基于密钥派生的区块链匿名通信研究

Yanxun Chen, Pingping Liu
{"title":"基于密钥派生的区块链匿名通信研究","authors":"Yanxun Chen, Pingping Liu","doi":"10.2478/ijanmc-2023-0051","DOIUrl":null,"url":null,"abstract":"Abstract With the continuous development of the Internet and communication technologies, network communication provides convenience but also brings security problems such as exposure of users' personal privacy information and theft, private tampering, and forgery of false information. Modern cryptography technology is an important safeguard against message eavesdropping and tampering, while the rapidly developing anonymous communication technology in this century makes it difficult for attackers to infer user's personal information and communication relationships. In response to the potential threats of traditional centralized systems such as central nodes being vulnerable to attacks and data storage being tampered with, this paper proposes a blockchain anonymous communication algorithm KDAC based on key derivation, which takes advantage of the decentralization, data immutability, consensus mechanism and anonymity of blockchain and combines the ECC cryptographic derivation algorithm and anonymous communication technology to realize the key-at-a-time, one-address-at-a-time The key derivation scheme ensures the message integrity and tamper-evident while effectively hiding the identity information of both communication parties. In addition, this paper also optimizes the blockchain anonymous communication system with key derivation. Users only need the initial key of blockchain nodes to join the network for communication, and the information transmission is difficult to trace based on the blockchain network, which can effectively guarantee communication security and anonymity. The experimental results show that the efficiency of the derived key algorithm is roughly in the same order of magnitude as that of the 256-bit AES symmetric encryption algorithm, which can play a better role in practical applications. On the other hand, the derived key generated based on the algorithm has complete randomness in association verification, and it is impossible to reverse the initial parameters, which can well guarantee the anonymity of user identity.","PeriodicalId":193299,"journal":{"name":"International Journal of Advanced Network, Monitoring and Controls","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Research on Blockchain Anonymous Communication Based on Key Derivation\",\"authors\":\"Yanxun Chen, Pingping Liu\",\"doi\":\"10.2478/ijanmc-2023-0051\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract With the continuous development of the Internet and communication technologies, network communication provides convenience but also brings security problems such as exposure of users' personal privacy information and theft, private tampering, and forgery of false information. Modern cryptography technology is an important safeguard against message eavesdropping and tampering, while the rapidly developing anonymous communication technology in this century makes it difficult for attackers to infer user's personal information and communication relationships. In response to the potential threats of traditional centralized systems such as central nodes being vulnerable to attacks and data storage being tampered with, this paper proposes a blockchain anonymous communication algorithm KDAC based on key derivation, which takes advantage of the decentralization, data immutability, consensus mechanism and anonymity of blockchain and combines the ECC cryptographic derivation algorithm and anonymous communication technology to realize the key-at-a-time, one-address-at-a-time The key derivation scheme ensures the message integrity and tamper-evident while effectively hiding the identity information of both communication parties. In addition, this paper also optimizes the blockchain anonymous communication system with key derivation. Users only need the initial key of blockchain nodes to join the network for communication, and the information transmission is difficult to trace based on the blockchain network, which can effectively guarantee communication security and anonymity. The experimental results show that the efficiency of the derived key algorithm is roughly in the same order of magnitude as that of the 256-bit AES symmetric encryption algorithm, which can play a better role in practical applications. On the other hand, the derived key generated based on the algorithm has complete randomness in association verification, and it is impossible to reverse the initial parameters, which can well guarantee the anonymity of user identity.\",\"PeriodicalId\":193299,\"journal\":{\"name\":\"International Journal of Advanced Network, Monitoring and Controls\",\"volume\":\"9 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Advanced Network, Monitoring and Controls\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2478/ijanmc-2023-0051\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Advanced Network, Monitoring and Controls","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2478/ijanmc-2023-0051","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

随着互联网和通信技术的不断发展,网络通信在提供便利的同时,也带来了用户个人隐私信息的暴露和盗窃、私人篡改、虚假信息伪造等安全问题。现代密码技术是防止消息被窃听和篡改的重要保障,而本世纪迅速发展的匿名通信技术使得攻击者难以推断用户的个人信息和通信关系。针对传统中心化系统存在的中心节点易受攻击、数据存储易被篡改等潜在威胁,本文提出了一种基于密钥派生的区块链匿名通信算法KDAC,该算法利用区块链的去中心化、数据不变性、共识机制和匿名性,将ECC密码派生算法与匿名通信技术相结合,实现一次密钥(key-a -a-time);一次一个地址密钥派生方案在保证消息完整性和防篡改的同时,有效地隐藏了通信双方的身份信息。此外,本文还对基于密钥派生的区块链匿名通信系统进行了优化。用户只需要区块链节点的初始密钥加入网络进行通信,基于区块链网络的信息传输难以追踪,可以有效保证通信的安全性和匿名性。实验结果表明,该导出密钥算法的效率与256位AES对称加密算法的效率大致在同一数量级,可以在实际应用中发挥更好的作用。另一方面,基于该算法生成的衍生密钥在关联验证中具有完全的随机性,初始参数不可逆转,可以很好地保证用户身份的匿名性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Research on Blockchain Anonymous Communication Based on Key Derivation
Abstract With the continuous development of the Internet and communication technologies, network communication provides convenience but also brings security problems such as exposure of users' personal privacy information and theft, private tampering, and forgery of false information. Modern cryptography technology is an important safeguard against message eavesdropping and tampering, while the rapidly developing anonymous communication technology in this century makes it difficult for attackers to infer user's personal information and communication relationships. In response to the potential threats of traditional centralized systems such as central nodes being vulnerable to attacks and data storage being tampered with, this paper proposes a blockchain anonymous communication algorithm KDAC based on key derivation, which takes advantage of the decentralization, data immutability, consensus mechanism and anonymity of blockchain and combines the ECC cryptographic derivation algorithm and anonymous communication technology to realize the key-at-a-time, one-address-at-a-time The key derivation scheme ensures the message integrity and tamper-evident while effectively hiding the identity information of both communication parties. In addition, this paper also optimizes the blockchain anonymous communication system with key derivation. Users only need the initial key of blockchain nodes to join the network for communication, and the information transmission is difficult to trace based on the blockchain network, which can effectively guarantee communication security and anonymity. The experimental results show that the efficiency of the derived key algorithm is roughly in the same order of magnitude as that of the 256-bit AES symmetric encryption algorithm, which can play a better role in practical applications. On the other hand, the derived key generated based on the algorithm has complete randomness in association verification, and it is impossible to reverse the initial parameters, which can well guarantee the anonymity of user identity.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信