CN110945833A - Method and system for multi-mode identification network privacy protection and identity management - Google Patents

Method and system for multi-mode identification network privacy protection and identity management Download PDF

Info

Publication number
CN110945833A
CN110945833A CN201880036695.5A CN201880036695A CN110945833A CN 110945833 A CN110945833 A CN 110945833A CN 201880036695 A CN201880036695 A CN 201880036695A CN 110945833 A CN110945833 A CN 110945833A
Authority
CN
China
Prior art keywords
signature
node
block
nodes
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201880036695.5A
Other languages
Chinese (zh)
Inventor
李挥
王菡
邬江兴
朱伏生
伊鹏
安辉耀
张昕淳
王子贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China National Digital Switching System Engineering & Technological R&d Center
Peking University Shenzhen Graduate School
Original Assignee
China National Digital Switching System Engineering & Technological R&d Center
Peking University Shenzhen Graduate School
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China National Digital Switching System Engineering & Technological R&d Center, Peking University Shenzhen Graduate School filed Critical China National Digital Switching System Engineering & Technological R&d Center
Priority to PCT/CN2018/119724 priority Critical patent/WO2020113546A1/en
Publication of CN110945833A publication Critical patent/CN110945833A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures

Abstract

The invention is suitable for the technical field of block chains, and provides a method for multi-mode identification network privacy protection and identity management, which comprises the following steps: s1, registering the network identification by using a block chain technology to form a multi-mode identification network and carrying out domain division to construct a hierarchical block chain system; s2, according to the identity difference of each node, all the node signatures are combined into a tree-shaped signature structure through a hierarchical cluster/ring signature mechanism in the multimode identification network; s3, the network verifies only the upper node signature of the tree signature structure, thereby realizing lower node signature tree verification using the signature as a root. And the privacy protection of the membership is realized by adopting a group/ring signature technology. The manager node and the common node establish a group and generate superior group signatures of a plurality of transactions; and simultaneously establishing a ring with the committee nodes to generate a plurality of upper-level ring signatures of the voting messages.

Description

Method and system for multi-mode identification network privacy protection and identity management
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a method for multi-mode identification network privacy protection and identity management.
Background
The multimode identification network is a novel open network architecture provided aiming at the essential defects that the existing internet control capability is too concentrated and international multilateral co-management is lacked, and the like, and particularly refers to a network environment in which networks with different system structures jointly deploy multipath identification and cooperative routing addressing. For example, if a content network is deployed in a conventional network, a multi-mode network environment consisting of two network architectures and addressed by a content identifier and an address identifier is formed if data can be shuttled between the two networks. By utilizing the advantages of different networks to work cooperatively, the multimode identification network can improve the basic transmission capability of the current internet, enhance the utilization rate of network resources and enrich the functions of network layers. More importantly, the multi-mode identification network reduces the dependency and limitation of the existing internet system on address identification, and provides possibility for multilateral co-management of the internet.
In 10.2008, a cryptology researcher named "zhongben wisdom" published a paper about bitcoin, describing a peer-to-peer electronic money system without the intervention of a third-party trusted authority, and first proposed the concept of a block chain. The block chain is a block chain type data structure which is not forged, cannot be tampered and can be traced through transparent and credible rules under a peer-to-peer network environment, and a transaction processing mode is realized and managed. The blockchain technology is a tamper-proof shared distributed account book essentially, all member nodes in the network maintain the account book together, and all transaction information can be completely recorded by using a chain type data structure based on the cryptography technology rather than external trust. Thus, the block chain possesses three significant features: decentralized, non-tamperable, and distrusted. In some block chain application scenarios, identity control needs to be introduced, which forms a federation chain. A federation chain refers to a blockchain in which a plurality of organizations participate in accounting together, each organization runs one or more nodes, and members of the federation mutually believe and achieve consensus through multiple centers. The creation of blocks on the chain is jointly decided by the pre-selected accounting nodes, and only common member nodes are allowed to read, write, record and send transactions. Unlike public chains, federation chains are considered "partially decentralized", in the sense that they are owned only by members within the federation, and the data on the chain is only accessible to enterprises and members within the federation. The partial decentralization characteristic of the alliance chain just conforms to the multilateral co-management idea of the multi-mode identification network. And the federation chain is more advantageous in terms of high availability, high performance, programmability, and privacy protection than the public chain.
In a blockchain system, each data transaction requires a signature to ensure the integrity and authenticity of the information. A simple digital signature mechanism is that if a server A sends a message to a server B, in order to prove to B that the message can only be sent by A, A encrypts the message M into a signature S by using a private key, B decrypts S by using a public key A after receiving the message M and the signature S and compares the decrypted message with the decrypted message M, and if the message M and the signature S are the same, the signature can be proved to be effective. Confidentiality is often required in practical systems, and a hashing algorithm is typically incorporated in the digital signature mechanism. The sender a generates a message digest from the message using a Hash function, and then encrypts this digest with its own private key into a signature, which is sent with the message to the receiver B. The receiver first computes a message digest from the received message using the same Hash function as a and then decrypts the appended signature using a's public key. Comparing the two digests, if they are the same, it can be confirmed that the signature belongs to a.
Therefore, identity management and privacy protection mechanisms based on digital signatures are key core technologies for ensuring the safety and reliability of federation chain transactions, and are necessary conditions for further virtuous circle development of federation chains. However, the matching degree of the existing block chain-oriented privacy protection and identity management method and the extensible hierarchical structure of the identification network is not high, and the problems of large scale and high verification complexity exist, so that the large-scale network with high flux cannot be supported.
In 2013, in 8 months, Christina Garman et al proposed a decentralized anonymous credential system to solve the Internet identity privacy authentication problem. In conventional solutions, a certificate authority, a DNS facility or a large organization like a google-logged provider plays a very important role in the internet authentication process. However, these centralized large organizations are very likely to be targets of attack by attackers, and once anomalies occur in these organizations, the privacy of users is easily revealed. Garman et al propose to establish a blockchain organization composed of multiple nodes to provide a generation and verification service of identification for a user, and to achieve anonymity by means of a certain encryption algorithm, thereby better protecting user privacy. Anonymous credentials allow a user to prove that he owns a credential issued by an organization without revealing any other personal privacy. Under standard security definitions, even if the verifier and credential issuer collude, they cannot determine who issued the credential and when it will be used.
Since Garman uses a relatively expensive "double-layer discrete logarithm proof" in the scheme construction, the generated certificate has a large scale and a slow verification speed, and cannot meet the requirements of practical applications. In addition, the scheme can only realize the protection of identity privacy, but cannot effectively manage the identity, and cannot meet the actual requirement of a multimode identification network.
Menlo money is an open source cryptocurrency created in 4 months 2014, using ring signature technology to protect the anonymity of users and privacy protection of transactions, i.e. RingCT protocol.
Ring signatures are a class of digital signature schemes that allow a member within a ring to sign a message on behalf of all members within the ring without revealing its identity. Common ring signatures provide unconditional anonymity, and the verifier cannot judge whether the two signatures are from the same member. However, in some cases this complete anonymity does not apply and associable ring signature techniques are produced. A feature of an associable ring signature is that, given any two associable ring signatures, the verifier knows whether they were generated by the same signer, but has no knowledge of the identity of the signer unless the verifier is on the same ring as the signer.
In the menuing system, each user may have several different accounts, each of which consists of a one-time address and coin, associated with an account key that authorizes payout. In each transaction, the user may spend his or her account with the corresponding key.
The RingCT protocol consists essentially of two phases:
1) consumer generated ring secret transaction:
the consumer first determines a plurality of input and output accounts so that their cumulative balances are equal, and then builds a ring for each sub-transaction's inputs and signs.
2) The receiver verifies the ring secret transaction:
once the miners receive the transactions in the blockchain network, the miners verify the validity of the transactions by using the messages and the signatures together, and pack the valid transactions into a new block.
Although the protection mechanism adopted by the menuo currency has a good solution to privacy protection, the effective management of the identity of the participating node and the effective tracking of the behavior cannot be realized, which is unacceptable in a multimode identification scene with the requirement of managing the behavior of the participating party.
Disclosure of Invention
The invention aims to provide a method for multi-mode identification network privacy protection and identity management, and aims to solve the problems that all participants are in the same domain or depend on services provided by a third-party trusted authority, traceability is unavailable, and the method cannot be applied to a hierarchical alliance link structure of a multi-mode identification network.
The invention is realized as the following, and is used for the multimode identification network privacy protection and identity management method, the method comprises the following steps:
s1, registering the network identification by using a block chain technology to form a multi-mode identification network and carrying out domain division to construct a hierarchical block chain system;
s2, according to the identity difference of each node, all the node signatures are combined into a tree-shaped signature structure through a hierarchical cluster/ring signature mechanism in the multimode identification network;
s3, the network verifies only the upper node signature of the tree signature structure, thereby realizing lower node signature tree verification using the signature as a root.
The further technical scheme of the invention is as follows: in step S3, each upper node manages a group of lower nodes as leaf nodes, and each upper node signs a signature of a lower node, which is generated by combining signatures of lower nodes and includes all information of lower nodes.
The further technical scheme of the invention is as follows: in step S2, the node signatures are differentiated into two types of signature trees, namely voting ring signatures and common group signatures according to the belongings and roles of the node signatures.
The further technical scheme of the invention is as follows: the hierarchical group/ring signature mechanism in step S2 includes the following steps:
s21, generating a transaction by any common node in the bottom layer domain and attaching a signature S, and enabling the housekeeper node to monitor the transaction in the domain and put the effective transaction into a transaction pool;
s22, the on-duty manager node regularly takes the affairs and encapsulates the affairs into a pre-block, forms a group with the ordinary node to which the affairs belong to generate a new superior group signature S ', and sends the pre-block I and the new superior group signature S' to all the committee nodes and the manager node in the domain;
s23, after receiving the pre-block, the committee node verifies the affair and the housekeeping signature S' and judges whether to agree to generate a corresponding formal block, if so, the committee node sends the associable ring signature P and the timestamp of the committee node as voting messages back to the housekeeping node and executes the next step, and if not, the committee node is directly discarded;
s24, before the block generation time is up, judging whether the number of signatures and timestamps collected by the attendant node is greater than a preset value or not, if so, forming a ring by the attendant node and the committee node to which the signatures belong and generating a new superior ring signature P ', adding the superior ring signature P ' to the pre-block head to generate a formal block head, issuing the formal block head to the universe together with the block, the timestamp and the signature S ' and executing the next step, and if the number of signatures and the timestamp are less than the preset value or exceed the generation time, not generating the block by the attendant node in the turn;
s25, the committee node verifies the signatures P 'and S' in the block after receiving the formal block and deletes the transaction contained in the valid block from the transaction pool.
The further technical scheme of the invention is as follows: the step S21 further includes the following steps:
s211, any common node in the bottom layer domain also receives the transaction in the domain and verifies whether the content and the signature of the transaction are correct, if so, the transaction is forwarded to other nodes in the domain, and if not, the transaction is directly discarded.
The further technical scheme of the invention is as follows: the step S25 further includes the steps of:
s251, judging whether the committee node of the receiving block is in the top-level domain, if not, extracting the block as a transaction, generating a new upper-level group signature S 'according to the appended housekeeping signature S', submitting the transaction as a common node of the upper-level domain, continuously verifying the signatures P 'and S' by other upper-level nodes, and if the receiving committee node is in the top-level domain, executing the next step;
s252, judging whether the number of committee nodes receiving the formal block is greater than a set value, if so, entering the legal state of the block to have final confirmation, and if not, invalidating the block.
The further technical scheme of the invention is as follows: the preset value is more than or equal to 50%; the set value is 50% or more.
Another object of the present invention is to provide a privacy protection and identity management system for a multimode identification network, which comprises
The multimode identification network generation module is used for registering network identifications by using a block chain technology to form a multimode identification network and carry out domain division to construct a hierarchical block chain system;
the hierarchical signature module is used for signing all nodes together to form a tree-shaped signature structure through a hierarchical cluster/ring signature mechanism according to different identities of all nodes in the multimode identification network;
and the verification module is used for the network to verify only the signature of the upper node of the tree-shaped signature structure so as to realize the verification of the lower node signature tree taking the signature as a root.
The further technical scheme of the invention is as follows: each superior node in the verification module manages a group of subordinate nodes as leaf nodes, and each superior node signature is generated by combining subordinate node signatures and contains all information of the subordinate node signatures.
The further technical scheme of the invention is as follows: the hierarchical signature module is divided into two types of signature trees of voting ring signature and common group signature according to the belongingness and the action of each node signature.
The further technical scheme of the invention is as follows: the hierarchical group/ring signature mechanism in the hierarchical signature module comprises
The monitoring node signature generating unit is used for generating a transaction by any common node in the bottom layer domain and attaching a signature S, and the housekeeper node monitors the transaction in the domain and puts the effective transaction into a transaction pool;
the system comprises a pre-block generating unit, a pre-block generating unit and a pre-block processing unit, wherein the pre-block generating unit is used for regularly taking a transaction from an on-duty manager node and packaging the transaction into a pre-block, forming a group with a common node to which the transaction belongs to generate a new upper-level group signature S ', and sending the pre-block I and the new upper-level group signature S' to all committee nodes and all manager nodes in;
the first judging unit is used for verifying the affair and the housekeeping signature S' of the committee node after receiving the pre-block and judging whether to agree to generate a corresponding formal block, if the formal block agrees to be generated, the associable ring signature P and the timestamp of the committee node are used as voting messages and sent back to the housekeeping node on duty, and the second judging unit is executed, and if the officer node disagrees, the administrative node is directly discarded;
the second judgment unit is used for judging whether the number of the signatures and the timestamps collected by the commission committee nodes in the same domain is greater than a preset value or not by the attendant before the block generation time is up, if so, the attendant nodes and the commission nodes to which the signatures belong form a ring and generate a new superior ring signature P ', the superior ring signature P ' is added to the pre-block head to generate a formal block head, the block body, the timestamps and the signatures S ' are issued to the universe together, and the signature verification unit is executed, and if the number of the signatures and the timestamps is less than the preset value or exceeds the cut-off time, the attendant does not generate the block in the turn;
and the signature verification unit is used for verifying the signatures P 'and S' in the block after the committee node receives the formal block and deleting the transactions contained in the valid block from the transaction pool.
The further technical scheme of the invention is as follows: the listening node signature generating unit also comprises
And the real-affair correct judging unit is used for receiving the affair in the domain with any common node in the bottom-layer domain and verifying whether the affair content and the signature are correct or not, if so, forwarding the affair to other nodes in the domain, and if not, directly discarding the affair.
The further technical scheme of the invention is as follows: the signature verification unit further comprises
A third judging unit, configured to judge whether a committee node of the receiving block is in a top-level domain, if not, extract the block as a transaction, generate a new upper-level group signature S ″ according to a subsequent housekeeping signature S ', use the new upper-level group signature S ″ as a common node of a previous-level domain to submit the transaction, and continue to verify signatures P' and S ″ by other upper-level nodes, and if the receiving committee node is in the top-level domain, execute a fourth judging unit;
the fourth judging unit is used for judging whether the number of committee nodes receiving the formal block is larger than a set value or not, if so, the block enters a legal state and has final confirmation, and if not, the block is invalid.
The further technical scheme of the invention is as follows: the preset value is more than or equal to 50%; the set value is 50% or more.
The invention has the beneficial effects that: and the privacy protection of the membership is realized by adopting a group/ring signature technology. The manager node and the common node establish a group and generate superior group signatures of a plurality of transactions; and simultaneously establishing a ring with the committee nodes to generate a plurality of upper-level ring signatures of the voting messages. After receiving the signature message, the common node can only determine the content of the message and cannot know the processing flow of the message, so that the public transparency characteristics of the authority control and the block chain are considered.
The committee node in the lower domain is also a common node in the upper domain, and is responsible for raising requests to the upper domain for transactions in the lower domain. The identity tracking can be realized by adding a hierarchical signature design in the cross-domain nodes, so that the member and block transactions are better managed.
The group owner can manage the members in a group and identify the specific source of the message, thereby ensuring that the members in the group can not maliciously send the message and can not accept corresponding punishment. In the multimode identification network, the group establishment and maintenance process between a housekeeper and a common node has important significance for the normal operation of the network, and the disturbance of an illegal node to the network is prevented.
Drawings
Fig. 1 is a schematic diagram of a hierarchical signature tree structure identity model according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a hierarchical signature mechanism under a novel federation chain architecture provided by an embodiment of the present invention.
Detailed Description
As shown in fig. 1-2, the method for multi-mode identity network privacy protection and identity management provided by the present invention is detailed as follows:
and step S1, registering the network identifier by using a blockchain technology, forming a multi-mode identifier network, dividing domains to construct a hierarchical blockchain system, and managing each network domain by using a PoV voting consensus algorithm.
Step S2, according to the different identities of each node, all nodes are signed by a hierarchical cluster/ring signature mechanism to form a tree-shaped signature structure in the multimode identification network; according to the belongingness and the action of each node signature, the node signature is divided into two types of signature trees of voting ring signature and common group signature.
In step S3, the network verifies only the upper node signature of the tree signature structure, thereby realizing lower node signature tree verification using the signature as a root. Each upper node manages a group of lower nodes as leaf nodes, each upper node signature is generated by combining the signatures of the lower nodes and contains all information of the signatures of the lower nodes, and the verification of the upper node signature also contains the verification of a tree taking the signature as a root.
Similar to the common group/ring signature requirements, any third party cannot track the identity of the person to whom the signature belongs, just by taking the signature and verifying the public key. In addition, the security of the hierarchical group signature scheme requires that the group administrator only track the signer identities of the leaf nodes of the group administrator, but cannot open signatures generated by members under other groups. By establishing a group relationship among nodes with different levels and different identities, a group administrator of a superior node can quickly locate a problem group and identify a corresponding malicious user.
A privacy protection and identity management method for a multimode identification network is characterized in that a set of hierarchical signature scheme is designed according to the structural characteristics of a multimode identification alliance chain network. By utilizing the anonymity and the supervision advantage of the group/ring signature, the invention realizes the sufficient hiding of the node identities between different levels and the effective management of the identities in the same level, and better meets the requirements of a multimode identification network on safety and management.
In the invention, the nodes in the domain are divided into common nodes, housekeeper nodes and committee nodes according to the identity from low to high, and the same node can be used for holding a plurality of identities, as shown in figure 1. Wherein, the common nodes only enjoy the right of knowing and the right of proposing, and can not participate in the consensus process. The housekeeping node has the right to produce the block. Committee nodes own the validation blocks and the right to recommend, validate, evaluate, and participate in the superior consensus. The committee nodes of the lower level domain also assume the identity of the upper level domain.
Because the nodes of the multimode network have different division of labor, the invention considers using a hierarchical group/ring signature mechanism. The node signatures in the network together form a tree structure, with each superior node managing a set of subordinate nodes as its leaf nodes. The upper signature is generated by combining the lower signatures, and includes all information of the lower signature, and the verification of the upper signature also includes the verification of the tree with the signature as a root. Similar to the common group/ring signature requirements, any third party cannot track the identity of the signer that generated the signature, with just the signature and the verification public key. In addition, the security of the hierarchical group signature scheme requires that the group administrator only track the signer identities of the leaf nodes of the group administrator, but cannot open signatures generated by members under other groups. By establishing a group relationship among nodes with different levels and different identities, a group administrator of a superior node can quickly locate a problem group and identify a corresponding malicious user.
Aiming at the characteristics of a hierarchical signature scheme, the invention uses the following block structure:
the specific signature flow is shown in fig. 2.
1) Any common node in the bottom layer domain generates a transaction and attaches a signature S, meanwhile, the transaction in the domain is received, the correctness of the content of the transaction and the signature is verified, and if the correctness is ensured, the transaction is forwarded to other nodes in the domain. The housekeeping node listens to the intra-domain transactions and places valid transactions in the transaction pool.
2) The on-duty manager node periodically takes out some transactions from the transaction pool, packages the transactions into a pre-block, forms a group with the common nodes to which the transactions belong, generates a new superior group signature S ', and sends the superior group signature S' and the pre-block to all committee nodes and manager nodes in the domain. And after receiving the new upper-level group signature S 'and the pre-block, the manager node backs up the new upper-level group signature S' and the pre-block.
3) And after receiving the pre-block, the committee node verifies the transaction and the housekeeping signature S' in the pre-block, and if the committee node agrees to generate the pre-block, the committee node sends the associable ring signature P and the timestamp of the committee node back to the housekeeping node on duty as a voting message.
4) Before the block generation time is over, if signatures and timestamps of the co-domain committee nodes of which the number is greater than the preset value are collected by the attendant manager, the attendant manager forms a ring with the committee nodes to which the signatures belong to generate a new upper-level ring signature P ', adds the new signature P ' to the pre-block header to generate a formal block header, and releases the formal block header together with the block and the signature S ' to the universe. If the current time is less than the preset value or exceeds the cut-off time, the blocks are not generated in the current round of consensus. In this process, the signature and timestamp of the committee received by the attendant may have different magnitudes, which may be greater than 50% of the committee nodes, 60% of the committee nodes, 70% of the committee nodes, 80% of the committee nodes, 85% of the committee nodes, 90% of the committee nodes, and the like, depending on the application environment.
5) When the committee node receives the formal block, the signatures P 'and S' in the block are verified, and the transactions contained in the valid block are deleted from the transaction pool. If the committee node is not in the top-level domain at this time, the extraction block is a transaction, and a new upper-level group signature S 'is generated according to the appended housekeeping signature S', and the transaction is submitted as a common node of the upper-level domain. The other superordinate nodes continue to verify the signatures P' and S ". If the committee node is in the top domain at this time, after the committee nodes with the quantity larger than the set value confirm the reception, the block enters a legal state and has final confirmation. In receiving the committee acknowledgements, the number of acknowledgements may be half the number of committee nodes or 60% committee nodes or 70% committee nodes or 80% committee nodes or 85% committee nodes or 90% committee nodes, etc. The above values can be arbitrarily selected as confirmation points according to application scenarios and application environments.
Another object of the present invention is to provide a privacy protection and identity management system for a multimode identification network, which comprises
The multimode identification network generation module is used for registering network identifications by using a block chain technology to form a multimode identification network and carry out domain division to construct a hierarchical block chain system;
the hierarchical signature module is used for signing all nodes together to form a tree-shaped signature structure through a hierarchical cluster/ring signature mechanism according to different identities of all nodes in the multimode identification network;
and the verification module is used for the network to verify only the signature of the upper node of the tree-shaped signature structure so as to realize the verification of the lower node signature tree taking the signature as a root.
Each superior node in the verification module manages a group of subordinate nodes as leaf nodes, and each superior node signature is generated by combining subordinate node signatures and contains all information of the subordinate node signatures.
The hierarchical signature module is divided into two types of signature trees of voting ring signature and common group signature according to the belongingness and the action of each node signature.
The hierarchical group/ring signature mechanism in the hierarchical signature module comprises
The monitoring node signature generating unit is used for generating a transaction by any common node in the bottom layer domain and attaching a signature S, and the housekeeper node monitors the transaction in the domain and puts the effective transaction into a transaction pool;
the system comprises a pre-block generating unit, a pre-block generating unit and a pre-block processing unit, wherein the pre-block generating unit is used for regularly taking a transaction from an on-duty manager node and packaging the transaction into a pre-block, forming a group with a common node to which the transaction belongs to generate a new upper-level group signature S ', and sending the pre-block I and the new upper-level group signature S' to all committee nodes and all manager nodes in;
the first judging unit is used for verifying the affair and the housekeeping signature S' of the committee node after receiving the pre-block and judging whether to agree to generate a corresponding formal block, if the formal block agrees to be generated, the associable ring signature P and the timestamp of the committee node are used as voting messages and sent back to the housekeeping node on duty, and the second judging unit is executed, and if the officer node disagrees, the administrative node is directly discarded;
the second judgment unit is used for judging whether the number of the signatures and the timestamps collected by the commission committee nodes in the same domain is greater than a preset value or not by the attendant before the block generation time is up, if so, the attendant nodes and the commission nodes to which the signatures belong form a ring and generate a new superior ring signature P ', the superior ring signature P ' is added to the pre-block head to generate a formal block head, the block body, the timestamps and the signatures S ' are issued to the universe together, and the signature verification unit is executed, and if the number of the signatures and the timestamps is less than the preset value or exceeds the cut-off time, the attendant does not generate the block in the turn;
and the signature verification unit is used for verifying the signatures P 'and S' in the block after the committee node receives the formal block and deleting the transactions contained in the valid block from the transaction pool.
The listening node signature generating unit also comprises
And the real-affair correct judging unit is used for receiving the affair in the domain with any common node in the bottom-layer domain and verifying whether the affair content and the signature are correct or not, if so, forwarding the affair to other nodes in the domain, and if not, directly discarding the affair.
The signature verification unit further comprises
A third judging unit, configured to judge whether a committee node of the receiving block is in a top-level domain, if not, extract the block as a transaction, generate a new upper-level group signature S ″ according to a subsequent housekeeping signature S ', use the new upper-level group signature S ″ as a common node of a previous-level domain to submit the transaction, and continue to verify signatures P' and S ″ by other upper-level nodes, and if the receiving committee node is in the top-level domain, execute a fourth judging unit;
the fourth judging unit is used for judging whether the number of committee nodes receiving the formal block is larger than a set value or not, if so, the block enters a legal state and has final confirmation, and if not, the block is invalid.
The preset value is more than or equal to 50%; the set value is 50% or more.
And the privacy protection of the membership is realized by adopting a group/ring signature technology. The manager node and the common node establish a group and generate superior group signatures of a plurality of transactions; and simultaneously establishing a ring with the committee nodes to generate a plurality of upper-level ring signatures of the voting messages. After receiving the signature message, the common node can only determine the content of the message and cannot know the processing flow of the message, so that the public transparency characteristics of the authority control and the block chain are considered.
The committee node in the lower domain is also a common node in the upper domain, and is responsible for raising requests to the upper domain for transactions in the lower domain. The identity tracking can be realized by adding a hierarchical signature design in the cross-domain nodes, so that the member and block transactions are better managed.
The group owner can manage the members in a group and identify the specific source of the message, thereby ensuring that the members in the group can not maliciously send the message and can not accept corresponding punishment. In the multimode identification network, the group establishment and maintenance process between a housekeeper and a common node has important significance for the normal operation of the network, and the disturbance of an illegal node to the network is prevented.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (14)

1. A privacy protection and identity management method for a multimode identification network is characterized by comprising the following steps:
s1, registering the network identification by using a block chain technology to form a multi-mode identification network and carrying out domain division to construct a hierarchical block chain system;
s2, according to the identity difference of each node, all the node signatures are combined into a tree-shaped signature structure through a hierarchical cluster/ring signature mechanism in the multimode identification network;
s3, the network verifies only the upper node signature of the tree signature structure, thereby realizing lower node signature tree verification using the signature as a root.
2. The method for multimodal identification network privacy protection and identity management as claimed in claim 1, wherein each superior node in step S3 manages a set of subordinate nodes as leaf nodes, and each superior node signature is generated by combination of subordinate node signatures and contains all information of subordinate node signatures.
3. The method for multimodal identity network privacy protection and identity management as claimed in claim 2, wherein the step S2 is differentiated into two types of signature trees of voting ring signature and common group signature according to the belonged and the action of each node signature.
4. The method for multimodal identity network privacy protection and identity management as claimed in claim 3, wherein the hierarchical group/ring signature mechanism in step S2 comprises the following steps:
s21, generating a transaction by any common node in the bottom layer domain and attaching a signature S, and enabling the housekeeper node to monitor the transaction in the domain and put the effective transaction into a transaction pool;
s22, the on-duty manager node regularly takes the affairs and encapsulates the affairs into a pre-block, forms a group with the ordinary node to which the affairs belong to generate a new superior group signature S ', and sends the pre-block I and the new superior group signature S' to all the committee nodes and the manager node in the domain;
s23, after receiving the pre-block, the committee node verifies the affair and the housekeeping signature S' and judges whether to agree to generate a corresponding formal block, if so, the committee node sends the associable ring signature P and the timestamp of the committee node as voting messages back to the housekeeping node and executes the next step, and if not, the committee node is directly discarded;
s24, before the block generation time is up, the attendant judges whether the number of the signatures and the timestamps collected from the board nodes in the same domain is greater than a preset value, if so, the attendant nodes and the board nodes to which the signatures belong form a ring and generate a new superior ring signature P ', the superior ring signature P ' is added to the pre-block head to generate a formal block head, the formal block head is issued to the universe together with the block, the timestamps and the signatures S ', and the next step is executed, and if the number of the signatures and the timestamps is less than the preset value or exceeds the up-time, the attendant does not generate the block;
s25, the committee node verifies the signatures P 'and S' in the block after receiving the formal block and deletes the transaction contained in the valid block from the transaction pool.
5. The method for multimodal identity network privacy protection and identity management according to claim 4, wherein the step S21 further comprises the steps of:
s211, any common node in the bottom layer domain also receives the transaction in the domain and verifies whether the content and the signature of the transaction are correct, if so, the transaction is forwarded to other nodes in the domain, and if not, the transaction is directly discarded.
6. The method for multimodal identification network privacy protection and identity management as claimed in claim 5 wherein the step S25 further comprises the steps of:
s251, judging whether the committee node of the receiving block is in the top-level domain, if not, extracting the block as a transaction, generating a new upper-level group signature S 'according to the appended housekeeping signature S', submitting the transaction as a common node of the upper-level domain, continuously verifying the signatures P 'and S' by other upper-level nodes, and if the receiving committee node is in the top-level domain, executing the next step;
s252, judging whether the number of committee nodes receiving the formal block is greater than a set value, if so, entering the legal state of the block to have final confirmation, and if not, invalidating the block.
7. The method for multi-mode identity network privacy protection and identity management according to any of claims 4-7, wherein the preset value is greater than or equal to 50%; the set value is 50% or more.
8. A privacy protection and identity management system for a multimode identification network, the privacy protection and identity management system for a multimode identification network comprising
The multimode identification network generation module is used for registering network identifications by using a block chain technology to form a multimode identification network and carry out domain division to construct a hierarchical block chain system;
the hierarchical signature module is used for signing all nodes together to form a tree-shaped signature structure through a hierarchical cluster/ring signature mechanism according to different identities of all nodes in the multimode identification network;
and the verification module is used for the network to verify only the signature of the upper node of the tree-shaped signature structure so as to realize the verification of the lower node signature tree taking the signature as a root.
9. The system according to claim 8, wherein each upper node in the verification module manages a set of lower nodes as leaf nodes, and each upper node signature is generated by combining the lower node signatures and contains all information of the lower node signatures.
10. The system for multimodal identity network privacy protection and identity management as claimed in claim 9, wherein the hierarchical signature module differentiates each node signature into two types of signature trees, namely voting ring signature and common group signature according to the belongingness and role of the node signature.
11. The system for multimodal identification network privacy protection and identity management as claimed in claim 10 wherein the hierarchical group/ring signature mechanism in the hierarchical signature module comprises
The monitoring node signature generating unit is used for generating a transaction by any common node in the bottom layer domain and attaching a signature S, and the housekeeper node monitors the transaction in the domain and puts the effective transaction into a transaction pool;
the system comprises a pre-block generating unit, a pre-block generating unit and a pre-block processing unit, wherein the pre-block generating unit is used for regularly taking a transaction from an on-duty manager node and packaging the transaction into a pre-block, forming a group with a common node to which the transaction belongs to generate a new upper-level group signature S ', and sending the pre-block I and the new upper-level group signature S' to all committee nodes and all manager nodes in;
the first judging unit is used for verifying the affair and the housekeeping signature S' of the committee node after receiving the pre-block and judging whether to agree to generate a corresponding formal block, if the formal block agrees to be generated, the associable ring signature P and the timestamp of the committee node are used as voting messages and sent back to the housekeeping node on duty, and the second judging unit is executed, and if the officer node disagrees, the administrative node is directly discarded;
the second judgment unit is used for judging whether the number of the signatures and the timestamps collected by the commission committee nodes in the same domain is greater than a preset value or not by the attendant before the block generation time is up, if so, the attendant nodes and the commission nodes to which the signatures belong form a ring and generate a new superior ring signature P ', the superior ring signature P ' is added to the pre-block head to generate a formal block head, the block body, the timestamps and the signatures S ' are issued to the universe together, and the signature verification unit is executed, and if the number of the signatures and the timestamps is less than the preset value or exceeds the cut-off time, the attendant does not generate the block in the turn;
and the signature verification unit is used for verifying the signatures P 'and S' in the block after the committee node receives the formal block and deleting the transactions contained in the valid block from the transaction pool.
12. The system for multimodal identity network privacy protection and identity management as claimed in claim 11, wherein the listening node signature generating unit further comprises
And the real-affair correct judging unit is used for receiving the affair in the domain with any common node in the bottom-layer domain and verifying whether the affair content and the signature are correct or not, if so, forwarding the affair to other nodes in the domain, and if not, directly discarding the affair.
13. The system for multimodal identification network privacy protection and identity management as claimed in claim 12 wherein the signature verification unit further comprises
A third judging unit, configured to judge whether a committee node of the receiving block is in a top-level domain, if not, extract the block as a transaction, generate a new upper-level group signature S ″ according to a subsequent housekeeping signature S ', use the new upper-level group signature S ″ as a common node of a previous-level domain to submit the transaction, and continue to verify signatures P' and S ″ by other upper-level nodes, and if the receiving committee node is in the top-level domain, execute a fourth judging unit;
the fourth judging unit is used for judging whether the number of committee nodes receiving the formal block is larger than a set value or not, if so, the block enters a legal state and has final confirmation, and if not, the block is invalid.
14. The system for multimodal identification network privacy protection and identity management according to any of claims 11-13, wherein the preset value is greater than or equal to 50%; the set value is 50% or more.
CN201880036695.5A 2018-12-07 2018-12-07 Method and system for multi-mode identification network privacy protection and identity management Pending CN110945833A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/119724 WO2020113546A1 (en) 2018-12-07 2018-12-07 Privacy protection and identity management method and system for multi-mode identifier network

Publications (1)

Publication Number Publication Date
CN110945833A true CN110945833A (en) 2020-03-31

Family

ID=69905303

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880036695.5A Pending CN110945833A (en) 2018-12-07 2018-12-07 Method and system for multi-mode identification network privacy protection and identity management

Country Status (2)

Country Link
CN (1) CN110945833A (en)
WO (1) WO2020113546A1 (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101325481B (en) * 2008-07-29 2010-12-29 成都卫士通信息产业股份有限公司 Grouping authorization control method
CN102055769B (en) * 2010-12-29 2013-04-03 北京理工大学 Multi- trust domain authentication system under lattice-based grid environment
CN108259438B (en) * 2016-12-29 2021-02-05 中移(苏州)软件技术有限公司 Authentication method and device based on block chain technology
US20180341775A1 (en) * 2017-05-23 2018-11-29 International Business Machines Corporation Digital license authentication with secure privacy logging

Also Published As

Publication number Publication date
WO2020113546A1 (en) 2020-06-11

Similar Documents

Publication Publication Date Title
Cui et al. A hybrid blockchain-based identity authentication scheme for multi-WSN
US10284379B1 (en) Public key infrastructure based on the public certificates ledger
Li et al. Efficient and privacy-preserving carpooling using blockchain-assisted vehicular fog computing
Wang et al. Blockchain-based anonymous authentication with key management for smart grid edge computing infrastructure
Zhong et al. Conditional privacy-preserving authentication using registration list in vehicular ad hoc networks
Zhang et al. Blockchain-assisted public-key encryption with keyword search against keyword guessing attacks for cloud storage
Liu et al. A survey on secure data analytics in edge computing
Lu et al. A blockchain-based privacy-preserving authentication scheme for vanets
Wei et al. A privacy-preserving fog computing framework for vehicular crowdsensing networks
Weber et al. Towards trustworthy identity and access management for the future internet
Shrestha et al. Integration of IoT with blockchain and homomorphic encryption: Challenging issues and opportunities
US20190356496A1 (en) Public Key Infrastructure & Method of Distribution
Muftic Bix certificates: Cryptographic tokens for anonymous transactions based on certificates public ledger
He et al. An accountable, privacy-preserving, and efficient authentication framework for wireless access networks
Zou et al. Reportcoin: A novel blockchain-based incentive anonymous reporting system
Xu et al. A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles
Yang et al. Blockchain-based decentralized public key management for named data networking
Ernest et al. Privacy enhancement scheme (PES) in a blockchain-edge computing environment
Cho et al. Big data cloud deduplication based on verifiable hash convergent group signcryption
Mohanta et al. A novel approach to solve security and privacy issues for iot applications using blockchain
Quercia et al. Tata: Towards anonymous trusted authentication
CN110945833A (en) Method and system for multi-mode identification network privacy protection and identity management
Ma et al. A flow-level architecture for balancing accountability and privacy
Tian et al. Research on distributed blockchain-based privacy-preserving and data security framework in IoT
Hegde et al. Hash Based Integrity Verification for Vehicular Cloud Environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination