Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Collision Calculation Method of Chameleon Hash Function and Editable Block Chain Construction Method

A hash function and calculation method technology, applied in the field of network security, can solve problems such as network re-editing, trapdoor nodes being easily attacked or maliciously exploited

Active Publication Date: 2021-04-23
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is: the existing traditional editable block chain technology cannot be completed in a decentralized environment, and there is a problem that trapdoor nodes are easily captured or maliciously used, causing the entire network to face the danger of being re-edited. A Collision Calculation Method of Threshold Chameleon Hash Function and Editable Block Chain Construction Method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Collision Calculation Method of Chameleon Hash Function and Editable Block Chain Construction Method
  • Collision Calculation Method of Chameleon Hash Function and Editable Block Chain Construction Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] A collision calculation method of a chameleon hash function provided by a preferred embodiment of the present invention, the method is as follows:

[0035] Step a, system initialization: select the security parameter λ, and set the system public parameter param TCH . Specifically:

[0036]Choose a prime number q according to the security parameter λ, and choose a GDH group G whose order is p and whose generator is g. The GDH group here refers to such a group: on it, the Computational Diffie-Hellman (CDH) problem is difficult , but the Decisional Diffie-Hellman (DDH) problem is simple, but it can be constructed from a superbasis elliptic curve or a hyperelliptic curve on a finite field. The specific method can be found in the article "Short signature from theweil pairing" by Boneh et al . Next, select two hash functions H 0 : {0, 1} * →G * , H 1 : {0, 1} * → Z q , where Z q It is an integer group of order q, and the public parameter of the system is param TCH ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a collision calculation method of a chameleon hash function. The system public key and the hash collision are jointly calculated by k user nodes based on the form of a ring. The lack of any one party will cause the collision to fail to be generated correctly, thereby realizing security and reliability. Calculation of letters collides, avoiding problems of collision results or malicious acquisition or utilization. It also discloses an editable block chain construction method based on the calculation collision method of the chameleon hash function based on the ring. The system key is jointly calculated and generated by multiple user nodes. When it is necessary to calculate the hash collision, multiple users need to join forces Form a ring, and then use their respective private keys to jointly calculate the collision, thereby initiating re-editing of the corresponding block, realizing a decentralized editable blockchain.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a collision calculation method of a threshold chameleon hash function and an editable block chain construction method. Background technique [0002] The concept of blockchain was first formally proposed in 2008, and it can be used to realize public ledgers and unchangeable transaction records in a decentralized environment. The consortium chain refers to authorizing only a part of the verification nodes to participate in the verification audit block, which is characterized by partial decentralization. At present, most commercial applications are still based on alliance chains. [0003] In 2016, Ateniese et al proposed "RedactableBlokchain-or-rewirting history inbitcoin and friends", which proposed an editable blockchain technology based on the chameleon hash function. However, this method cannot be completed in a decentralized environment. The reason: the i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30
CPCH04L9/3236H04L9/3066H04L9/3033H04L9/50
Inventor 张小松黄可牛伟纳谢鑫蒋天宇葛洪麟
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products