockchain environment, construct a challenge response security model for each security target. The security model describes multiple different layers, different objects and different Blockchain attacks for security requirements, and corresponding mathematically diffi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain anonymous transmission protocol based on ring signature, belonging to the technical field of network security. The method comprises steps of 1,anomynously broadcasting a transmission request by a data sender; 2, signing the communication information of the transmission request, anonymously authenticating the trustworthiness of the information source identity of the data sender, obtaining the trustworthiness mechanism and parameters of the transmission request, and issuing the transmission request; 3, the data sender broadcasts and transmits data accordingto the negotiation mechanism and parameters of the step 2; 4, anonymously receiving, verifying and restoring the content of the data by the receiver; Step 5: proving the security of the anonymous datatransfer protocol. The invention solves the problems of poor transmission efficiency and low transmission security of the data transmission protocol on the existing block chain, as well as low sourcereliability and data security of the sending and receiving sides on the block chain, and the invention also solves the problems of low transmission efficiency and low transmission security of the data transmission protocol on the existing block chain.

Description

technical field [0001] The invention belongs to the technical field of network security, and relates to a block chain anonymous transmission method based on a ring signature. Background technique [0002] Blockchain is a new application model of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm. It is mainly used in art, law, development, real estate, Internet of Things, insurance and financial industries. It is a chronological A chained data structure that combines data blocks in a sequential manner, and a cryptographically guaranteed non-tamperable and unforgeable distributed ledger. It has the advantages of decentralization, openness, autonomy, information cannot be tampered with, and anonymity. [0003] At present, due to the limited on-chain data processing capability of the blockchain, on the other hand, because the off-chain data cannot be effectively synchronized with the on-chain data, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3255H04L63/08
Inventor 张小松黄可牛伟纳
Owner SICHUAN UNIV