Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Collision calculation method of chameleon hash function and tailorable blockchain account book structure

A hash function and calculation method technology, applied in the field of network security, to avoid affecting efficiency, ensure safety, and facilitate timely stop loss

Inactive Publication Date: 2021-05-14
BEIJING SAFE CODE TECH
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to provide a collision calculation method of the chameleon hash function and a tailorable blockchain account book structure and a tailoring method, so as to solve the problem that all nodes are required to participate in the tailoring of the blockchain in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Collision calculation method of chameleon hash function and tailorable blockchain account book structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] This embodiment discloses a tailorable blockchain ledger structure, including several blocks, each of which includes a one-to-one correspondence between a block header and a block body; the block body stores transactions of the block Information; the block header includes hash value, message, nonce value and random number; the hash value is the chameleon hash value of the previous block, which is used to form a chain structure with the previous block, and so on, Until it is linked to the initial block; the message is calculated from the transaction information; the random number and the hash value are a hash pair based on the chameleon hash function.

[0028]A chameleon hash function scheme consists of four functions: key generation (Key Generation HG), hash function (HashGeneration H), verification function (Hash Verification HV) and collision function (Hash Collision HC) [10]:

[0029]

[0030] (1) : key generation algorithm, input a security parameter , output...

Embodiment 2

[0042] This embodiment discloses a tailoring method for a tailorable blockchain account book, which is used to realize the tailoring of the tailorable blockchain account book structure described in Embodiment 1, including the following steps:

[0043] Step 1: The system management node initiates trapdoor verification and synthesis based on the chameleon hash function, and obtains the system public key and trapdoor private key with the cooperation of at least t nodes;

[0044] Step 2: The system management node performs the cutting operation on the block in the area to be cut, and calculates the new message of the block body after the cutting operation;

[0045] Step 3: Based on the system public key and trapdoor private key obtained in step 1, the system management node can modify the block header of the cutting operation area in step 2, so that the blocks before and after the operation area can form a chain through the hash value structure.

[0046] further,

[0047] Step 1...

Embodiment 3

[0085] This embodiment discloses a tailoring method for a tailorable blockchain account book, which is used to realize the tailoring of the tailorable blockchain account book structure described in Embodiment 1, wherein the main steps are the same as those in Embodiment 2, the difference being:

[0086] 1)

[0087] Step 2 specifically includes:

[0088] Step 2.21: The tailorable blockchain locates and deletes the block in the work area to be trimmed;

[0089] Step 2.22: The block chain can be tailored to locate the previous block and the next block of the deleted block.

[0090] This embodiment is mainly used to delete the entire block in a large blockchain. Unlike deleting a specific transaction, in order to delete a block , need to modify the block The hash value of the , so that it can be compared with the block Normal link.

[0091] when to delete block , for block , need to change into ,to maintain Unchanged, does not affect the normal link of subsequen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of network security, and particularly relates to a collision calculation method of a chameleon hash function and a tailorable blockchain account book structure. The collision calculation method for the chameleon hash function is characterized by comprising the following steps: generating a hash key, namely calculating to obtain a system public key and n private shares based on public parameters, a key generation algorithm and a verifiable secret sharing algorithm, and calculating to obtain a trap door private key by at least t private shares in the n private shares; hash calculation: calculating a Hash value according to the system public key, the message and the chameleon random number corresponding to the message; collision calculation: calculating Hash collision based on the obtained trap door private key, the message, the random number, the Hash value and the new message to obtain a new chameleon random number satisfying the collision. On the basis of the algorithm, the chameleon hash trap door permission is prevented from being mastered by a certain node independently to cause the risk of malicious utilization, and the situation that all nodes participate in trap door synthesis to affect the efficiency is also avoided.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a collision calculation method of a chameleon hash function, a block chain ledger structure and a cutting method that can be cut. Background technique [0002] Blockchain is an innovative application model of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm in the Internet era. Blockchain technology is considered to be a subversive innovation in computing models following mainframes, personal computers, and the Internet. In a narrow sense, the blockchain is a chained data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be tamper-proof and unforgeable distributed ledgers. Broadly speaking, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06H04L9/08H04L9/32H04L29/08
CPCH04L63/10H04L9/0643H04L9/085H04L9/3236H04L67/1097H04L9/50
Inventor 徐勤朱洪亮邢晓梅
Owner BEIJING SAFE CODE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products