CN109246137A - The safety protecting method and device of naval warfare data based on block chain - Google Patents
The safety protecting method and device of naval warfare data based on block chain Download PDFInfo
- Publication number
- CN109246137A CN109246137A CN201811237478.0A CN201811237478A CN109246137A CN 109246137 A CN109246137 A CN 109246137A CN 201811237478 A CN201811237478 A CN 201811237478A CN 109246137 A CN109246137 A CN 109246137A
- Authority
- CN
- China
- Prior art keywords
- data
- block chain
- chain
- algorithm
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0407—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
- H04L63/0421—Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3218—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using proof of knowledge, e.g. Fiat-Shamir, GQ, Schnorr, ornon-interactive zero-knowledge proofs
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3255—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses the safety protecting methods and device of a kind of naval warfare data based on block chain, wherein this method comprises: marine Defense Information System model of the building based on block chain;It can verify that PoS common recognition mechanism with static gradually design efficiently to dynamic;Construct the trust data memory mechanism of high dynamic network characteristic;Building attack is traced to the source and tracking is called to account mechanism;Construct the Privacy Preservation Mechanism of data trusted storage.This method the demands such as is traced to the source for distributed trusted storage, secret protection and the attack of maritime formation combat data; build the privately owned platform chain framework of maritime formation combat data; effectively meet the actual demand of multilevel security network information system span regional internet, improves the safety and reliability of naval warfare data safety guard system.
Description
Technical field
The present invention relates to block chain security technology area, in particular to the peace of a kind of naval warfare data based on block chain
Full protection method and device.
Background technique
There are many defects for traditional combat data security protection system and corresponding administrative mechanism.Currently used operation
The design of data safety protection system depends on conventional network techniques, stores and processs mode based on center type data, exists
It is easy to be attacked by enemy army, privacy is easy to exposure, safety is difficult to the problems such as ensureing.Therefore, with the day crescent of Information Technology Development
Different, the building of combat data security protection system also will be continually improved and innovate, and just adapt under the new situation military
Information privacy requirement, ensures going on smoothly for my army's modernization construction.
Block chain is a kind of decentralization base for becoming increasingly popular and gradually rising with the digital encryptions currency such as bit coin
Plinth framework.The unique job mechanism of all-web authentication makes block chain have the characteristics of can not distorting, can not forging, thus guarantee be
The safety and stablization of system.Through development and improvement in a few years, block chain has been increasingly becoming a kind of novel distribution, has gone to center
Change, go the technical solution of trustization.In recent years, block chain has gradually disengaged bit coin, independently becomes network technology innovation
Hot spot has started a kind of completely new data distribution formula memory technology, using receive more and more attention.Block chain technology
Formula innovation is overturned in various fields excitations such as finance, economic, military, science and technology, society and lives, has caused new round information technology
It changes and applies.
According to practical operation situation, naval warfare, which is formed into columns, has the spies such as tissue network is not fixed, topological structure is flexible and changeable
Property.Under naval warfare environment complicated and changeable, multi-typed information system needs more flexible data architecture support, guarantees letter
Cease the safety and reliability of transmitting.In traditional center type data system, data transfer to central node to be handled and tested
Card, once central node breaks down or intercepts and captures damage, the peace of entire maritime formation information system by enemy at sea fighting
Full property and reliability will will receive detrimental effects.
Summary of the invention
The present invention is directed to solve at least some of the technical problems in related technologies.
For this purpose, an object of the present invention is to provide a kind of security protection sides of naval warfare data based on block chain
Method.This method the demands such as is traced to the source for distributed trusted storage, secret protection and the attack of maritime formation combat data, builds sea
The upper privately owned platform chain framework model of cooperative combat data improves the safety of naval warfare data safety guard system, reliability.
It is another object of the present invention to the safety devices for proposing a kind of naval warfare data based on block chain.
In order to achieve the above objectives, one aspect of the present invention embodiment proposes a kind of naval warfare data based on block chain
Safety protecting method, comprising the following steps: marine Defense Information System model of the building based on block chain;With static state to dynamic by
Step design efficiently can verify that PoS common recognition mechanism;Construct the trust data memory mechanism of high dynamic network characteristic;Building attack is traced to the source
It calls to account mechanism with tracking;Construct the Privacy Preservation Mechanism of data trusted storage.
The safety protecting method of the naval warfare data based on block chain of the embodiment of the present invention, passes through the safe mould of privately owned chain
Type constructing technology, the privately owned chain common recognition technologies such as technology and zero-knowledge proof, apply in block catenary system and can verify that anti-biasing point
Cloth random number generator guarantees the requirement that efficiency, safety, reliability are taken into account under the premise of throughput and network size, and
And data access control program and the traceable group's anonymous authentication technology traced to the source on the classification multicenter chain based on ABE, it dashes forward
Broken fine granularity dynamic management and cross-domain authentication techniques, disclose characteristic in combination with the whole network of block chain model, form a set of support
Multi-security level(MSL), can trace to the source etc. the trust data memory mechanism of functions across trust domain, attack, effectively meet multilevel security network letter
The actual demand of breath system span regional internet, and realize effective retrospect to storing data entity, and can also weaken and be
The dependence united for central node, enhances the robustness and safety of maritime formation data safety system.
In addition, the safety protecting method of the naval warfare data according to the above embodiment of the present invention based on block chain may be used also
With following additional technical characteristic:
Further, in one embodiment of the invention, the marine Defense Information System of the building based on block chain
Model further comprises: according to user and the client layer of client main body, being realized under by operation information of lower layer management system
Layer data is written and read and objective function;Using the management system layer of centralization service node as the primary interface of whole system,
Lower layer's distributed block chain data structure is managed and be supervised;According to the super node network layer of block chain, will own
Node is arranged on marine each primary communications base station and ship in a distributed manner according to current demand, and is realized altogether by PoS
Know and safeguard entire lower data, and the support of intelligent contract is provided, realizes the identification to upper layer and account management;Based on area
Block chain structure, according to current functional requirement construct data Layer, wherein further comprise marine military system back-end data,
Naval warfare constituent parts location information data and High Security Level demand data.
Further, in one embodiment of the invention, the design efficiently can verify that PoS common recognition mechanism, further
It include: the common recognition algorithm designed under committeeman, leader's stationary state, when ensuring part of nodes failure, other are normal
Node is unaffected;Determine that the teaming method of the committee in common recognition network, including committeeman's qualification acquisition and leader are selected
It lifts.External certificate agreement is designed, to provide the ability of common recognition result correctness detection.
Further, in one embodiment of the invention, the trust data storage of the building high dynamic network characteristic
Mechanism further comprises: generating the first access control scheme according to the battlefield information fine granularity of multicenter CP-ABE, comprising:
Setup(1λ, N) and → (Params, { (apkk, askk)}K ∈ [1, n]),
Dec (C, uskk) → M or NULL,
Wherein, open security parameter λ is the input of Setup () algorithm, and system parameter Params, N number of administrative center is
Subordination public private key pair (apkk, askk), k is counting integer, and AkeyGen () is with the private key ask of administrative center itselfkIt is defeated
Entering, GID is global identifier,For attribute set,For access control policy, uskkIt is to export request attribute for user
Private key, Enc () are algorithm, and C is encrypted cipher-text information, and Dec () is algorithm, and M is the cleartext information after decryption;
Fine granularity is instructed to generate the second access control scheme according to the battlefield of multicenter KP-ABE, comprising:
Setup(1λ, N) and → (Params, { (apkk, askk)}K ∈ [1, n]),
Dec (C, uskk)→M or NULL;
Using based on aggregate signature data integrity validation and teledata proof of possession guarantee be stored into chain data
Integrality.
Further, in one embodiment of the invention, building attack is traced to the source and tracking is called to account mechanism, further
It include: to be analyzed for combat data information system structure and group ranking and linkable ring signature based on privately owned chain, to set
Scheme that meter is suitable for anonymous authentication based on privately owned chain combat data information system and tracking is called to account;For being deposited on combat data chain
The security audit and supervision problem of storage, on the basis of the block chain knows together network, using short stochastic signature technology, design is suitable
The audit and supervision to combat data trusted storage are realized for the group ranking general construction of existing block catenary system.
Further, in one embodiment of the invention, the Privacy Preservation Mechanism of the building data trusted storage, into
One step includes: to hide participant identity and data by non-interactive zero-knowledge proof, comprising:
c←KGen(1k),
π ← Prove (c, s, w),
1/0 ← Verify (c, s, π),
Wherein, non-interactive zero-knowledge proof agreement NIZK { s | (s, w) ∈ R }, c are output common characters string, KGen ()
For algorithm, k is open security parameter, and Prove () is algorithm, and Verify () is algorithm.
In order to achieve the above objectives, another aspect of the present invention embodiment proposes a kind of naval warfare data based on block chain
Safety device, comprising: building module, for constructing the marine Defense Information System model based on block chain;Design mould
Block, for can verify that PoS common recognition mechanism with static gradually design efficiently to dynamic;Memory module, for constructing high dynamic network
The trust data memory mechanism of characteristic;Tracing module, for constructing, attack is traced to the source and tracking is called to account mechanism;Protection module is used for
Construct the Privacy Preservation Mechanism of data trusted storage.
The safety device of the naval warfare data based on block chain of the embodiment of the present invention, passes through the safe mould of privately owned chain
Type constructing technology, the privately owned chain common recognition technologies such as technology and zero-knowledge proof, apply in block catenary system and can verify that anti-biasing point
Cloth random number generator guarantees the requirement that efficiency, safety, reliability are taken into account under the premise of throughput and network size, and
And data access control program and the traceable group's anonymous authentication technology traced to the source on the classification multicenter chain based on ABE, it dashes forward
Broken fine granularity dynamic management and cross-domain authentication techniques, disclose characteristic in combination with the whole network of block chain model, form a set of support
Multi-security level(MSL), can trace to the source etc. the trust data memory mechanism of functions across trust domain, attack, effectively meet multilevel security network letter
The actual demand of breath system span regional internet, and realize effective retrospect to storing data entity, and can also weaken and be
The dependence united for central node, enhances the robustness and safety of maritime formation data safety system.
In addition, the safety device of the naval warfare data according to the above embodiment of the present invention based on block chain may be used also
With following additional technical characteristic:
Further, in one embodiment of the invention, the building module further comprises: read-write cell is used for
According to user and the client layer of client main body, lower data is written and read by operation information of lower layer management system realization and
Objective function;Administrative unit, for using the management system layer of centralization service node as the primary interface of whole system, with right
Lower layer's distributed block chain data structure is managed and supervises;Arrangement unit, for the super node network according to block chain
All nodes are arranged on marine each primary communications base station and ship in a distributed manner according to current demand, and pass through by layer
PoS realizes that common recognition safeguards entire lower data, and provides the support of intelligent contract, realizes the identification to upper layer and account pipe
Reason;Processing unit constructs data Layer according to current functional requirement for being based on block chain structure.
Further, in one embodiment of the invention, the design module be further used for design committeeman,
Common recognition algorithm under leader's stationary state, when ensuring part of nodes failure, other normal nodes are unaffected, determine common recognition
The teaming method of the committee in network, including committeeman's qualification acquisition and leader elect, and design external certificate association
View, to provide the ability of common recognition result correctness detection.
Further, in one embodiment of the invention, the memory module is further used for according to multicenter CP-
The battlefield information fine granularity of ABE generates the first access control scheme, comprising:
Setup(1λ, N) and → (Params, { (apkk, askk)}K ∈ [1, n]),
Dec (C, uskk) → M or NULL,
Wherein, open security parameter λ is the input of Setup () algorithm, and system parameter Params, N number of administrative center is
Subordination public private key pair (apkk, askk), k is counting integer, and AkeyGen () is with the private key ask of administrative center itselfkIt is defeated
Entering, GID is global identifier,For attribute set,For access control policy, uskkIt is to export request attribute for user
Private key, Enc () are algorithm, and C is encrypted cipher-text information, and Dec () is algorithm, and M is the cleartext information after decryption;
Fine granularity is instructed to generate the second access control scheme according to the battlefield of multicenter KP-ABE, comprising:
Setup(1λ, N) and → (Params, { (apkk, askk)}K ∈ [1, n]),
Dec (C, uskk)→M or NULL;
And data integrity validation and teledata the proof of possession guarantee based on aggregate signature is utilized to be stored into chain number
According to integrality.
Further, in one embodiment of the invention, the tracing module further comprises: analytical unit is used for
It is analyzed for combat data information system structure and group ranking and linkable ring signature based on privately owned chain, is applicable in designing
In based on privately owned chain combat data information system anonymous authentication and tracking call to account scheme;Auditable unit, for being directed to operation number
Short stochastic signature skill is utilized on the basis of the block chain knows together network according to the security audit and supervision problem stored on chain
Art, design are suitable for the group ranking general construction of existing block catenary system to realize audit and the prison to combat data trusted storage
Pipe.
Further, in one embodiment of the invention, the protection module is further used for through non-interactive type zero
Knowledge proof hides participant identity and data, comprising:
c←KGen(1k),
π ← Prove (c, s, w),
1/0 ← Verify (c, s, π),
Wherein, non-interactive zero-knowledge proof agreement NIZK { s | (s, w) ∈ R }, c are output common characters string, KGen ()
For algorithm, k is open security parameter, and Prove () is algorithm, and Verify () is algorithm.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partially become from the following description
Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, in which:
Fig. 1 is the safety protecting method process according to the naval warfare data based on block chain of one embodiment of the invention
Figure;
Fig. 2 is the safety protecting method technology according to the naval warfare data based on block chain of one embodiment of the invention
Scheme block diagram;
Fig. 3 is whole according to the safety protecting method of the naval warfare data based on block chain of one embodiment of the invention
Conceptual schematic drawing;
Fig. 4 is the safety protecting method data according to the naval warfare data based on block chain of one embodiment of the invention
Backbone structure schematic diagram;
Fig. 5 is on the safety protecting method warship according to the naval warfare data based on block chain of one embodiment of the invention
Subchain structural schematic diagram;
Fig. 6 is the safety shield apparatus according to the naval warfare data based on block chain of one embodiment of the invention
Schematic diagram.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.
The safety of the naval warfare data based on block chain proposed according to embodiments of the present invention is described with reference to the accompanying drawings
Means of defence and device describe the naval warfare number based on block chain proposed according to embodiments of the present invention with reference to the accompanying drawings first
According to safety protecting method.
Fig. 1 is the safety protecting method flow chart of the naval warfare data based on block chain of one embodiment of the invention.
As shown in Figure 1, should naval warfare data based on block chain safety protecting method the following steps are included:
In step s101, the marine Defense Information System model based on block chain is constructed.
Further, in one embodiment of the invention, the marine Defense Information System model based on block chain is constructed,
Further comprise: according to user and the client layer of client main body, being realized by operation information of lower layer management system to the lower number of plies
According to being written and read and objective function;Using the management system layer of centralization service node as the primary interface of whole system, with right
Lower layer's distributed block chain data structure is managed and supervises;According to the super node network layer of block chain, by all nodes
It is arranged in a distributed manner according to current demand on marine each primary communications base station and ship, and algorithm is proved by equity
(PoS) it realizes that common recognition safeguards entire lower data, and the support of intelligent contract is provided, realize identification and account to upper layer
Management;
Based on block chain structure, data Layer is constructed according to current functional requirement, including but not limited to marine military system
Back-end data, naval warfare constituent parts location information data and High Security Level demand data etc..
It specifically, can as shown in Fig. 2, marine Defense Information System model of the building based on block chain proposed by the present invention
To be divided into four layers:
1) client layer based on user and client main body, by the operation to information of lower layer management system, to the lower number of plies
According to be written and read and partial function realize;
2) based on the management system layer of centralization service node, as the primary interface of whole system, to lower layer's distribution
Block chain data structure is managed and supervises;
3) based on the super node network layer of block chain, all nodes can be arranged in sea in a distributed manner according to actual needs
On upper each primary communications base station and ship, realize that common recognition safeguards entire lower data by PoS, and provide intelligent contract
It supports, realizes to functions such as identification, the account managements on upper layer;
4) data Layer based on block chain structure includes but is not limited to marine military system according to concrete function demand
Back-end data, naval warfare constituent parts location information data, High Security Level demand data etc..
Wherein, the main body of client layer is the user group of different security level composition of personnel, is sent by specified interface to system layer
Service request, account management pass through the ABE encryption and access control mechanisms realization to block chain data.It is distributed by block chain
The mode of system architecture storing data also enhances the robustness of information system while avoiding the attack to centralization node
With safety, the performance under communication payload and Single Point of Faliure is improved.System layer is only used as connecing for user and network layer and data Layer
Mouthful, and it is responsible for the centralization audit of entire block chain, most function passes through specification by the privately owned chain meshed network of P2P form
Change intelligent contract to realize.
Secondly, the safety protecting method of the naval warfare data based on block chain of the embodiment of the present invention believes naval warfare
The security strategy and security target for ceasing network are analysed in depth, and according to the demand for security of naval warfare information network and user
Other security attributes such as domain, network domains carry out safety analysis, establish the marine Defense Information System security model based on block chain,
Including naval warfare information network security functional form model, the Attacker Model, security proving method and technology.Towards complexity
Information system, information and network safety field is mainly the following that provable security is theoretical and method:
1) the first is symbolic calculus method, and whether this method is leaky mainly for detection of system, and loophole is not detected
The system of not guaranteeing that be it is safe, this method be suitble to system using known security rudimentary algorithm and agreement premise
Under, carry out the system safety analysis of macroscopic aspect;
2) second is the theorems proof methods based on game, and this method can be deep into basic security used in system
The safety of algorithm and agreement, the safety analysis of suitable system microcosmic point especially carry out safety to security algorithm and agreement
Property analysis;
3) the third method is combination security proving method, and the system that this method proves safety has same peace with other
The system in combination of full property is the strong guarantee of complication system safety at being still safe after more advanced system,
But the system of some safety practical in practice may not be able to prove safety under this approach.Since every kind of method has respectively
Advantage and the scope of application, the embodiment of the present invention improves and deepens according to the concrete condition of set meter systems and scheme, mention
Go to sea the formalization security model of upper operational information network, and proposes the formalization security definitions of system in turn.
In step s 102, gradually being designed efficiently with static to dynamic can verify that PoS common recognition mechanism.
Further, in one embodiment of the invention, the marine Defense Information System model based on block chain is constructed,
Further comprise: according to user and the client layer of client main body, being realized by operation information of lower layer management system to the lower number of plies
According to being written and read and objective function;Using the management system layer of centralization service node as the primary interface of whole system, with right
Lower layer's distributed block chain data structure is managed and supervises;According to the super node network layer of block chain, by all nodes
It is arranged in a distributed manner according to current demand on marine each primary communications base station and ship, and common recognition dimension is realized by PoS
Entire lower data is protected, and the support of intelligent contract is provided, realizes the identification to upper layer and account management;According to block chain
The data Layer of formula structure is constructed according to current functional requirement.
Specifically, common recognition mechanism is gradually designed to dynamic sequence with static, to realize characteristic that is efficient, can verify that, and
It is finally reached network size, throughput index request, it includes following steps:
1) committeeman, the common recognition algorithm under leader's stationary state are designed, it is ensured that other are being just when part of nodes failure
Chang Jiedian is unaffected.It based on PoS, designs new block and generates agreement, guarantee when committee's malfunctioning node is no more than 1/3, neck
The block that the person of leading proposes can be received by honest nodes all inside the committee, to construct block under committee's structure fixed scene
Chain generates agreement.
2) determine that the teaming method of the committee in common recognition network, including committeeman's qualification acquisition and leader are elected.
To adapt to ever-expanding network size, the selection mode of the committee is designed, avoids the communications cost between node from increasing too fast, divides
The distributed random for analysing anti-biasing figures method, guarantees that committeeman randomly selects from all common recognition nodes, and choose result
It can not be influenced by any participant, so that opponent control committee be avoided to choose process.For starting common recognition agreement, every bout needs
One leader generates block and distributes, and designs reasonable leader's election regulation, reduces the probability of the re-elected leader of opponent,
To weaken influence of such attack to network performance.
On the basis of above-mentioned, to improve network flexibility of knowing together, supporting node is dynamically added/exits network, and system is fixed
When committee member will do it reconfigure so that the node being newly added can be participated in sufficiently knowing together and eliminate the influence that node leaves.
Wherein, at the end of design time it is internal guide reconfigure agreement, pay close attention to agreement operational efficiency, reduction is reconfigured to property
The influence of energy, meanwhile, to avoid opponent from selectively degenerating committee's internal node, and network common recognition is destroyed, analysis dynamic is reconfigured
Trigger condition is set, that designs exterior guiding reconfigures agreement, pays close attention to safety, guarantees that reconfiguration course will not be total to network
Knowledge damages.
3) external certificate agreement is designed, the ability of common recognition result correctness detection is provided.The embodiment of the present invention can be external
The distributed random number generating algorithm of verifying generates correctness proof simultaneously in output random number, by new random number algorithm application
In committee's building process, it is ensured that regulator can confirm committee's building process not under fire by correctness proof.Design is altogether
Knowing product test agreement, regulator can confirm that common recognition is reached an agreement correct operation, and result at least obtains the confirmation of 2/3 node,
Block is effective.
In step s 103, the trust data memory mechanism of high dynamic network characteristic is constructed.
Further, in one embodiment of the invention, the trust data memory mechanism of high dynamic network characteristic is constructed,
Further comprise: the first access control scheme generated according to the battlefield information fine granularity of multicenter CP-ABE, comprising:
Setup(1λ, N) and → (Params, { (apkk, askk)}K ∈ [1, n]),
Dec (C, uskk) → M or NULL,
Wherein, open security parameter λ is the input of Setup () algorithm, and system parameter Params, N number of administrative center is
Subordination public private key pair (apkk, askk), k is counting integer, and AkeyGen () is with the private key ask of administrative center itselfkIt is defeated
Entering, GID is global identifier,For attribute set,For access control policy, uskkIt is to export request attribute for user
Private key, Enc () are algorithm, and C is encrypted cipher-text information, and Dec () is algorithm, and M is the cleartext information after decryption;
Fine granularity is instructed to generate the second access control scheme according to the battlefield of multicenter KP-ABE, comprising:
Setup(1λ, N) and → (Params, { (apkk, askk)}K ∈ [1, n]),
Dec (C, uskk)→M or NULL;
And data integrity validation and teledata the proof of possession guarantee based on aggregate signature is utilized to be stored into chain number
According to integrality.
Specifically, to adapt to, military information network node topology dynamic change, heterogeneous network converged degree are high, communicate
The diversified feature of mode, ensures the Data Access Security under military environment and rights management, and the embodiment of the present invention proposes base
In data access control strategy on the multicenter chain of ABE and based on the data integrity verification method of aggregate signature.Wherein, system
Command centre and command system at different levels be responsible for battle unit members at different levels and distribute encryption keys, fight member is responsible for collecting war
Information, is encrypted and data integrity certification for curriculum offering access control right and to data, block chain link
Point receives cipher-text information, completes cochain processing, and information reception staff interprets information according to own right, completes tactical disposition.
Firstly, to adapt to the different access environment in battlefield, the embodiment of the present invention uses two sets of access control methods.
1) the battlefield information fine-granularity access control scheme based on multicenter CP-ABE
Wherein, it is transmitted for general information, it is contemplated that the membership of combat unit is complicated, information recipient's body
It part is difficult to determine, the sender of information needs to guarantee that the recipient for only meeting condition could correctly obtain the thin information of file.Cause
This, the embodiment of the present invention proposes the battlefield information fine-granularity access control scheme based on multicenter CP-ABE.Scheme mainly by
Following Algorithm constitution.
Setup(1λ, N) and → (Params, { (apkk, askk)}K ∈ [1, n]): Setup () algorithm is with open security parameter λ
Input is the public and private key of system property of system parameter Params and N number of administrative center necessary to output access control system
To (apkk, askk).Params is inputted as the system parameter of own system for each administrative center.
AkeyGen () is with the private key of administrative center itself, askkTo input,
According to different GID and attribute setThe private key usk of request attribute is exported for userk.AkeyGen () is by different management
Mechanism independent operating.
Enc () algorithm is input according to required access control policy and message itself,
Export encrypted cipher-text information.The algorithm can have the execution of any member in system, and generate necessary cipher-text information.
Dec (C, uskk) → M or NULL:Dec () algorithm is input with the attribute private key of encrypted message and user,
If the private key of user meets the access control requirement of decryption, the cleartext information after algorithm output decryption, otherwise algorithm is exported
NULL.The algorithm can equally have the execution of any member in system.
By above-mentioned algorithm, member is capable of the on-demand information sharing of free safety and does not have to worry information quilt in arbitrary system
Undesirable member's decryption guarantees safety and the privacy of information transmitting.
2) battlefield based on multicenter KP-ABE instructs fine-granularity access control scheme
Wherein, it assigns and commands for special battlefield order, it is contemplated that under battlefield surroundings, there are senior officers to sacrifice, missing
Situations such as, therefore it, is can have satisfaction to set in advance while guaranteeing order confidentiality that command information recipient, which is uncertain,
The fight member of fixed condition can obtain, execute order, propose the battlefield instruction fine-granularity access control of multicenter KP-ABE
Scheme.Scheme is mainly by following Algorithm constitution:
Setup(1λ, N) and → (Params, { (apkk, askk)}K ∈ [1, n]): Setup () algorithm is with open security parameter λ
Input is the public and private key of system property of system parameter Params and N number of administrative center necessary to output access control system
To (apkk, askk).System parameter input of each administrative center using Params as own system.
AkeyGen (), algorithm was with the private key of administrative center itself, askkFor
Input, according to different GID and access control policyThe private key usk of request attribute is exported for userk.AkeyGen () is not by
Same management organization's independent operating.
The attribute specification and message for the member that Enc () algorithm can be decrypted according to message
Itself is input, exports encrypted cipher-text information.The algorithm can have the execution of any member in system, and generate necessary close
Literary information.
Dec (C, uskk) → M or NULL:Dec () algorithm is input with the attribute private key of encrypted message and user,
If the attribute specification contained in ciphertext meets the access control requirement of the private key insertion of user, after algorithm output decryption
Cleartext information, otherwise algorithm exports NULL.The algorithm can equally be executed by any member in system.
Further, compared with the first scheme, in second scheme, the private key of recipient defines solution confidential information
Therefore classification can be employed to ensure that the safety orientation transmitting of the battlefield instruction under battlefield surroundings.
Secondly, being guaranteed using data integrity validation technology and teledata proof of possession method based on aggregate signature
It is stored into the integrality of chain data.Data integrity validation is to ensure that one of method of data integrity, it lays particular emphasis on guarantee number
According to itself authenticity and availability, it can be avoided data and arbitrarily distorted.The embodiment of the present invention is using the poly- of identity-based
It closes signature to improve the existing signature scheme to guarantee data integrity, and proposes one using the batch validation of aggregate signature
Efficient data integrity verification scheme, improves the credibility and safety of data integrity validation, while being held based on teledata
Having proves to propose the different category data consistency checking method that can support the dynamic operations such as data modification, insertion, deletion.
In step S104, building attack is traced to the source and tracking is called to account mechanism.
Further, in one embodiment of the invention, building attack is traced to the source and tracking is called to account mechanism, is further wrapped
It includes: being analyzed for combat data information system structure and group ranking and linkable ring signature based on privately owned chain, with design
Suitable for based on privately owned chain combat data information system anonymous authentication and tracking call to account scheme;For being stored on combat data chain
Security audit and supervision problem, on the basis of block chain knows together network, using short stochastic signature technology, design is suitable for existing
There is the group ranking general construction of block catenary system to realize audit and supervision to combat data trusted storage.
That is, the metadata of combat data is highly sensitive in combat data information system, combat data is recorded
Accuracy requirement it is high, and at the same time must there is perfect audit supervision and tracking to call to account mechanism.Wherein, anonymous authentication with chase after
The track scheme of calling to account is to guarantee the important mechanisms of combat data anonymity, accuracy and trackability.Therefore, the embodiment of the present invention
From the demand of Defense Information System, the characteristics of surrounding above-mentioned combat data, in conjunction with passwords such as group ranking, linkable ring signatures
Scheme is called to account scheme by the route determination anonymous authentication that is described below and tracking.
Firstly, for based on the passwords such as the combat data information system structure and group ranking of privately owned chain and linkable ring signature
Technology is analyzed.Wherein, group ranking has integrality, unforgeable, anonymity, trackability, Unlinkability, rimless
The features such as frame, the tracking verification that can not be forged, anti-conspiracy attack, and in linkable ring signature scheme, what same signer generated
Multiple signatures have link property.These two types of signature schemes are the important cryptography schemes of current anonymous authentication, but all cannot be very
Good meets the needs of this system, and group signature scheme is difficult to support the open duplicate removal of combat data, and linkable ring signature scheme is not
Support the Identity escrow of signer.The embodiment of the present invention deeply parses group signature scheme reality tracking function and can link ring label
Name scheme realizes the immanent cause of link property, and proposes traceable linkable group's anonymous authentication technology on this basis,
Scheme that design is suitable for anonymous authentication based on privately owned chain combat data information system and tracking is called to account.
Secondly, for the security audit and supervision problem that are stored on combat data chain, in above-mentioned block chain common recognition network
On the basis of, using short stochastic signature technology, design is suitable for the group ranking general construction of existing block catenary system to realize to work
The audit and supervision for data trusted storage of fighting, under the premise of not changing original block chain user certificate, by being added with useful
The short stochastic signature of family identity information implements policing operation as trace parameters.Wherein, group ranking is in addition to providing to user's
Anonymity protection is outer, and group administrator can use the identity for the private key tracking signer held when necessary.If it find that block chain
There is recording exceptional, such as the long-term mass data store transaction of certain specific user's account, or external investigation in log content
Show that the storage of certain region period is doubtful, since the signature of sender is traceable, the prison to regulatory agency
Pipe mechanism can be associated with the All Activity of the user, and concerned account numbers are temporarily freezed, and further request has confirmation of responsibility energy
The mechanism of power gets involved in the investigation, and completes duty goal work.Therefore, group ranking technology is supervised suitable for privately owned chain centralization, can be real
Now tracking mechanism stores movable penetration attack to data and traces to the source.
In step s105, the Privacy Preservation Mechanism of data trusted storage is constructed.
Further, in one embodiment of the invention, the Privacy Preservation Mechanism of data trusted storage is constructed, further
It include: that participant identity and data are hidden by non-interactive zero-knowledge proof, comprising:
c←KGen(1k),
π ← Prove (c, s, w),
1/0 ← Verify (c, s, π),
Wherein, non-interactive zero-knowledge proof agreement NIZK { s | (s, w) ∈ R }, c are output common characters string, KGen ()
For algorithm, k is open security parameter, and Prove () is algorithm, and Verify () is algorithm.
Firstly, for the cryptography method of security and privacy protection in combat data storage system, the embodiment of the present invention
The sensitivity characteristic for focusing combat data itself provides the privacy protection policy to record data and user identity.Specifically, privacy
Protection includes record data, the confidentiality of user identity and the organizational information of network verification node, prevents this type of information
The network node accessed by external attacker, other users or unauthorized obtains, to protect operational information secret.It is above-mentioned to solve
Secret protection demand, the embodiment of the present invention proposes this key technology of non-interactive zero-knowledge proof, for hiding participant
Identity and data.Zero-knowledge proof (Zero-Knowledge Proof) refers to that certifier can not provide to verifier
In the case where any useful information, verifier is set to believe that some judgement is correct, while not leaking any pass to verifier
In the information for being proved to message.Non-interactive zero-knowledge proof does not need any friendship for interactive zero knowledge probative
Mutually, interactive process only is replaced with a short random train, it was demonstrated that person P can announce agreement, to take time to carry out this to any
People's identification protocol of verifying is effectively that informal definitions are as follows.
For stating s ∈ L, evidence w and relationship R, (s, w) ∈ R, non-interactive zero-knowledge proof agreement NIZK s |
(s, w) ∈ R } mainly by following Algorithm constitution.
c←KGen(1k): and KGen () algorithm is input with open security parameter k λ, exports common characters string c.
π ← Prove (c, s, w): Prove () algorithm is exported by participant and is proved.
1/0 ← Verify (c, s, π): Verify () algorithm is verified by verifier.If receiving the proof of participant,
1 is then exported, otherwise exports 0.
Zero knowledge probative agreement has following three property:
1) completeness.If proof side and authentication are all honest, and each step for following proof procedure carries out correctly
It calculates, then the proof must be successfully, authentication can centainly receive proof side.
2) reliability.Nobody can palm off proof side, prove that this successfully.
3) Zero Knowledge.After proof procedure has executed, authentication only obtain " proof side possesses this knowledge " this
Information, without obtaining any point information about this knowledge itself.
Further, it is based on above-mentioned zero knowledge probative agreement, existing group ranking, ring signatures or group's encryption in combining cipher
Technology may be implemented combat data storage and the privacy of identities of access user protected using the distinctive anonymity of the schemes such as group ranking
Shield.
According to the development status and trend of military project data safety privacy mechanism and block chain technology, needed towards national strategy
It asks, it is private that the safety protecting method of naval warfare data of the embodiment of the present invention based on block chain carries out maritime formation combat data
There are the privately owned chain common recognition mechanism of system construction, the combat data of chain, the privately owned chain trust data storage of combat data, combat data privately owned
Chain attack traces to the source, the research such as the privately owned chain Privacy Preservation Mechanism of combat data, solves the privately owned chain of combat data proved based on equity
Common recognition, the privately owned chain data model based on account model construct, based on the complete privately owned chain combat data intelligence contract of figure spirit, base
In bottleneck problems such as the privately owned chain secret protections of zero-knowledge proof, to finally realize the maritime formation operation number based on block chain
According to the building of application system.
In other words, the safety protecting method of naval warfare data of the embodiment of the present invention based on block chain is related to main
Technology has following several points:
First, the privately owned chain security model constructing technology of combat data based on formalization security proving.Pacified based on formalization
Full method of proof carries out accurate definition to Security Model.Construct security model accurate definition attacker and malicious node from
The tolerance range etc. of the function services, privacy information, activity time, computing capability and the memory space that are obtained in system, accurately
Define the Encryption Algorithm used and security function of data on chain, i.e. system level of confidentiality target to be achieved, accurate definition intelligence
Contract standard convention and code security audit form in the case where providing scene, accurate definition are directed to the troubleshooting of privately owned chain node
Mechanism and data fault-tolerant mechanism.With the method for formalization security proving, theory support is provided for system, it is higher to guarantee that system has
Safety.
Second, the privately owned chain common recognition technology of combat data proved based on equity.Efficient common recognition agreement is for system throughput
It measures most important.Traditional proof of work is known together agreement, needs to consume vast resources, and network can only reach it is probability total
Know, to guarantee safety, needs to wait longer acknowledging time, seriously limit the transactions of processing per second.Present invention research
Certainty knows together application of the agreement in block catenary system based on equity proof technology, and support can verify that, can supervise, be auditable
Efficiently common recognition scheme.
Third, the privately owned chain data model building based on account model.Due to the identity of naval warfare data entity
Attribute diversification, self-position trans-regional moving easily cause attribute replacement frequent, network topology dynamic change multi-modal, more
Scene application environment brings very big difficulty to the secure and trusted storage of naval warfare data.Therefore, the embodiment of the present invention
The safety protecting method of naval warfare data based on block chain comes by using the privately owned chain data model based on account model
Entity identities certification and the data integrity validation for realizing naval warfare data, so that it is real to solve data under multi-modal, more scenes
The authentication of body and the integrity verification of trust data this key scientific problems.
4th, based on the complete privately owned chain combat data intelligence contract of figure spirit.Intelligent contract is one kind in a manner of information-based
Propagation, verifying or the computer protocol for executing contract are the bases for realizing block catenary system flexible programming and operation data.Initially
Block chain framework using Fei Tuling complete simple script code come programming Control process of exchange, with the development of technology,
There is the complete scripting language that more complicated and flexible intelligent contract can be achieved of the figure spirit such as ether mill.Researching and designing is suitable for sea
The complete privately owned chain intelligence contract of the figure spirit of upper combat data security protection system, provides combat data secure and trusted storage ring
Border is one of the key technology that the present invention solves.
5th, the privately owned chain secret protection based on zero-knowledge proof.Privacy Protection has become block chain technology and answers
Key for various scenes.Common block chain, which is applied, to be provided using public key as user's assumed name and account to participant identity
Secret protection.It is obtained since the whole network account book can disclose, the station address in data record tracks attacker entirely
Historical chain weakens the secret protection ability of user to reveal the identity information of the user significantly.The embodiment of the present invention base
Zero-knowledge proof technology is used in the safety protecting method of the naval warfare data of block chain, in conjunction with Proxy Signature, group ranking, ring label
Other cryptographic schemes such as name realize safety and secret protection in naval warfare data trusted storage system.
Further, the purpose of the safety protecting method of naval warfare data of the embodiment of the present invention based on block chain is
Distributed trusted storage, secret protection and attack for maritime formation combat data such as are traced to the source at the demands, are proposed based on formalization
The privately owned chain common recognition mechanism of the privately owned chain security model of the combat data of security proving, the combat data based on equity proof is based on account
The privately owned chain data model of family model, based on scheming clever complete privately owned chain combat data intelligence contract and based on zero-knowledge proof
Privately owned chain secret protection, to build the privately owned platform chain framework model of maritime formation combat data.
In order to achieve the above objectives, the safety protecting method knot of naval warfare data of the embodiment of the present invention based on block chain
It closes based on technologies such as privately owned chain security model constructing technology, privately owned chain common recognition technology, zero-knowledge proofs, such as Fig. 3, Fig. 4 and Fig. 5 institute
Show, its technical solution is as follows:
1) military privately owned chain naval warfare data safety protection system building.For system function requirement, reality of the invention
Apply example propose the common recognition agreement that efficiently can verify that, can multi-level encryption can supervise anonymous data storage, attack the tracking that can be traced to the source
Mechanism, the secret protection scheme of provable security, and by the way of formal proof, system schema is verified, is utilized
A variety of evolutions thereofs verify system reliability, construct under untrusted environment, and the distribution of marine military data is credible
Record, graded encryption storage, data and node secret protection, attack are traced to the source, the high efficient and reliable of intelligent decision executes.
2) it efficiently can verify that PoS common recognition agreement.The block chain of the embodiment of the present invention needs raw by efficiently common recognition agreement
At with the throughput of lifting system.To avoid network size from increasing the pressure to network bandwidth and node calculation power, fixation can be used
Node committee mechanism promotes network scalability.Constant number of nodes, composition common recognition are randomly selected in entirely common recognition network
The committee, wherein when block generates, it is only necessary to reach common understanding inside the committee, it is unrelated with network size, thus significant increase
Network scalability.For guarantee block chain safety, attacker is avoided to concentrate the committee of entering or emphasis attack committeeman,
The committee need to be designed and reconfigure agreement, periodically carry out committee's recombination, and guarantee the randomness in committee's building process.It is entrusting
Before member can be set up, committee's seed is obtained by distributed random number generating algorithm, and choose committeeman on this basis
With leader, system enters a new period, and starts common recognition and continue to generate new block.
3) the privately owned chain data fine-granularity access control based on attribute.The embodiment of the present invention is made based on the sea of block chain
The safety protecting method of war data can not be supported pair for existing block chain technology while guaranteeing data transparency, confidentiality
This status of data fine-granularity access control stresses the secure data access control mechanisms towards military data, mainly uses base
Pacify in data in data safety fine-granularity access control technology on the military chain of nodal community and the military chain based on ciphertext attribute
Full fine-granularity access control technology, in particular to a kind of access control scheme for supporting data on classification multicenter chain.And
During actual deployment, there is revocable, multicenter, sharable content object the access control scheme based on account attributes, it can be with
The fine-granularity access control of data is more neatly realized, while needing lesser extra computation amount, greatly improves naval warfare
The safety of data safety guard system.
4) consistency checking of privately owned chain combat data intelligence contract.The naval warfare data safety of the embodiment of the present invention is anti-
Watch box system be based on block chain distributed structure/architecture, can use block linked data structure store with verify data, utilize distribution
Node knows together algorithm to generate and guarantee data transmission and secure access with more new data, in the way of cryptography, using by automatic
Change the intelligent contract of scripted code composition to program and operation data.For contract text and contract in intelligent contract operational process
The consistency problem of code, using the random number of anti-biasing characteristic come the safety and consistency of safeguards system.Distributed random number
The anti-biasing characteristic of generator can guarantee that malicious node can not influence the distribution character of random number, so that malicious node be avoided to grasp
The system failure caused by vertical random number.It traces to the source and calls to account in conjunction with attack mechanism, regulator may further confirm that generating random number mistake
The correctness of Cheng Zhihang.
5) theoretical to can verify that safe privately owned chain secret protection scheme.By improve the theory of proposition secret protection scheme can
Security verified, the safety protecting method of naval warfare data of the embodiment of the present invention based on block chain proposes that combat data is hidden
The formalization security model of private protection mechanism, including user's formalized model, inside and outside the Attacker Model and safe-conduct
Bright method.For specific situation, scheme that the present invention constructs, algorithm, agreement use following security proving technology: first is that being based on
The difficult problem that can not effectively solve in the safety of system and some polynomial time is associated with by the proof technology of problem specification
Get up;Second is that combination security proving technology, it is ensured that be proved safe several system in combination be after strong system with better function still
It is safe;Third is that the security proving technology based on game theory, the angle played the part of for rationality in system and certainly sharp participating user
Color analyzes the safety of proposed scheme and agreement.
The present invention is based on the technologies such as privately owned chain security model constructing technology, privately owned chain common recognition technology, zero-knowledge proof, in area
Using can verify that anti-bias profile formula random number generator in block catenary system, guarantee to take into account under the premise of throughput and network size
Efficiency, safety, the requirement of reliability, and data access control program and traceable on the classification multicenter chain based on ABE
The group's anonymous authentication technology that can be traced to the source breaks through the management of fine granularity dynamic and cross-domain authentication techniques, in combination with block chain model
The whole network characteristic disclosed, formed it is a set of support multi-security level(MSL), the trust data storage for the functions that can trace to the source etc. across trust domain, attack
Mechanism effectively meets the actual demand of multilevel security network information system span regional internet, and realizes to storing data entity
Effective retrospect, while proposing the method combined using zero-knowledge proof with anonymity schemes such as group ranking, homomorphic cryptographies, go forward side by side
The formalized model that one step takes out provable security carries out safety to system and user privacy is analyzed, and is to traditional homomorphism
The in-depth and development of encryption and multi-party computations technology, are the innovations to cryptography method and block chain technology.
The safety protecting method of the naval warfare data based on block chain proposed according to embodiments of the present invention, by privately owned
The technologies such as chain security model constructing technology, privately owned chain common recognition technology, zero-knowledge proof, it is anti-using can verify that in block catenary system
Bias profile formula random number generator guarantees to take into account efficiency under the premise of throughput and network size, safety, reliability are wanted
It asks.And data access control program and the traceable group's anonymous authentication skill traced to the source on the classification multicenter chain based on ABE
Art breaks through the management of fine granularity dynamic and cross-domain authentication techniques, discloses characteristic in combination with the whole network of block chain model, is formed a set of
Support multi-security level(MSL), can trace to the source etc. the trust data memory mechanism of functions across trust domain, attack, effectively meet multilevel security net
The actual demand of network information system span regional internet, and realize effective retrospect to storing data entity.
Referring next to the safety for the naval warfare data based on block chain that attached drawing description proposes according to embodiments of the present invention
Protective device.
Fig. 6 is the safety shield apparatus signal of the naval warfare data based on block chain of one embodiment of the invention
Figure.
As shown in fig. 6, should naval warfare data based on block chain safety device 10 include: building module 100,
Design module 200, memory module 300, tracing module 400 and protection module 500.
Wherein, building module 100 is for constructing the marine Defense Information System model based on block chain.Design module 200
For can verify that PoS common recognition mechanism with static gradually design efficiently to dynamic.Memory module 300 is special for constructing high dynamic network
The trust data memory mechanism of property.Tracing module 400 for constructing, trace to the source and tracking is called to account mechanism by attack.Protection module 500 is used
In the Privacy Preservation Mechanism of building data trusted storage.The safety device 10 of naval warfare data based on block chain is directed to
Distributed trusted storage, secret protection and the attack of maritime formation combat data such as are traced to the source at the demands, and maritime formation operation number is built
According to privately owned platform chain framework model, effectively meet the actual demand of multilevel security network information system span regional internet, improves
The safety and reliability of naval warfare data safety guard system.
Further, in one embodiment of the invention, building module 100 further comprises: read-write cell is used for root
According to user and the client layer of client main body, lower data is written and read by operation information of lower layer management system realization and mesh
Mark function;Administrative unit, for using the management system layer of centralization service node as the primary interface of whole system, under
Layer distributed block chain data structure is managed and supervises;Arrangement unit, for the super node network layer according to block chain,
All nodes are arranged on marine each primary communications base station and ship in a distributed manner according to current demand, and pass through PoS
It realizes that common recognition safeguards entire lower data, and the support of intelligent contract is provided, realize the identification to upper layer and account management;
Processing unit constructs data Layer according to current functional requirement for being based on block chain structure.Further, of the invention
In one embodiment, design module 200 is further used for designing the common recognition algorithm under committeeman, leader's stationary state,
When ensuring part of nodes failure, other normal nodes are unaffected, determine the teaming method of the committee in common recognition network, including
Committeeman's qualification acquisition and leader elect, and design external certificate agreement, to provide common recognition result correctness detection
Ability.
Further, in one embodiment of the invention, memory module 300 is further used for according to multicenter CP-ABE
Battlefield information fine granularity generate the first access control scheme, comprising:
Setup(1λ, N) and → (Params, { (apkk, askk)}K ∈ [1, n]),
Dec (C, uskk) → M or NULL,
Wherein, open security parameter λ is the input of Setup () algorithm, and system parameter Params, N number of administrative center is
Subordination public private key pair (apkk, askk), k is counting integer, and AkeyGen () is with the private key ask of administrative center itselfkIt is defeated
Entering, GID is global identifier,For attribute set,For access control policy, uskkIt is to export request attribute for user
Private key, Enc () are algorithm, and C is encrypted cipher-text information, and Dec () is algorithm, and M is the cleartext information after decryption;
Fine granularity is instructed to generate the second access control scheme according to the battlefield of multicenter KP-ABE, comprising:
Setup(1λ, N) and → (Params, { (apkk, askk)}K ∈ [1, n]),
Dec (C, uskk)→M or NULL;
And data integrity validation and teledata the proof of possession guarantee based on aggregate signature is utilized to be stored into chain number
According to integrality.
Further, in one embodiment of the invention, tracing module 400 further comprises: analytical unit, is used for needle
Combat data information system structure and group ranking and linkable ring signature based on privately owned chain are analyzed, are suitable for design
Anonymous authentication based on privately owned chain combat data information system and tracking are called to account scheme;Auditable unit, for being directed to combat data
The security audit and supervision problem stored on chain utilizes short stochastic signature technology, design on the basis of block chain knows together network
The audit and supervision to combat data trusted storage are realized suitable for the group ranking general construction of existing block catenary system.
Further, in one embodiment of the invention, protection module 500 is further used for knowing by non-interactive type zero
Knowing proves concealment participant identity and data, comprising:
c←KGen(1k),
π ← Prove (c, s, w),
1/0 ← Verify (c, s, π),
Wherein, non-interactive zero-knowledge proof agreement NIZK { s | (s, w) ∈ R }, c are output common characters string, KGen ()
For algorithm, k is open security parameter, and Prove () is algorithm, and Verify () is algorithm.
It should be noted that the explanation of the aforementioned safety protecting method embodiment to the naval warfare data based on block chain
Illustrate the device for being also applied for the embodiment, details are not described herein again.
The safety device of the naval warfare data based on block chain proposed according to embodiments of the present invention, by privately owned
The technologies such as chain security model constructing technology, privately owned chain common recognition technology, zero-knowledge proof, it is anti-using can verify that in block catenary system
Bias profile formula random number generator guarantees to take into account efficiency under the premise of throughput and network size, safety, reliability are wanted
It asks, and proposes the method combined using zero-knowledge proof with anonymity schemes such as group ranking, homomorphic cryptographies, and be further abstracted
The formalized model of provable security carries out safety to system out and user privacy is analyzed, and is to traditional homomorphic cryptography and peace
The in-depth and development of complete multi-party computing technique, are the innovations to cryptography method and block chain technology.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance
Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or
Implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two, three
It is a etc., unless otherwise specifically defined.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office
It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field
Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples
It closes and combines.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example
Property, it is not considered as limiting the invention, those skilled in the art within the scope of the invention can be to above-mentioned
Embodiment is changed, modifies, replacement and variant.
Claims (12)
1. a kind of safety protecting method of the naval warfare data based on block chain, which comprises the following steps:
Construct the marine Defense Information System model based on block chain;
It can verify that PoS common recognition mechanism with static gradually design efficiently to dynamic;
Construct the trust data memory mechanism of high dynamic network characteristic;
Building attack is traced to the source and tracking is called to account mechanism;And
Construct the Privacy Preservation Mechanism of data trusted storage.
2. the safety protecting method of the naval warfare data according to claim 1 based on block chain, which is characterized in that institute
Marine Defense Information System model of the building based on block chain is stated, further comprises:
According to user and the client layer of client main body, lower data is read by operation information of lower layer management system realization
It writes and objective function;
Using the management system layer of centralization service node as the primary interface of whole system, to lower layer's distributed block chain number
It is managed and supervises according to structure;
According to the super node network layer of block chain, all nodes are arranged in marine each master in a distributed manner according to current demand
It wants on communication base station and ship, and realizes that common recognition safeguards entire lower data by PoS, and provide the support of intelligent contract,
Realize the identification to upper layer and account management;
Based on block chain structure, data Layer is constructed according to current functional requirement, wherein further comprise marine military system
Back-end data, naval warfare constituent parts location information data and High Security Level demand data.
3. the safety protecting method of the naval warfare data according to claim 1 based on block chain, which is characterized in that institute
Stating design efficiently can verify that PoS common recognition mechanism, further comprise:
The common recognition algorithm under committeeman, leader's stationary state is designed, when ensuring part of nodes failure, other normal sections
Point is unaffected;
Determine that the teaming method of the committee in common recognition network, including committeeman's qualification acquisition and leader are elected.
External certificate agreement is designed, to provide the ability of common recognition result correctness detection.
4. the safety protecting method of the naval warfare data according to claim 1 based on block chain, which is characterized in that institute
The trust data memory mechanism for stating building high dynamic network characteristic further comprises:
The first access control scheme is generated according to the battlefield information fine granularity of multicenter CP-ABE, comprising:
Setup(1λ,N)→(Params,{(apkk,askk)}k∈[1,n]),
Dec(C,uskk) → M or NULL,
Wherein, open security parameter λ is the input of Setup () algorithm, system parameter Params, the system category of N number of administrative center
Property public private key pair (apkk,askk), k is counting integer, and AkeyGen () is the private key ask with administrative center itselfkTo input,
GID is global identifier,For attribute set,For access control policy, uskkIt is the private that request attribute is exported for user
Key, Enc () are algorithm, and C is encrypted cipher-text information, and Dec () is algorithm, and M is the cleartext information after decryption;
Fine granularity is instructed to generate the second access control scheme according to the battlefield of multicenter KP-ABE, comprising:
Setup(1λ,N)→(Params,{(apkk,askk)}k∈[1,n]),
Dec(C,uskk)→M or NULL;
Using based on aggregate signature data integrity validation and teledata proof of possession guarantee be stored into the complete of chain data
Property.
5. the safety protecting method of the naval warfare data according to claim 1 based on block chain, which is characterized in that institute
It states that building attack is traced to the source and tracking is called to account mechanism, further comprises:
It is analyzed for combat data information system structure and group ranking and linkable ring signature based on privately owned chain, with design
Suitable for based on privately owned chain combat data information system anonymous authentication and tracking call to account scheme;
For the security audit and supervision problem stored on combat data chain, on the basis of the block chain knows together network, benefit
With short stochastic signature technology, the group ranking general construction that design is suitable for existing block catenary system is credible to combat data to realize
The audit and supervision of storage.
6. the safety protecting method of the naval warfare data according to claim 1 based on block chain, which is characterized in that institute
The Privacy Preservation Mechanism for stating building data trusted storage further comprises:
Participant identity and data are hidden by non-interactive zero-knowledge proof, comprising:
c←KGen(1k),
π ← Prove (c, s, w),
1/0 ← Verify (c, s, π),
Wherein, non-interactive zero-knowledge proof agreement NIZK { s | (s, w) ∈ R }, c are output common characters string, and KGen () is to calculate
Method, k are open security parameter, and Prove () is algorithm, and Verify () is algorithm.
7. a kind of safety device of the naval warfare data based on block chain, which is characterized in that comprise the following modules:
Module is constructed, for constructing the marine Defense Information System model based on block chain;
Design module, for can verify that PoS common recognition mechanism with static gradually design efficiently to dynamic;
Memory module, for constructing the trust data memory mechanism of high dynamic network characteristic;
Tracing module, for constructing, attack is traced to the source and tracking is called to account mechanism;And
Protection module, for constructing the Privacy Preservation Mechanism of data trusted storage.
8. the safety device of the naval warfare data according to claim 7 based on block chain, which is characterized in that institute
Stating building module further comprises:
Read-write cell passes through operation information of lower layer management system realization pair for the client layer according to user and client main body
Lower data is written and read and objective function;
Administrative unit, for using the management system layer of centralization service node as the primary interface of whole system, to lower layer
Distributed block chain data structure is managed and supervises;
Arrangement unit, for the super node network layer according to block chain, by all nodes according to current demand cloth in a distributed manner
It is placed on marine each primary communications base station and ship, and realizes that common recognition safeguards entire lower data by PoS, and provide intelligence
The support of energy contract, realizes the identification to upper layer and account management;
Processing unit constructs data Layer according to current functional requirement for being based on block chain structure.
9. the safety device of the naval warfare data according to claim 7 based on block chain, which is characterized in that institute
It states design module to be further used for designing the common recognition algorithm under committeeman, leader's stationary state, to ensure part of nodes
When failure, other normal nodes are unaffected, determine the teaming method of the committee in common recognition network, including committeeman's qualification
It obtains and is elected with leader, and design external certificate agreement, to provide the ability of common recognition result correctness detection.
10. the safety device of the naval warfare data according to claim 7 based on block chain, which is characterized in that
The memory module is further used for generating the first access control scheme, packet according to the battlefield information fine granularity of multicenter CP-ABE
It includes:
Setup(1λ,N)→(Params,{(apkk,askk)}k∈[1,n]),
Dec(C,uskk) → M or NULL,
Wherein, open security parameter λ is the input of Setup () algorithm, system parameter Params, the system category of N number of administrative center
Property public private key pair (apkk,askk), k is counting integer, and AkeyGen () is the private key ask with administrative center itselfkTo input,
GID is global identifier,For attribute set,For access control policy, uskkIt is the private key that request attribute is exported for user,
Enc () is algorithm, and C is encrypted cipher-text information, and Dec () is algorithm, and M is the cleartext information after decryption;
Fine granularity is instructed to generate the second access control scheme according to the battlefield of multicenter KP-ABE, comprising:
Setup(1λ,N)→(Params,{(apkk,askk)}k∈[1,n]),
Dec(C,uskk)→M or NULL;
And data integrity validation and teledata the proof of possession guarantee based on aggregate signature is utilized to be stored into chain data
Integrality.
11. the safety device of the naval warfare data according to claim 7 based on block chain, which is characterized in that
The tracing module further comprises:
Analytical unit, for for based on privately owned chain combat data information system structure and group ranking and linkable ring signature into
Row analysis is suitable for anonymous authentication based on privately owned chain combat data information system and tracking is called to account scheme to design;
Auditable unit, for being directed to the security audit and supervision problem that store on combat data chain, in block chain common recognition net
On the basis of network, using short stochastic signature technology, design is suitable for the group ranking general construction of existing block catenary system to realize
Audit and supervision to combat data trusted storage.
12. the safety device of the naval warfare data according to claim 7 based on block chain, which is characterized in that
The protection module is further used for hiding participant identity and data by non-interactive zero-knowledge proof, comprising:
c←KGen(1k),
π ← Prove (c, s, w),
1/0 ← Verify (c, s, π),
Wherein, non-interactive zero-knowledge proof agreement NIZK { s | (s, w) ∈ R }, c are output common characters string, and KGen () is to calculate
Method, k are open security parameter, and Prove () is algorithm, and Verify () is algorithm.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811237478.0A CN109246137B (en) | 2018-10-23 | 2018-10-23 | Block chain-based safety protection method and device for maritime combat data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811237478.0A CN109246137B (en) | 2018-10-23 | 2018-10-23 | Block chain-based safety protection method and device for maritime combat data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109246137A true CN109246137A (en) | 2019-01-18 |
CN109246137B CN109246137B (en) | 2020-08-04 |
Family
ID=65081562
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811237478.0A Active CN109246137B (en) | 2018-10-23 | 2018-10-23 | Block chain-based safety protection method and device for maritime combat data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109246137B (en) |
Cited By (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109831501A (en) * | 2019-01-30 | 2019-05-31 | 京东数字科技控股有限公司 | Information dispensing method and system based on block chain |
CN109948352A (en) * | 2019-03-06 | 2019-06-28 | 中国人民解放军联勤保障部队第九八八医院 | The data read-write system of adaptive intelligent protective earplug based on battlefield application |
CN110069475A (en) * | 2019-04-25 | 2019-07-30 | 中国科学院信息工程研究所 | A kind of across data entity source tracing method of manufacturing industry based on the multi-party self―sustaining of block chain |
CN110096542A (en) * | 2019-04-29 | 2019-08-06 | 百度在线网络技术(北京)有限公司 | Data verification processing method, device, system and the medium of decentralization |
CN110113148A (en) * | 2019-04-28 | 2019-08-09 | 武汉理工大学 | A kind of software definition opportunistic network node identities verification method based on block chain |
CN110263088A (en) * | 2019-05-20 | 2019-09-20 | 阿里巴巴集团控股有限公司 | In conjunction with the conditional receipt storage method and node of code mark and event type |
CN110351093A (en) * | 2019-06-14 | 2019-10-18 | 西南交通大学 | Based on attribute can linked network ring signatures method |
CN111399987A (en) * | 2020-03-26 | 2020-07-10 | 国金公用通链(海南)信息科技有限公司 | Universal block chain sandbox supervision technology |
CN111538786A (en) * | 2020-04-24 | 2020-08-14 | 上海简苏网络科技有限公司 | Block chain data desensitization and tracing storage method and device |
CN111752246A (en) * | 2020-07-02 | 2020-10-09 | 中国科学技术大学 | Unmanned aerial vehicle bee colony cooperative work platform based on block chain and artificial intelligence drive |
CN112150161A (en) * | 2020-09-30 | 2020-12-29 | 重庆市科学技术研究院 | Electronic ticket transaction risk management and control system and method |
CN112417502A (en) * | 2020-11-18 | 2021-02-26 | 中国电子科技集团公司第三十研究所 | Distributed instant messaging system and method based on block chain and decentralized deployment |
CN112448950A (en) * | 2020-11-13 | 2021-03-05 | 中国电子科技集团公司第二十八研究所 | Dynamic construction method for information link between heterogeneous military information systems |
CN112487443A (en) * | 2020-11-11 | 2021-03-12 | 昆明理工大学 | Energy data fine-grained access control method based on block chain |
CN112989392A (en) * | 2021-04-19 | 2021-06-18 | 河北科技大学 | Battlefield situation perception method, system and terminal equipment |
RU2750626C2 (en) * | 2019-11-27 | 2021-06-30 | Акционерное общество "Лаборатория Касперского" | System and method for access control in electronic units of vehicle control |
CN114065283A (en) * | 2020-11-20 | 2022-02-18 | 北京邮电大学 | Lightweight block chain storage method and device capable of cyclic regeneration |
US11640481B2 (en) | 2019-11-27 | 2023-05-02 | AO Kaspersky Lab | System and method for providing a security policy |
CN116800435A (en) * | 2023-08-21 | 2023-09-22 | 成都信息工程大学 | Access control method, system and storage medium based on zero knowledge proof and cross-chain |
CN116825264A (en) * | 2023-08-30 | 2023-09-29 | 青岛市妇女儿童医院(青岛市妇幼保健院、青岛市残疾儿童医疗康复中心、青岛市新生儿疾病筛查中心) | Gynaecology and obstetrics information processing method and system based on Internet |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106911513A (en) * | 2016-12-14 | 2017-06-30 | 中国电子科技集团公司第三十研究所 | A kind of credible equipment management method based on decentralization network |
CN108108487A (en) * | 2018-01-10 | 2018-06-01 | 杭州复杂美科技有限公司 | A kind of common recognition method of block chain |
CN108152837A (en) * | 2018-01-04 | 2018-06-12 | 北京众享比特科技有限公司 | Navigation signal backs up and anti-fraud method and device, equipment and storage medium |
KR101897032B1 (en) * | 2018-04-26 | 2018-09-10 | 이준엽 | Apparatus and method for digital rights management using block chain |
EP3382616A1 (en) * | 2017-03-31 | 2018-10-03 | Siemens Aktiengesellschaft | Method and device for computer-assisted provision of a secure digital twin |
-
2018
- 2018-10-23 CN CN201811237478.0A patent/CN109246137B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106911513A (en) * | 2016-12-14 | 2017-06-30 | 中国电子科技集团公司第三十研究所 | A kind of credible equipment management method based on decentralization network |
EP3382616A1 (en) * | 2017-03-31 | 2018-10-03 | Siemens Aktiengesellschaft | Method and device for computer-assisted provision of a secure digital twin |
CN108152837A (en) * | 2018-01-04 | 2018-06-12 | 北京众享比特科技有限公司 | Navigation signal backs up and anti-fraud method and device, equipment and storage medium |
CN108108487A (en) * | 2018-01-10 | 2018-06-01 | 杭州复杂美科技有限公司 | A kind of common recognition method of block chain |
KR101897032B1 (en) * | 2018-04-26 | 2018-09-10 | 이준엽 | Apparatus and method for digital rights management using block chain |
Non-Patent Citations (1)
Title |
---|
孙岩;雷震;詹国勇: ""基于区块链的军事数据安全研究"", 《指挥与控制学报》 * |
Cited By (35)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109831501B (en) * | 2019-01-30 | 2020-09-29 | 京东数字科技控股有限公司 | Information distribution method and system based on block chain |
CN109831501A (en) * | 2019-01-30 | 2019-05-31 | 京东数字科技控股有限公司 | Information dispensing method and system based on block chain |
CN109948352A (en) * | 2019-03-06 | 2019-06-28 | 中国人民解放军联勤保障部队第九八八医院 | The data read-write system of adaptive intelligent protective earplug based on battlefield application |
CN109948352B (en) * | 2019-03-06 | 2023-01-10 | 中国人民解放军联勤保障部队第九八八医院 | Battlefield application-based data reading and writing system of adaptive intelligent protection earplug |
CN110069475B (en) * | 2019-04-25 | 2021-04-20 | 中国科学院信息工程研究所 | Manufacturing industry cross-data entity tracing method based on block chain multi-party self-maintenance |
CN110069475A (en) * | 2019-04-25 | 2019-07-30 | 中国科学院信息工程研究所 | A kind of across data entity source tracing method of manufacturing industry based on the multi-party self―sustaining of block chain |
CN110113148A (en) * | 2019-04-28 | 2019-08-09 | 武汉理工大学 | A kind of software definition opportunistic network node identities verification method based on block chain |
CN110096542A (en) * | 2019-04-29 | 2019-08-06 | 百度在线网络技术(北京)有限公司 | Data verification processing method, device, system and the medium of decentralization |
CN110263088B (en) * | 2019-05-20 | 2021-04-02 | 创新先进技术有限公司 | Conditional receipt storage method and node combining code labeling and event type |
CN110263088A (en) * | 2019-05-20 | 2019-09-20 | 阿里巴巴集团控股有限公司 | In conjunction with the conditional receipt storage method and node of code mark and event type |
CN110351093A (en) * | 2019-06-14 | 2019-10-18 | 西南交通大学 | Based on attribute can linked network ring signatures method |
CN110351093B (en) * | 2019-06-14 | 2021-08-03 | 西南交通大学 | Linkable network ring signature method based on attributes |
US11640481B2 (en) | 2019-11-27 | 2023-05-02 | AO Kaspersky Lab | System and method for providing a security policy |
RU2750626C2 (en) * | 2019-11-27 | 2021-06-30 | Акционерное общество "Лаборатория Касперского" | System and method for access control in electronic units of vehicle control |
US11347892B2 (en) | 2019-11-27 | 2022-05-31 | AO Kaspersky Lab | System and method for access control in electronic control units of vehicles |
CN111399987B (en) * | 2020-03-26 | 2023-04-18 | 海口海辰宇信息科技有限公司 | Universal block chain sandbox supervision technology |
CN111399987A (en) * | 2020-03-26 | 2020-07-10 | 国金公用通链(海南)信息科技有限公司 | Universal block chain sandbox supervision technology |
CN111538786A (en) * | 2020-04-24 | 2020-08-14 | 上海简苏网络科技有限公司 | Block chain data desensitization and tracing storage method and device |
CN111752246B (en) * | 2020-07-02 | 2023-03-10 | 中国科学技术大学 | Unmanned aerial vehicle bee colony cooperative work platform based on block chain and artificial intelligence drive |
CN111752246A (en) * | 2020-07-02 | 2020-10-09 | 中国科学技术大学 | Unmanned aerial vehicle bee colony cooperative work platform based on block chain and artificial intelligence drive |
CN112150161B (en) * | 2020-09-30 | 2023-08-08 | 重庆市科学技术研究院 | Electronic ticket transaction risk management and control system and method |
CN112150161A (en) * | 2020-09-30 | 2020-12-29 | 重庆市科学技术研究院 | Electronic ticket transaction risk management and control system and method |
CN112487443A (en) * | 2020-11-11 | 2021-03-12 | 昆明理工大学 | Energy data fine-grained access control method based on block chain |
CN112448950A (en) * | 2020-11-13 | 2021-03-05 | 中国电子科技集团公司第二十八研究所 | Dynamic construction method for information link between heterogeneous military information systems |
CN112448950B (en) * | 2020-11-13 | 2023-03-03 | 中国电子科技集团公司第二十八研究所 | Dynamic construction method for information link between heterogeneous military information systems |
CN112417502B (en) * | 2020-11-18 | 2022-03-18 | 中国电子科技集团公司第三十研究所 | Distributed instant messaging system and method based on block chain and decentralized deployment |
CN112417502A (en) * | 2020-11-18 | 2021-02-26 | 中国电子科技集团公司第三十研究所 | Distributed instant messaging system and method based on block chain and decentralized deployment |
CN114065283A (en) * | 2020-11-20 | 2022-02-18 | 北京邮电大学 | Lightweight block chain storage method and device capable of cyclic regeneration |
CN114065283B (en) * | 2020-11-20 | 2024-05-28 | 北京邮电大学 | Lightweight circularly regenerated blockchain storage method and device |
CN112989392B (en) * | 2021-04-19 | 2022-08-30 | 河北科技大学 | Battlefield situation perception method, system and terminal equipment |
CN112989392A (en) * | 2021-04-19 | 2021-06-18 | 河北科技大学 | Battlefield situation perception method, system and terminal equipment |
CN116800435A (en) * | 2023-08-21 | 2023-09-22 | 成都信息工程大学 | Access control method, system and storage medium based on zero knowledge proof and cross-chain |
CN116800435B (en) * | 2023-08-21 | 2023-12-19 | 成都信息工程大学 | Access control method, system and storage medium based on zero knowledge proof and cross-chain |
CN116825264A (en) * | 2023-08-30 | 2023-09-29 | 青岛市妇女儿童医院(青岛市妇幼保健院、青岛市残疾儿童医疗康复中心、青岛市新生儿疾病筛查中心) | Gynaecology and obstetrics information processing method and system based on Internet |
CN116825264B (en) * | 2023-08-30 | 2023-11-21 | 青岛市妇女儿童医院(青岛市妇幼保健院、青岛市残疾儿童医疗康复中心、青岛市新生儿疾病筛查中心) | Gynaecology and obstetrics information processing method and system based on Internet |
Also Published As
Publication number | Publication date |
---|---|
CN109246137B (en) | 2020-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109246137A (en) | The safety protecting method and device of naval warfare data based on block chain | |
Zhang et al. | Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage | |
Li et al. | A blockchain privacy protection scheme based on ring signature | |
Homoliak et al. | A security reference architecture for blockchains | |
Kissel | Glossary of key information security terms | |
CN113495920B (en) | Content auditing system, method and device based on blockchain and storage medium | |
Zhang et al. | A blockchain-based authentication scheme and secure architecture for IoT-enabled maritime transportation systems | |
Zhu et al. | Data security and privacy in bitcoin system: a survey | |
Zhu et al. | Secure Online Examination with Biometric Authentication and Blockchain‐Based Framework | |
Fraga et al. | A taxonomy of trust and reputation system attacks | |
Mohanta et al. | Blockchain-based consensus algorithm for solving security issues in distributed internet of things | |
CN117040800A (en) | Personal archive management scheme based on alliance chain and non-certificate searchable encryption | |
CN110380859A (en) | Based on unsymmetrical key pond to and DH agreement quantum communications service station identity identifying method and system | |
Killer et al. | Æternum: A decentralized voting system with unconditional privacy | |
Tan et al. | Post-Quantum Adversarial Modeling: A User’s Perspective | |
Yanhui et al. | Research on identity authentication system of Internet of Things based on blockchain technology | |
CN114124392B (en) | Data controlled circulation method, system, device and medium supporting access control | |
Liu et al. | DefendFL: A Privacy-Preserving Federated Learning Scheme Against Poisoning Attacks | |
Bahri et al. | Enhanced audit strategies for collaborative and accountable data sharing in social networks | |
Wang et al. | Linking Souls to Humans with ZKBID: Accountable Anonymous Blockchain Accounts for Web 3.0 Decentralized Identity | |
Kremer et al. | Cybersecurity | |
Cai et al. | Blockchain-Enabled Secure Federated Learning for Digital Twin Networks | |
Aïmeur et al. | P3ERS: Privacy-Preserving PEer Review System. | |
Almomani et al. | Cryptographic Techniques for Securing Blockchain-Based Cryptocurrency Transactions Against Botnet Attacks | |
Krishnamurthy et al. | A blockchains security architecture for confidential applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |