CN110945833B - Method and system for multi-mode identification network privacy protection and identity management - Google Patents

Method and system for multi-mode identification network privacy protection and identity management Download PDF

Info

Publication number
CN110945833B
CN110945833B CN201880036695.5A CN201880036695A CN110945833B CN 110945833 B CN110945833 B CN 110945833B CN 201880036695 A CN201880036695 A CN 201880036695A CN 110945833 B CN110945833 B CN 110945833B
Authority
CN
China
Prior art keywords
signature
node
block
nodes
signatures
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201880036695.5A
Other languages
Chinese (zh)
Other versions
CN110945833A (en
Inventor
李挥
王菡
邬江兴
朱伏生
伊鹏
安辉耀
张昕淳
王子贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Peking University Shenzhen Graduate School
China National Digital Switching System Engineering and Technological R&D Center
Original Assignee
Peking University Shenzhen Graduate School
China National Digital Switching System Engineering and Technological R&D Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Peking University Shenzhen Graduate School, China National Digital Switching System Engineering and Technological R&D Center filed Critical Peking University Shenzhen Graduate School
Publication of CN110945833A publication Critical patent/CN110945833A/en
Application granted granted Critical
Publication of CN110945833B publication Critical patent/CN110945833B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3255Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using group based signatures, e.g. ring or threshold signatures

Abstract

The invention is suitable for the technical field of block chains, and provides a method for multi-mode identification network privacy protection and identity management, which comprises the following steps: s1, registering the network identification by using a block chain technology to form a multi-mode identification network and carrying out domain division to construct a hierarchical block chain system; s2, according to the identity difference of each node, all the node signatures are combined into a tree-shaped signature structure through a hierarchical cluster/ring signature mechanism in the multimode identification network; s3, the network verifies only the upper node signature of the tree signature structure, thereby realizing lower node signature tree verification using the signature as a root. And the privacy protection of the membership is realized by adopting a group/ring signature technology. The manager node and the common node establish a group and generate superior group signatures of a plurality of transactions; and simultaneously establishing a ring with the committee nodes to generate a plurality of upper-level ring signatures of the voting messages.

Description

Method and system for multi-mode identification network privacy protection and identity management
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a method for multi-mode identification network privacy protection and identity management.
Background
The multimode identification network is a novel open network architecture provided aiming at the essential defects that the existing internet control capability is too concentrated and international multilateral co-management is lacked, and the like, and particularly refers to a network environment in which networks with different system structures jointly deploy multipath identification and cooperative routing addressing. For example, if a content network is deployed in a conventional network, a multi-mode network environment consisting of two network architectures and addressed by a content identifier and an address identifier is formed if data can be shuttled between the two networks. By utilizing the advantages of different networks to work cooperatively, the multimode identification network can improve the basic transmission capability of the current internet, enhance the utilization rate of network resources and enrich the functions of network layers. More importantly, the multi-mode identification network reduces the dependency and limitation of the existing internet system on address identification, and provides possibility for multilateral co-management of the internet.
In 10.2008, a cryptology researcher named "zhongben wisdom" published a paper about bitcoin, describing a peer-to-peer electronic money system without the intervention of a third-party trusted authority, and first proposed the concept of a block chain. The block chain is a block chain type data structure which is not forged, cannot be tampered and can be traced through transparent and credible rules under a peer-to-peer network environment, and a transaction processing mode is realized and managed. The blockchain technology is a tamper-proof shared distributed account book essentially, all member nodes in the network maintain the account book together, and all transaction information can be completely recorded by using a chain type data structure based on the cryptography technology rather than external trust. Thus, the block chain possesses three significant features: decentralized, non-tamperable, and distrusted. In some block chain application scenarios, identity control needs to be introduced, which forms a federation chain. A federation chain refers to a blockchain in which a plurality of organizations participate in accounting together, each organization runs one or more nodes, and members of the federation mutually believe and achieve consensus through multiple centers. The creation of blocks on the chain is jointly decided by the pre-selected accounting nodes, and only common member nodes are allowed to read, write, record and send transactions. Unlike public chains, federation chains are considered "partially decentralized", in the sense that they are owned only by members within the federation, and the data on the chain is only accessible to enterprises and members within the federation. The partial decentralization characteristic of the alliance chain just conforms to the multilateral co-management idea of the multi-mode identification network. And the federation chain is more advantageous in terms of high availability, high performance, programmability, and privacy protection than the public chain.
In a blockchain system, each data transaction requires a signature to ensure the integrity and authenticity of the information. A simple digital signature mechanism is that if a server A sends a message to a server B, in order to prove to B that the message can only be sent by A, A encrypts the message M into a signature S by using a private key, B decrypts S by using a public key A after receiving the message M and the signature S and compares the decrypted message with the decrypted message M, and if the message M and the signature S are the same, the signature can be proved to be effective. Confidentiality is often required in practical systems, and a hashing algorithm is typically incorporated in the digital signature mechanism. The sender a uses a Hash function to generate a message digest from the message, and then encrypts this digest with its own private key into a signature, which is sent with the message to the receiver B. The receiver first computes a message digest from the received message using the same Hash function as a and then decrypts the appended signature using a's public key. Comparing the two digests, if they are the same, it can be confirmed that the signature belongs to a.
Therefore, identity management and privacy protection mechanisms based on digital signatures are key core technologies for ensuring the safety and reliability of federation chain transactions, and are necessary conditions for further virtuous circle development of federation chains. However, the existing block chain-oriented privacy protection and identity management method has a low matching degree with an extensible hierarchical structure of an identification network, and has the problems of large scale and high verification complexity, and cannot support a large-scale network with high flux.
In 2013, in 8 months, Christina Garman et al proposed a decentralized anonymous credential system to solve the Internet identity privacy authentication problem. In conventional solutions, a certificate authority, a DNS facility or a large organization like a google-logged provider plays a very important role in the internet authentication process. However, these centralized large organizations are very likely to be targets of attack by attackers, and once anomalies occur in these organizations, the privacy of users is easily revealed. Garman et al propose to establish a blockchain organization composed of multiple nodes to provide a generation and verification service of identification for a user, and to achieve anonymity by means of a certain encryption algorithm, thereby better protecting user privacy. Anonymous credentials allow a user to prove that he owns a credential issued by an organization without revealing any other personal privacy. Under standard security definitions, even if the verifier and credential issuer collude, they cannot determine who issued the credential and when it will be used.
Since Garman uses a relatively expensive "double-layer discrete logarithm proof" in the scheme construction, the generated certificate has a large scale and a slow verification speed, and cannot meet the requirements of practical applications. In addition, the scheme can only realize the protection of identity privacy, but cannot effectively manage the identity, and cannot meet the actual requirement of a multimode identification network.
Menlo money is an open source cryptocurrency created in 4 months 2014, using ring signature technology to protect the anonymity of users and privacy protection of transactions, i.e. RingCT protocol.
Ring signatures are a class of digital signature schemes that allow a member within a ring to sign a message on behalf of all members within the ring without revealing its identity. Common ring signatures provide unconditional anonymity, and the verifier cannot judge whether the two signatures are from the same member. However, in some cases this complete anonymity does not apply and associable ring signature techniques are produced. A feature of an associable ring signature is that, given any two associable ring signatures, the verifier knows whether they were generated by the same signer, but has no knowledge of the identity of the signer unless the verifier is on the same ring as the signer.
In the menuing system, each user may have several different accounts, each of which consists of a one-time address and coin, associated with an account key that authorizes payout. In each transaction, the user may spend his or her account with the corresponding key.
The RingCT protocol consists essentially of two phases:
1) consumer generated ring secret transaction:
the consumer first determines a plurality of input and output accounts so that their cumulative balances are equal, and then builds a ring for each sub-transaction's inputs and signs.
2) The receiver verifies the ring secret transaction:
once the miners receive the transactions in the blockchain network, the miners verify the validity of the transactions by using the messages and the signatures together, and pack the valid transactions into a new block.
Although the protection mechanism adopted by the menuo currency has a good solution to privacy protection, the effective management of the identity of the participating node and the effective tracking of the behavior cannot be realized, which is unacceptable in a multimode identification scene with the requirement of managing the behavior of the participating party.
Disclosure of Invention
The invention aims to provide a method for protecting the privacy and managing the identity of a multimode identification network, and aims to solve the problems that all participants are in the same domain or rely on the service provided by a third-party trusted authority, the traceability is unavailable, and the method cannot be applied to the hierarchical alliance link structure of the multimode identification network.
The invention is realized as the following, and is used for the multimode identification network privacy protection and identity management method, the method comprises the following steps:
s1, registering the network identification by using a block chain technology to form a multi-mode identification network and carrying out domain division to construct a hierarchical block chain system;
s2, according to the identity difference of each node, all the node signatures are combined into a tree-shaped signature structure through a hierarchical cluster/ring signature mechanism in the multimode identification network;
s3, the network verifies only the upper node signature of the tree signature structure, thereby realizing lower node signature tree verification using the signature as a root.
The further technical scheme of the invention is as follows: in step S3, each upper node manages a group of lower nodes as leaf nodes, and each upper node signs a signature of a lower node, which is generated by combining signatures of lower nodes and includes all information of lower nodes.
The further technical scheme of the invention is as follows: in step S2, the node signatures are differentiated into two types of signature trees, namely voting ring signatures and common group signatures according to the belongings and roles of the node signatures.
The further technical scheme of the invention is as follows: the hierarchical group/ring signature mechanism in step S2 includes the following steps:
s21, generating affairs by any common node in the bottom layer domain, attaching a signature S, monitoring the affairs in the domain by the manager node, and putting the effective affairs into the affair pool;
s22, the on-duty manager node regularly takes the affairs and encapsulates the affairs into a pre-block, forms a group with the ordinary node to which the affairs belong to generate a new superior group signature S ', and sends the pre-block I and the new superior group signature S' to all the committee nodes and the manager node in the domain;
s23, after receiving the pre-block, the committee node verifies the affair and the housekeeping signature S' and judges whether to agree to generate a corresponding formal block, if so, the committee node sends the associable ring signature P and the timestamp of the committee node as voting messages back to the housekeeping node and executes the next step, and if not, the committee node is directly discarded;
s24, before the block generation time is up, judging whether the number of signatures and timestamps collected by the attendant node is greater than a preset value or not, if so, forming a ring by the attendant node and the committee node to which the signatures belong and generating a new superior ring signature P ', adding the superior ring signature P ' to the pre-block head to generate a formal block head, issuing the formal block head to the universe together with the block, the timestamp and the signature S ' and executing the next step, and if the number of signatures and the timestamp are less than the preset value or exceed the generation time, not generating the block by the attendant node in the turn;
s25, the committee node verifies the signatures P 'and S' in the block after receiving the formal block and deletes the transaction contained in the valid block from the transaction pool.
The further technical scheme of the invention is as follows: the step S21 further includes the following steps:
s211, any common node in the bottom layer domain also receives the transaction in the domain and verifies whether the content and the signature of the transaction are correct, if so, the transaction is forwarded to other nodes in the domain, and if not, the transaction is directly discarded.
The further technical scheme of the invention is as follows: the step S25 further includes the steps of:
s251, judging whether the committee node of the receiving block is in the top-level domain, if not, extracting the block as a transaction, generating a new upper-level group signature S 'according to the appended housekeeping signature S', submitting the transaction as a common node of the upper-level domain, continuously verifying the signatures P 'and S' by other upper-level nodes, and if the receiving committee node is in the top-level domain, executing the next step;
s252, judging whether the number of committee nodes of the received formal block is larger than a set value, if so, enabling the block to enter a legal state and have final confirmation, and if not, disabling the block.
The further technical scheme of the invention is as follows: the preset value is more than or equal to 50%; the set value is 50% or more.
Another object of the present invention is to provide a privacy protection and identity management system for a multimode identification network, which comprises
The multimode identification network generation module is used for registering network identifications by using a block chain technology to form a multimode identification network and dividing domains to construct a hierarchical block chain system;
the hierarchical signature module is used for signing all nodes together to form a tree-shaped signature structure through a hierarchical cluster/ring signature mechanism according to different identities of all nodes in the multimode identification network;
and the verification module is used for the network to verify only the signature of the upper node of the tree-shaped signature structure so as to realize the verification of the lower node signature tree taking the signature as a root.
The further technical scheme of the invention is as follows: each superior node in the verification module manages a group of subordinate nodes as leaf nodes, and each superior node signature is generated by combining subordinate node signatures and contains all information of the subordinate node signatures.
The further technical scheme of the invention is as follows: the hierarchical signature module is divided into two types of signature trees of voting ring signature and common group signature according to the belongingness and the action of each node signature.
The further technical scheme of the invention is as follows: the hierarchical group/ring signature mechanism in the hierarchical signature module comprises
The monitoring node signature generating unit is used for generating transactions by any common node in the bottom layer domain and attaching a signature S, and the housekeeper node monitors the transactions in the domain and puts effective transactions into the transaction pool;
the system comprises a pre-block generating unit, a pre-block generating unit and a pre-block processing unit, wherein the pre-block generating unit is used for regularly taking a transaction from an on-duty manager node and packaging the transaction into a pre-block, forming a group with a common node to which the transaction belongs to generate a new upper-level group signature S ', and sending the pre-block I and the new upper-level group signature S' to all committee nodes and all manager nodes in a domain;
the first judging unit is used for verifying the affair and the housekeeping signature S' of the committee node after receiving the pre-block and judging whether to agree to generate a corresponding formal block, if the formal block agrees to be generated, the associable ring signature P and the timestamp of the committee node are used as voting messages and sent back to the housekeeping node on duty, and the second judging unit is executed, and if the officer node disagrees, the administrative node is directly discarded;
the second judgment unit is used for judging whether the number of the signatures and the timestamps collected by the commission committee nodes in the same domain is greater than a preset value or not by the attendant before the block generation time is up, if so, the attendant nodes and the commission nodes to which the signatures belong form a ring and generate a new superior ring signature P ', the superior ring signature P ' is added to the pre-block head to generate a formal block head, the block body, the timestamps and the signatures S ' are issued to the universe together, and the signature verification unit is executed, and if the number of the signatures and the timestamps is less than the preset value or exceeds the cut-off time, the attendant does not generate the block in the turn;
and the signature verification unit is used for verifying the signatures P 'and S' in the block after the committee node receives the formal block and deleting the transactions contained in the valid block from the transaction pool.
The further technical scheme of the invention is as follows: the listening node signature generating unit also comprises
And the real-affair correct judging unit is used for receiving the affair in the domain with any common node in the bottom-layer domain and verifying whether the affair content and the signature are correct or not, if so, forwarding the affair to other nodes in the domain, and if not, directly discarding the affair.
The invention further adopts the technical scheme that: the signature verification unit further comprises
A third judging unit, configured to judge whether a committee node of the receiving block is in a top-level domain, if not, extract the block as a transaction, generate a new upper-level group signature S ″ according to a subsequent housekeeping signature S ', use the new upper-level group signature S ″ as a common node of a previous-level domain to submit the transaction, and continue to verify signatures P' and S ″ by other upper-level nodes, and if the receiving committee node is in the top-level domain, execute a fourth judging unit;
the fourth judging unit is used for judging whether the number of committee nodes receiving the formal block is larger than a set value or not, if so, the block enters a legal state and has final confirmation, and if not, the block is invalid.
The invention further adopts the technical scheme that: the preset value is more than or equal to 50%; the set value is 50% or more.
The beneficial effects of the invention are: and the privacy protection of the membership is realized by adopting a group/ring signature technology. The manager node and the common node establish a group and generate superior group signatures of a plurality of transactions; and simultaneously establishing a ring with the committee nodes to generate a plurality of upper-level ring signatures of the voting messages. After receiving the signature message, the common node can only determine the content of the message and cannot know the processing flow of the message, so that the public transparency characteristics of the authority control and the block chain are considered.
The committee node in the subordinate domain is also a common node in the superior domain, and is responsible for raising requests to the superior domain for transactions in the subordinate domain. The identity tracking can be realized by adding a hierarchical signature design in the cross-domain nodes, so that the member and block transactions are better managed.
The group owner can manage the members in a group and identify the specific source of the message, thereby ensuring that the members in the group can not maliciously send the message and can not accept corresponding punishment. In the multimode identification network, the group establishment and maintenance process between the housekeeper and the common nodes has important significance for the normal operation of the network, and the disturbance of an illegal node to the network is prevented.
Drawings
Fig. 1 is a schematic diagram of a hierarchical signature tree structure identity model according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of a hierarchical signature mechanism under a novel federation chain architecture provided by an embodiment of the present invention.
Detailed Description
As shown in fig. 1-2, the method for multimode identity network privacy protection and identity management provided by the present invention is detailed as follows:
and step S1, registering the network identifier by using a block chain technology to form a multi-mode identifier network, dividing domains to construct a hierarchical block chain system, and managing each network domain by using a PoV voting consensus algorithm.
Step S2, according to the different identities of each node, all nodes are signed by a hierarchical cluster/ring signature mechanism to form a tree-shaped signature structure in the multimode identification network; according to the belongingness and the action of each node signature, the node signature is divided into two types of signature trees of voting ring signature and common group signature.
In step S3, the network verifies only the upper node signature of the tree signature structure, thereby realizing lower node signature tree verification using the signature as a root. Each upper node manages a group of lower nodes as leaf nodes, each upper node signature is generated by combining the signatures of the lower nodes and contains all information of the signatures of the lower nodes, and the verification of the upper node signature also contains the verification of a tree taking the signature as a root.
Similar to the common group/ring signature requirements, any third party cannot track the identity of the person to whom the signature belongs, just by taking the signature and verifying the public key. In addition, the security of the hierarchical group signature scheme requires that the group administrator only track the signer identities of the leaf nodes of the group administrator, but cannot open signatures generated by members under other groups. By establishing a group relationship among nodes with different levels and different identities, a group administrator of a superior node can quickly locate a problem group and identify a corresponding malicious user.
A privacy protection and identity management method for a multimode identification network designs a set of hierarchical signature scheme according to the structural characteristics of a multimode identification alliance chain network. By utilizing the anonymity and the supervision advantage of the group/ring signature, the invention realizes the sufficient hiding of the node identities between different levels and the effective management of the identities in the same level, and better meets the requirements of a multimode identification network on safety and management.
In the invention, the nodes in the domain are divided into common nodes, housekeeper nodes and committee nodes according to the identity from low to high, and the same node can be used for holding a plurality of identities, as shown in figure 1. Wherein, the common nodes only enjoy the right of knowing and the right of proposing, and can not participate in the consensus process. The housekeeping node has the right to produce the block. Committee nodes own the validation blocks and the right to recommend, validate, evaluate, and participate in the superior consensus. The committee nodes of the lower level domain also assume the identity of the upper level domain.
Because the nodes of the multimode network have different division of labor, the invention considers using a hierarchical group/ring signature mechanism. The node signatures in the network together form a tree structure, with each upper node managing a set of lower nodes as its leaf nodes. The upper signature is generated by combining the lower signatures, and includes all information of the lower signature, and the verification of the upper signature also includes the verification of the tree with the signature as a root. Similar to the common group/ring signature requirements, any third party cannot track the identity of the signer that generated the signature, with just the signature and the verification public key. In addition, the security of the hierarchical group signature scheme requires that the group administrator only track the signer identities of the leaf nodes of the group administrator, but cannot open signatures generated by members under other groups. By establishing a group relationship among nodes with different levels and different identities, a group administrator of a superior node can quickly locate a problem group and identify a corresponding malicious user.
Aiming at the characteristics of a hierarchical signature scheme, the invention uses the following block structure:
Figure BDA0002299446110000111
Figure BDA0002299446110000121
Figure BDA0002299446110000131
the specific signature flow is shown in fig. 2.
1) Any common node in the bottom layer domain generates a transaction and attaches a signature S, meanwhile, the transaction in the domain is received, the correctness of the content of the transaction and the signature is verified, and if the correctness is ensured, the transaction is forwarded to other nodes in the domain. The housekeeping node listens to the intra-domain transactions and places valid transactions in the transaction pool.
2) The on-duty manager node takes out some affairs from the affair pool periodically, packages the affairs into a pre-block, forms a group with the common node to which the affairs belong, generates a new superior group signature S ', and sends the new superior group signature S' and the pre-block to all committee nodes and manager nodes in the domain. And after receiving the new upper-level group signature S 'and the pre-block, the manager node backs up the new upper-level group signature S' and the pre-block.
3) And after receiving the pre-block, the committee node verifies the transaction and the housekeeping signature S' in the pre-block, and if the committee node agrees to generate the pre-block, the committee node sends the associable ring signature P and the timestamp of the committee node back to the housekeeping node on duty as a voting message.
4) Before the block generation time is over, if signatures and timestamps of the co-domain committee nodes of which the number is greater than the preset value are collected by the attendant manager, the attendant manager forms a ring with the committee nodes to which the signatures belong to generate a new upper-level ring signature P ', adds the new signature P ' to the pre-block header to generate a formal block header, and releases the formal block header together with the block and the signature S ' to the universe. If the current time is less than the preset value or exceeds the cut-off time, the blocks are not generated in the current round of consensus. In this process, the signature and timestamp of the committee received by the attendant may have different magnitudes, which may be greater than 50% of the committee nodes, 60% of the committee nodes, 70% of the committee nodes, 80% of the committee nodes, 85% of the committee nodes, 90% of the committee nodes, and the like, depending on the application environment.
5) When the committee node receives the formal block, the signatures P 'and S' in the block are verified, and the transactions contained in the valid block are deleted from the transaction pool. If the committee node is not in the top-level domain at this time, the extraction block is a transaction, and a new upper-level group signature S 'is generated according to the appended housekeeping signature S', and the transaction is submitted as a common node of the upper-level domain. The other superordinate nodes continue to verify the signatures P' and S ". If the committee node is in the top domain at this time, after the committee nodes with the quantity larger than the set value confirm the reception, the block enters a legal state and has final confirmation. In receiving the committee acknowledgements, the number of acknowledgements may be half the number of committee nodes or 60% committee nodes or 70% committee nodes or 80% committee nodes or 85% committee nodes or 90% committee nodes, etc. The above-mentioned value can be arbitrarily selected as the confirmation point according to the application scene and the application environment.
Another object of the present invention is to provide a privacy protection and identity management system for a multimode identification network, which comprises
The multimode identification network generation module is used for registering network identifications by using a block chain technology to form a multimode identification network and carry out domain division to construct a hierarchical block chain system;
the hierarchical signature module is used for signing all nodes together to form a tree-shaped signature structure through a hierarchical cluster/ring signature mechanism according to different identities of all nodes in the multimode identification network;
and the verification module is used for the network to verify only the signature of the upper node of the tree-shaped signature structure so as to realize the verification of the lower node signature tree taking the signature as a root.
Each superior node in the verification module manages a group of subordinate nodes as leaf nodes, and each superior node signature is generated by combining subordinate node signatures and contains all information of the subordinate node signatures.
The hierarchical signature module is divided into two types of signature trees of voting ring signature and common group signature according to the belongingness and the action of each node signature.
The hierarchical group/ring signature mechanism in the hierarchical signature module comprises
The monitoring node signature generating unit is used for generating a transaction by any common node in the bottom layer domain and attaching a signature S, and the housekeeper node monitors the transaction in the domain and puts the effective transaction into a transaction pool;
the system comprises a pre-block generating unit, a pre-block generating unit and a pre-block processing unit, wherein the pre-block generating unit is used for regularly taking a transaction from an on-duty manager node and packaging the transaction into a pre-block, forming a group with a common node to which the transaction belongs to generate a new upper-level group signature S ', and sending the pre-block I and the new upper-level group signature S' to all committee nodes and all manager nodes in a domain;
the first judging unit is used for verifying the affairs and the housekeeping signature S' of the committee node after receiving the pre-block and judging whether to agree to generate a corresponding formal block, if the formal block is agreed to be generated, the associable ring signature P and the timestamp of the committee node are sent back to the housekeeping node on duty as voting messages and the second judging unit is executed, and if the official block is not agreed, the ring signature P and the timestamp are directly discarded;
the second judgment unit is used for judging whether the number of the signatures and the timestamps collected by the commission committee nodes in the same domain is greater than a preset value or not by the attendant before the block generation time is up, if so, the attendant nodes and the commission nodes to which the signatures belong form a ring and generate a new superior ring signature P ', the superior ring signature P ' is added to the pre-block head to generate a formal block head, the block body, the timestamps and the signatures S ' are issued to the universe together, and the signature verification unit is executed, and if the number of the signatures and the timestamps is less than the preset value or exceeds the cut-off time, the attendant does not generate the block in the turn;
and the signature verification unit is used for verifying the signatures P 'and S' in the block after the committee node receives the formal block and deleting the transactions contained in the valid block from the transaction pool.
The listening node signature generating unit also comprises
And the real-affair correct judging unit is used for receiving the affair in the domain with any common node in the bottom-layer domain and verifying whether the affair content and the signature are correct or not, if so, forwarding the affair to other nodes in the domain, and if not, directly discarding the affair.
The signature verification unit further comprises
A third judging unit, configured to judge whether a committee node of the receiving block is in a top-level domain, if not, extract the block as a transaction, generate a new upper-level group signature S ″ according to a subsequent housekeeping signature S ', use the new upper-level group signature S ″ as a common node of a previous-level domain to submit the transaction, and continue to verify signatures P' and S ″ by other upper-level nodes, and if the receiving committee node is in the top-level domain, execute a fourth judging unit;
the fourth judging unit is used for judging whether the number of committee nodes receiving the formal block is larger than a set value or not, if so, the block enters a legal state and has final confirmation, and if not, the block is invalid.
The preset value is more than or equal to 50%; the set value is 50% or more.
And the privacy protection of the membership is realized by adopting a group/ring signature technology. The manager node and the common node establish a group and generate superior group signatures of a plurality of transactions; and simultaneously establishing a ring with the committee nodes to generate a plurality of upper-level ring signatures of the voting messages. After receiving the signature message, the common node can only determine the content of the message and cannot know the processing flow of the message, so that the public transparency characteristics of the authority control and the block chain are considered.
The committee node in the subordinate domain is also a common node in the superior domain, and is responsible for raising requests to the superior domain for transactions in the subordinate domain. The identity tracking can be realized by adding a hierarchical signature design in the cross-domain nodes, so that the member and block transactions are better managed.
The group owner can manage the members in a group and identify the specific source of the message, thereby ensuring that the members in the group can not maliciously send the message and can not accept corresponding punishment. In the multimode identification network, the group establishment and maintenance process between a housekeeper and a common node has important significance for the normal operation of the network, and the disturbance of an illegal node to the network is prevented.
The above description is intended to be illustrative of the preferred embodiment of the present invention and should not be taken as limiting the invention, but rather, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the invention.

Claims (14)

1. A privacy protection and identity management method for a multimode identification network is characterized by comprising the following steps:
s1, registering the network identification by using a block chain technology to form a multi-mode identification network and carrying out domain division to construct a hierarchical block chain system;
s2, according to the identity difference of each node, all the node signatures are combined into a tree-shaped signature structure through a hierarchical cluster/ring signature mechanism in the multimode identification network;
s3, the network verifies only the upper node signature of the tree signature structure, thereby realizing lower node signature tree verification using the signature as a root.
2. The privacy protection and identity management method for multimode identification network according to claim 1, wherein each upper node manages a group of lower nodes as leaf nodes in step S3, and each upper node signature is generated by combining the lower node signatures and contains all information of the lower node signatures.
3. The privacy protection and identity management method for the multimode identification network according to claim 2, wherein the step S2 is to differentiate the node signatures into two types of signature trees, namely voting ring signatures and common group signatures according to the belongings and roles of the node signatures.
4. The privacy protection and identity management method for multimodal identity networks according to claim 3, wherein the hierarchical group/ring signature mechanism in step S2 includes the following steps:
s21, generating affairs by any common node in the bottom layer domain, attaching a signature S, monitoring the affairs in the domain by the manager node, and putting the effective affairs into the affair pool;
s22, the on-duty manager node regularly takes the affairs and encapsulates the affairs into a pre-block, forms a group with the ordinary node to which the affairs belong to generate a new superior group signature S ', and sends the pre-block I and the new superior group signature S' to all the committee nodes and the manager node in the domain;
s23, after receiving the pre-block, the committee node verifies the affair and the housekeeping signature S' and judges whether to agree to generate a corresponding formal block, if so, the committee node sends the associable ring signature P and the timestamp of the committee node as voting messages back to the housekeeping node and executes the next step, and if not, the committee node is directly discarded;
s24, before the block generation time is up, the attendant judges whether the number of the signatures and the timestamps collected from the board nodes in the same domain is greater than a preset value, if so, the attendant nodes and the board nodes to which the signatures belong form a ring and generate a new superior ring signature P ', the superior ring signature P ' is added to the pre-block head to generate a formal block head, the formal block head is issued to the universe together with the block, the timestamps and the signatures S ', and the next step is executed, and if the number of the signatures and the timestamps is less than the preset value or exceeds the up-time, the attendant does not generate the block;
s25, the committee node verifies the signatures P 'and S' in the block after receiving the formal block and deletes the transaction contained in the valid block from the transaction pool.
5. The privacy protection and identity management method for multimodal identity networks according to claim 4, wherein the step S21 further comprises the steps of:
s211, any common node in the bottom layer domain also receives the domain affair and verifies whether the affair content and the signature are correct, if so, the affair is forwarded to other nodes in the domain, and if not, the affair is directly discarded.
6. The privacy protection and identity management method for multimodal identity networks according to claim 5, wherein the step S25 further comprises the steps of:
s251, judging whether the committee node of the receiving block is in the top-level domain, if not, extracting the block as a transaction, generating a new upper-level group signature S 'according to the appended housekeeping signature S', submitting the transaction as a common node of the upper-level domain, continuously verifying the signatures P 'and S' by other upper-level nodes, and if the receiving committee node is in the top-level domain, executing the next step;
s252, judging whether the number of committee nodes receiving the formal block is greater than a set value, if so, entering the legal state of the block to have final confirmation, and if not, invalidating the block.
7. The privacy protection and identity management method for a multimode identification network according to claim 6, wherein the preset value is greater than or equal to 50%; the set value is 50% or more.
8. A privacy protection and identity management system for a multimode identification network, the privacy protection and identity management system for a multimode identification network comprising
The multimode identification network generation module is used for registering network identifications by using a block chain technology to form a multimode identification network and carry out domain division to construct a hierarchical block chain system;
the hierarchical signature module is used for signing all nodes together to form a tree-shaped signature structure through a hierarchical cluster/ring signature mechanism according to different identities of all nodes in the multimode identification network;
and the verification module is used for the network to verify only the signature of the upper node of the tree-shaped signature structure so as to realize the verification of the lower node signature tree taking the signature as a root.
9. The privacy protection and identity management system for a multimodal identity network as claimed in claim 8, wherein each superior node in the verification module manages a set of subordinate nodes as leaf nodes, and each superior node signature is generated by a combination of subordinate node signatures and contains all information of subordinate node signatures.
10. The privacy protection and identity management system for the multimodal identity network as claimed in claim 9, wherein the hierarchical signature module differentiates each node signature into two types of signature trees of voting ring signature and common group signature according to the belongingness and role of the node signature.
11. The privacy protection and identity management system for multimodal identity networks according to claim 10, wherein the hierarchical signature module is caused to include during execution of a hierarchical group/ring signature mechanism
The monitoring node signature generating unit is used for generating a transaction by any common node in the bottom layer domain and attaching a signature S, and the housekeeper node monitors the transaction in the domain and puts the effective transaction into a transaction pool;
the system comprises a pre-block generating unit, a pre-block generating unit and a pre-block processing unit, wherein the pre-block generating unit is used for regularly taking a transaction from an on-duty manager node and packaging the transaction into a pre-block, forming a group with a common node to which the transaction belongs to generate a new upper-level group signature S ', and sending the pre-block I and the new upper-level group signature S' to all committee nodes and all manager nodes in a domain;
the first judging unit is used for verifying the affair and the housekeeping signature S' of the committee node after receiving the pre-block and judging whether to agree to generate a corresponding formal block, if the formal block agrees to be generated, the associable ring signature P and the timestamp of the committee node are used as voting messages and sent back to the housekeeping node on duty, and the second judging unit is executed, and if the officer node disagrees, the administrative node is directly discarded;
the second judgment unit is used for judging whether the number of the signatures and the timestamps collected by the commission committee nodes in the same domain is greater than a preset value or not by the attendant before the block generation time is up, if so, the attendant nodes and the commission nodes to which the signatures belong form a ring and generate a new superior ring signature P ', the superior ring signature P ' is added to the pre-block head to generate a formal block head, the block body, the timestamps and the signatures S ' are issued to the universe together, and the signature verification unit is executed, and if the number of the signatures and the timestamps is less than the preset value or exceeds the cut-off time, the attendant does not generate the block in the turn;
and the signature verification unit is used for verifying the signatures P 'and S' in the block after the committee node receives the formal block and deleting the transactions contained in the valid block from the transaction pool.
12. The privacy protection and identity management system for a multimodal identity network as claimed in claim 11, wherein the listening node signature generating unit further comprises
And the real correct judging unit is used for receiving the intra-domain transaction with any common node in the bottom-layer domain and verifying whether the content and the signature of the transaction are correct or not, if so, the transaction is forwarded to other nodes in the domain, and if not, the transaction is directly discarded.
13. The privacy protection and identity management system for a multimodal identification network as claimed in claim 12 wherein the signature verification unit further comprises
A third judging unit, configured to judge whether a committee node of the receiving block is in a top-level domain, if not, extract the block as a transaction, generate a new upper-level group signature S ″ according to a subsequent housekeeping signature S ', use the new upper-level group signature S ″ as a common node of a previous-level domain to submit the transaction, and continue to verify signatures P' and S ″ by other upper-level nodes, and if the receiving committee node is in the top-level domain, execute a fourth judging unit;
the fourth judging unit is used for judging whether the number of committee nodes receiving the formal block is larger than a set value or not, if so, the block enters a legal state and has final confirmation, and if not, the block is invalid.
14. The privacy protection and identity management system for a multimodal identification network as claimed in claim 13, wherein the preset value is greater than or equal to 50%; the set value is 50% or more.
CN201880036695.5A 2018-12-07 2018-12-07 Method and system for multi-mode identification network privacy protection and identity management Active CN110945833B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/119724 WO2020113546A1 (en) 2018-12-07 2018-12-07 Privacy protection and identity management method and system for multi-mode identifier network

Publications (2)

Publication Number Publication Date
CN110945833A CN110945833A (en) 2020-03-31
CN110945833B true CN110945833B (en) 2022-08-16

Family

ID=69905303

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880036695.5A Active CN110945833B (en) 2018-12-07 2018-12-07 Method and system for multi-mode identification network privacy protection and identity management

Country Status (2)

Country Link
CN (1) CN110945833B (en)
WO (1) WO2020113546A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113269546B (en) * 2021-07-19 2021-10-12 域世安(北京)科技有限公司 User identity card system and method based on block chain
CN115277000B (en) * 2022-06-17 2023-08-25 湖南天河国云科技有限公司 Information transmission method based on door coin
CN117692151A (en) * 2024-02-02 2024-03-12 杭州天谷信息科技有限公司 Service network-based certificate revocation method and communication method

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101325481B (en) * 2008-07-29 2010-12-29 成都卫士通信息产业股份有限公司 Grouping authorization control method
CN102055769B (en) * 2010-12-29 2013-04-03 北京理工大学 Multi- trust domain authentication system under lattice-based grid environment
CN105162602B (en) * 2015-09-01 2018-05-11 中国互联网络信息中心 A kind of trustable network Identity Management and verification system and method
CN108259438B (en) * 2016-12-29 2021-02-05 中移(苏州)软件技术有限公司 Authentication method and device based on block chain technology
US20180341775A1 (en) * 2017-05-23 2018-11-29 International Business Machines Corporation Digital license authentication with secure privacy logging
CN107911216B (en) * 2017-10-26 2020-07-14 矩阵元技术(深圳)有限公司 Block chain transaction privacy protection method and system
CN108011945A (en) * 2017-11-30 2018-05-08 公安部第三研究所 A kind of cloud evidence obtaining process record method and system based on block chain

Also Published As

Publication number Publication date
WO2020113546A1 (en) 2020-06-11
CN110945833A (en) 2020-03-31

Similar Documents

Publication Publication Date Title
Xu et al. A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles
Lu et al. A blockchain-based privacy-preserving authentication scheme for VANETs
Li et al. Efficient and privacy-preserving carpooling using blockchain-assisted vehicular fog computing
Liu et al. Blockchain empowered cooperative authentication with data traceability in vehicular edge computing
Wei et al. A privacy-preserving fog computing framework for vehicular crowdsensing networks
Gupta et al. Quantum-defended blockchain-assisted data authentication protocol for internet of vehicles
CN111064734B (en) Block chain system user identity anonymity and traceable method, corresponding storage medium and electronic device
CN110945833B (en) Method and system for multi-mode identification network privacy protection and identity management
CN114139203B (en) Block chain-based heterogeneous identity alliance risk assessment system and method and terminal
CN112351019B (en) Identity authentication system and method
CN114710275B (en) Cross-domain authentication and key negotiation method based on blockchain in Internet of things environment
Tian et al. Research on distributed blockchain‐based privacy‐preserving and data security framework in IoT
Zhang et al. Privacy-protected electronic voting system based on blockchin and trusted execution environment
Zhang et al. DBCPA: Dual blockchain-assisted conditional privacy-preserving authentication framework and protocol for vehicular ad hoc networks
Zhang et al. Secure ABE scheme for access management in blockchain-based IoT
Yang et al. Blockchain-based decentralized public key management for named data networking
Itoo et al. A robust ECC-based authentication framework for energy internet (EI)-based vehicle to grid communication system
Liu et al. Secure and Scalable Cross-Domain Data Sharing in Zero-Trust Cloud-Edge-End Environment Based on Sharding Blockchain
CN113536347A (en) Bidding method and system based on digital signature
Liu et al. A blockchain-based cross-domain authentication management system for IoT devices
Mohanta et al. Blockchain-based consensus algorithm for solving security issues in distributed internet of things
Weber et al. Towards trustworthy identity and access management for the future internet
Gong et al. A threshold group signature scheme suitable for the Internet of Things
Quercia et al. Tata: Towards anonymous trusted authentication
Yang et al. Blockchain-based conditional privacy-preserving authentication protocol with implicit certificates for vehicular edge computing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant