CN111460497A - Editable block chain system - Google Patents

Editable block chain system Download PDF

Info

Publication number
CN111460497A
CN111460497A CN202010236720.3A CN202010236720A CN111460497A CN 111460497 A CN111460497 A CN 111460497A CN 202010236720 A CN202010236720 A CN 202010236720A CN 111460497 A CN111460497 A CN 111460497A
Authority
CN
China
Prior art keywords
chain
trapdoor
common node
fragments
target content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010236720.3A
Other languages
Chinese (zh)
Other versions
CN111460497B (en
Inventor
任炬
陈琳韦娅
徐旸
张尧学
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Original Assignee
Central South University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University filed Critical Central South University
Priority to CN202010236720.3A priority Critical patent/CN111460497B/en
Publication of CN111460497A publication Critical patent/CN111460497A/en
Application granted granted Critical
Publication of CN111460497B publication Critical patent/CN111460497B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an editable block chain system, which comprises a first chain and a second chain; the first chain and the second chain are connected by a common node; the first chain is provided with an editing control intelligent contract; the common node is provided with trapdoor fragments, and the trapdoor fragments are used for synthesizing trapdoors; the common node is used for initiating an editing behavior, synthesizing the trapdoors according to trapdoor fragmentation, verifying the trapdoors through the editing control intelligent contract, calculating a hash collision value according to original content, an original random number and target content after the verification is passed, and issuing the target content and the hash collision value to a second chain; and the node in the second chain verifies the target content and the hash collision value, and if the verification is passed, the target content is replaced by the original content. The method has the advantages of meeting the requirements on the safety of data storage and the requirements on data modification under specific conditions, and the like.

Description

Editable block chain system
Technical Field
The present invention relates to the field of blockchain technology, and in particular, to an editable blockchain system.
Background
The block chain is used as a decentralized, tamper-resistant and traceable distributed account book system and is applied to the field of social aspects. The core concept of the block chain is that a centralized accounting mode is changed into a distributed account book which is backed up by people together, and the anti-tamper property and the safety of the account book are enhanced through supervision of people. However, the non-tamper-ability of the block chain provides a data security guarantee for the distributed ledger, and also provides a severe test for the management of the content on the block chain. Firstly, the massive growth of data in the block chain imposes huge requirements on storage, and secondly, the phenomena of illegal information such as pornography, violence and the like appearing on the bitcoin chain, money laundering and black market trading using the blank of law have to arouse thinking of people. The occurrence of the DAO attack event in the Etherhouse makes people see the threat of being not modified. The european union 'general data protection regulation' (GDPR) was implemented in 2018, where "deletion right (oblivious right)" stipulates that a controller, whose information subject has the right to request information under specific conditions, deletes information, and the information controller is obligated to do so. Once the uplink is successful, the data on the blockchain is stored in all nodes in a decentralized mode and is stored in the system permanently. This is contrary to the idea of "delete right" and "correct right" in personal information protection. And when the information on the chain is harmful, even the chain touches the legal red line, the non-tamper property of the block chain should not become a refuge umbrella and a arrow-blocking board of a criminal. Thus, legislation states that an efficient editable blockchain protocol must be designed in a controlled manner to address this problem. The information in the blockchain application project must be controllably editable under a supervisory authority to prevent sensitive and harmful information from being uploaded into the blockchain. And under proper conditions, individuals have the right to delete their personal private data, preventing these information from adversely affecting the development of society and individuals.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: aiming at the technical problems in the prior art, the invention provides an editable block chain system which can meet the requirements on the safety of data storage and the requirement on data modification under specific conditions.
In order to solve the technical problems, the technical scheme provided by the invention is as follows: an editable blockchain system comprises a first chain, a second chain;
the first chain and the second chain are connected by a common node;
the first chain is provided with an editing control intelligent contract;
the common node is provided with trapdoor fragments, and the trapdoor fragments are used for synthesizing trapdoors;
the common node is used for initiating an editing behavior, synthesizing the trapdoors according to trapdoor fragmentation, verifying the trapdoors through the editing control intelligent contract, calculating a hash collision value according to original content, an original random number and target content after the verification is passed, and issuing the target content and the hash collision value to a second chain;
and the node in the second chain verifies the target content and the hash collision value, and if the verification is passed, the target content is replaced by the original content.
Further, the number of the common nodes is multiple, and each common node has a different trapdoor fragment.
Further, the step of synthesizing the trapdoor by the common nodes according to the trapdoor fragments comprises the following steps: and the common node broadcasts the trapdoor fragments owned by the common node, acquires the trapdoor fragments broadcasted by other common nodes, and synthesizes the trapdoors according to all the trapdoor fragments.
Further, the verifying the trapdoor by the edit control smart contract comprises: and the editing control intelligent contract acquires the trap door homomorphic value calculated by the common node, verifies whether the homomorphic value of the trap door is consistent with homomorphic-chameleon functions of the trap door fragments or not, and if so, verifies that the trap door of the common node passes the verification.
Further, the verifying the trapdoor by the editing control intelligent contract in a voting mode specifically comprises the following steps: and if the proportion of the number of the common nodes of which the trapdoors pass the verification in all the common nodes reaches a preset proportion, the verification is passed.
Further, the common node is further configured to calculate a hash value of the target content, and issue the hash value to the first chain;
the first chain is further configured to store a hash value of the target content.
Further, the common node is a dynamic update node and has a dynamically updated trapdoor fragment.
Further, the first chain is a non-editable chain.
Compared with the prior art, the invention has the advantages that:
1. the editable block chain of the invention is characterized in that two chains are arranged, wherein the first chain is used for storing and managing the intelligent contract for editing control, the second chain is used for storing data content, and a common node existing on both the first chain and the second chain is set to connect the two chains, the common node manages the trapdoor fragment, the trapdoors can be synthesized through the trapdoor fragments, after the trapdoors are verified through the management editing control intelligent contract on the first chain, the target content of the modification behavior can be further verified, the original content can be modified through verification, and the method has the advantages of block chain decentralization, distributed accounting, openness, difficulty in data tampering and the like, and has the advantages that under the condition of meeting specific conditions, after passing a specific verification process, the block chain provides a data modification authority, so that the block chain can meet the regulation of the law on the deletion authority and meet the requirement of a user on data modification under a specific condition.
2. The editable block chain system adopts the dynamically updated common node and the dynamically updated trap door fragment, so that the safety of the editable block chain system can be better ensured, and the editing authority of the editable block chain system is effectively prevented from being illegally utilized.
3. In the editable block chain system, the first chain stores, manages and edits the control intelligent contract and is a non-editable chain, so that the safety of the editing control intelligent contract can be effectively ensured and cannot be tampered, and the safety of the editable block chain system can be better improved.
4. In the editable block chain system, the data content submitted to the block chain by the user is stored in the second chain, and the first chain only stores the hash value of the data content, so that the requirement of the block chain on the storage space can be reduced, and the efficiency of inquiring and managing the data content stored in the block chain can be ensured.
Drawings
Fig. 1 is a schematic diagram of an editable block chain structure according to an embodiment of the invention.
Fig. 2 is a schematic flow chart of verifying a trapdoor by a single common node according to an embodiment of the present invention.
Detailed Description
The invention is further described below with reference to the drawings and specific preferred embodiments of the description, without thereby limiting the scope of protection of the invention.
The editable block chain system of the embodiment comprises a first chain and a second chain, wherein the first chain and the second chain are connected through a common node, the first chain is provided with an editing control intelligent contract, the common node is provided with a trapdoor fragment, the trapdoor fragment is used for synthesizing a trapdoor, the common node is used for initiating an editing action, the trapdoor is synthesized according to the trapdoor fragment, the trapdoor is verified through the editing control intelligent contract, after the verification is passed, a hash collision value is calculated according to original content, original random number and target content, and the target content and the hash collision value are issued to the second chain, the target content and the hash collision value are verified through the node in the second chain, the target content is replaced by the hash collision value, the common node is multiple, each common node is provided with a different trapdoor fragment, as shown in fig. 1, the first chain is composed of L nodes, including P11, P12, … … and P1L, the second chain is composed of K nodes, including P21, P22, P … …, the trapdoor fragment, the first chain, the second chain, the first node and the second chain are composed of nodes, namely, the number of the common nodes is constant, and the second chain is stated that the common node in the second chain is a fixed node, namely, the second chain is a common node in the third chain, namely a third chain, namely a third chain, a.
In this embodiment, the common node is used to manage trapdoor shards xi. Trapdoor slices are used to synthesize trapdoors. In order to ensure the security of the blockchain system, it is preferable in this embodiment that each common node has one and only one managementTrapdoor slicing xi. Of course, the same common node may also manage more than one trapdoor fragment, but this may reduce the security performance of the blockchain system. In this embodiment, chameleon trapdoors are adopted, and x is partitioned through the trapdoorsiThe trap door x is synthesized according to the formula (1):
x=x1·x2…xn(1)
in this embodiment, a trapdoor public key h can also be generated through the trapdoor fragmentation, and the manner of generating the trapdoor public key h is as shown in formula (2):
Figure BDA0002431244680000031
in the formula (2), g is a cardinal number of a chameleon hash function preset in a blockchain, q is a preset blockchain parameter, q and another preset blockchain parameter p in the blockchain are two prime numbers which are relatively prime, p and q preferably satisfy p ═ kq +1, k is an arbitrary integer, and n is the number of trapdoor fragments.
In this embodiment, slice x is sliced for ensuring the trapdooriWithout exposure, it is preferable to sequentially generate the trapdoor public key fragments hiThe strategy for generating the trapdoor public key h through the public key fragmentation specifically comprises the following steps: the first common node divides the pieces x according to the trapdoors owned by the first common node1Generating a first trapdoor public key fragment h1And issuing a first trapdoor public key fragment h by editing and controlling an intelligent contract1Generating a first trapdoor public key fragment h1The specific mode of (3) is preferably as shown in the following formula:
Figure BDA0002431244680000041
the second common node obtains a first trapdoor public key fragment h issued by the first common node1Then combining the trap door fragment x owned by the user2Generating a second trapdoor public key fragment h2Generating a second trapdoor public key fragment h2The specific mode of (3) is preferably as shown in the following formula:
Figure BDA0002431244680000042
and so on, the ith oneThe same node is fragmented according to the (i-1) th trapdoor public keyi-1Generating the ith trapdoor public key fragment hiUntil a completed trapdoor public key is generated, as in
Figure BDA0002431244680000043
Is shown, x ═ x1·x2…xnThe definition of each parameter is the same as above. According to the difficult understanding of the discrete logarithm problem, after any node obtains the trapdoor public key h and the parameters g, p and q of the block chain, the trapdoor fragment x cannot be obtained through calculationiAnd trapdoor x, whereby the confidentiality of the blockchain key can be guaranteed.
In this embodiment, when a user in the editable blockchain system needs to store a data content m (which is an original content when the data content needs to be modified) into a blockchain, the user submits the data content m and a generated random number r to the blockchain system, and a node in the blockchain system performs hash value calculation to obtain a hash value H, F (g, H, m, r), g, of a blockm·hrmodp, where F (g, h, m, r) is a hash function, and the parameters are defined as above. And after the hash value passes the verification, storing the data content into the block. At this time, under the condition that any node does not know the trapdoor x, it is impossible to determine the target content m 'and the random number r' corresponding to the target content m ', so that the hash value of the target content m' is equal to the hash value of the original content, that is, the formula F (g, h, m ', r') is not satisfied, that is, F (g, h, m, r) is satisfied, that is, the data content cannot be modified.
In this embodiment, as shown in fig. 2, when a certain data content m in a block chain needs to be modified into a target content m', an editing action is initiated, and a common node broadcasts a trapdoor fragment x owned by the common node through a networkiMeanwhile, the trapdoor fragment x 'broadcasted by other common nodes is also acquired through the network'jCommon node as receiver cannot determine the trapdoor fragment x 'it receives'jIs true, therefore, the trapdoor fragment received by the common node is marked as x'jThat is, for a common node i, its own trapdoor sliceIs xiAnd the trapdoor fragment received by other common nodes through the network and broadcasted by the common node i is recorded as x'i. When the common node receives and acquires the trapdoor fragments of other common nodes through the network, the trapdoor x ' can be synthesized through a formula shown in formula (1), and the trapdoor fragments x ' provided by other common nodes cannot be determined at the moment 'jIf the common node is correct, the trapdoor synthesized by the common node is marked as x', and meanwhile, the common node can also calculate to obtain a trapdoor homomorphism value
Figure BDA0002431244680000044
The trap door homomorphic value is the sum of the trap door fragments.
In this embodiment, the verifying the trapdoor by the editing control intelligent contract comprises: and the editing control intelligent contract acquires a trap door homomorphic value calculated by the common node, verifies whether the homomorphic value of the trap door is consistent with homomorphic-chameleon functions of all the trap door fragments or not, and if the homomorphic value of the trap door is consistent with the homomorphic-chameleon functions of all the trap door fragments, the trap door of the common node passes the verification. Because the common node cannot determine the trapdoor fragment x 'broadcast by other common nodes acquired through the network'jWhether the trap door x 'is correct or not cannot be determined, and the synthesized trap door x' needs to be verified, wherein the verification process comprises the following steps: common node homomorphic value of trap door
Figure BDA0002431244680000051
Submitting to an editing control intelligent contract, and after the editing control intelligent contract receives the trapdoor homomorphic value, verifying through a formula shown in a formula (3):
Figure BDA0002431244680000052
in formula (3), f (·) is homomorphic-chameleon function, and f (x) gxmodq, the remaining parameters are as defined above. And when the formula (3) is satisfied, judging that the trapdoor synthesized by the common nodes submitting the trapdoor homomorphic value is verified.
In this embodiment, in order to further ensure the safety of the editable area chain in editing, it is preferableThe verification of the trapdoor by adopting a voting mode specifically comprises the following steps: and if the occupation ratio of the number of the common nodes of which the trapdoors pass the verification in all the common nodes reaches a preset ratio, the verification is passed. Setting a total of n common nodes, wherein each common node calculates the trap door homomorphic value
Figure BDA0002431244680000053
Submitting to an editing control intelligent contract for verification, wherein the number of the verified common nodes is s when
Figure BDA0002431244680000054
When the value of the data reaches the preset proportion, the modification behavior of the editable block chain system is judged to pass the trapdoor verification, the modification of the data content is legal, otherwise, the data content is not modified legally because the modification behavior of the editable block chain system is judged not to pass the verification, and the modification operation is not continued. In the present embodiment, the predetermined ratio is preferably 50% or more.
In this embodiment, after passing the verification of the trapdoor, the common node initiating the modification calculates a hash collision value r 'according to the original content m, the original random number r, and the target content m', and issues the target content m 'and the hash collision value r' to the second chain. The way of calculating the hash collision value r' is shown in equations (4) and (5):
H=gm·hr=gm′·hr′modp (4)
from equation (4), the hash collision value expression shown in equation (5) can be obtained:
r′=F′(m,m′,r)=(m-m′+xr)x-1modq (5)
in the formulae (4) and (5), the parameters are as defined above.
In this embodiment, after the common node calculates the hash collision value r ' of the target content m ', the target content m ' and the hash collision value r ' are published on the second chain, and after the node on the second chain receives the target content m ' and the hash collision value r ', the target content m ' and the hash collision value r ' can be verified, and after the verification is passed, the original content m is modified into the target content m ', and the modification of the original content m is completed.
To save storage space of the blockchain, the present embodiment publishes only the target content m 'and the hash collision value r' on the second chain. Further, in order to optimize the query and management efficiency of the block chain, the common node also calculates a hash value of the target content m' and issues the hash value to the first chain; the nodes in the first chain store hash values of the target content m'.
In this embodiment, in order to improve the security of the editable blockchain system, the common node is a dynamic update node having a dynamically updated trapdoor partition. That is, the number of common nodes is not fixed, and can be increased or decreased according to the operation requirement of the block chain system, and when the common nodes are changed, the common nodes regenerate the trapdoor fragments xi. Further preferably, after the data content is modified once, the common node also regenerates the trapdoor fragment xi. When the trapdoor divides into pieces xiAfter regeneration, the trap door public key is fragmented hiAnd the trapdoor public key h will be updated accordingly.
It is further preferred in this embodiment that the first chain is a non-editable chain. Therefore, the editing control intelligent contract managed by the first chain can be guaranteed not to be tampered, and the safety and reliability of the system are guaranteed. It should be noted that the editing control intelligent contract in this embodiment is only naming the intelligent contract, and data exchange performed by the editing control intelligent contract can ensure data security and cannot be illegally tampered, and in actual engineering application, the editing control intelligent contract may be a set of intelligent contracts, and different intelligent contracts in the set may complete different specific functions, such as an identity verification intelligent contract for verifying an identity, a key management intelligent contract for managing a key, and the like, and the protection scope of the present invention is not limited by different naming of the intelligent contracts.
The foregoing is considered as illustrative of the preferred embodiments of the invention and is not to be construed as limiting the invention in any way. Although the present invention has been described with reference to the preferred embodiments, it is not intended to be limited thereto. Therefore, any simple modification, equivalent change and modification made to the above embodiments according to the technical spirit of the present invention should fall within the protection scope of the technical scheme of the present invention, unless the technical spirit of the present invention departs from the content of the technical scheme of the present invention.

Claims (8)

1. An editable blockchain system, comprising: comprises a first chain and a second chain;
the first chain and the second chain are connected by a common node;
the first chain is provided with an editing control intelligent contract;
the common node is provided with trapdoor fragments, and the trapdoor fragments are used for synthesizing trapdoors;
the common node is used for initiating an editing behavior, synthesizing the trapdoors according to trapdoor fragmentation, verifying the trapdoors through the editing control intelligent contract, calculating a hash collision value according to original content, an original random number and target content after the verification is passed, and issuing the target content and the hash collision value to a second chain;
and the node in the second chain verifies the target content and the hash collision value, and if the verification is passed, the target content is replaced by the original content.
2. The editable blockchain system of claim 1, wherein: the common node is multiple, and each common node is provided with a different trapdoor fragment.
3. The editable blockchain system of claim 2, wherein: the common node synthesizes the trapdoor according to the trapdoor fragments and comprises the following steps: and the common node broadcasts the trapdoor fragments owned by the common node, acquires the trapdoor fragments broadcasted by other common nodes, and synthesizes the trapdoors according to all the trapdoor fragments.
4. The editable blockchain system of claim 3, wherein: the verifying the trapdoor by the editing control intelligent contract comprises the following steps: and the editing control intelligent contract acquires the trap door homomorphic value calculated by the common node, verifies whether the homomorphic value of the trap door is consistent with homomorphic-chameleon functions of the trap door fragments or not, and if so, verifies that the trap door of the common node passes the verification.
5. The editable blockchain system of claim 4, wherein: the editing control intelligent contract verifies the trapdoor in a voting mode, and specifically comprises the following steps: and if the proportion of the number of the common nodes of which the trapdoors pass the verification in all the common nodes reaches a preset proportion, the verification is passed.
6. The editable blockchain system of claim 5, wherein: the common node is further used for calculating a hash value of the target content and issuing the hash value to the first chain;
the first chain is further configured to store a hash value of the target content.
7. The editable blockchain system of any one of claims 1 to 6, wherein: the common node is a dynamic update node and is provided with a dynamically updated trapdoor fragment.
8. The editable blockchain system of any one of claims 1 to 6, wherein: the first chain is a non-editable chain.
CN202010236720.3A 2020-03-30 2020-03-30 Editable block chain system Active CN111460497B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010236720.3A CN111460497B (en) 2020-03-30 2020-03-30 Editable block chain system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010236720.3A CN111460497B (en) 2020-03-30 2020-03-30 Editable block chain system

Publications (2)

Publication Number Publication Date
CN111460497A true CN111460497A (en) 2020-07-28
CN111460497B CN111460497B (en) 2023-04-07

Family

ID=71683389

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010236720.3A Active CN111460497B (en) 2020-03-30 2020-03-30 Editable block chain system

Country Status (1)

Country Link
CN (1) CN111460497B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112187455A (en) * 2020-09-24 2021-01-05 西南交通大学 Method for constructing distributed public key infrastructure based on editable block chain
CN112380584A (en) * 2021-01-13 2021-02-19 北京笔新互联网科技有限公司 Block chain data updating method and device, electronic equipment and storage medium
CN112437069A (en) * 2020-10-23 2021-03-02 湖南天河国云科技有限公司 Block chain editing method based on distributed key management
CN113393241A (en) * 2021-06-18 2021-09-14 中国工商银行股份有限公司 Editing method and device of block chain account book data
CN113438073A (en) * 2021-06-24 2021-09-24 福建师范大学 Block chain compiling and correcting method based on period and supporting appointed modification times
CN113536389A (en) * 2021-06-15 2021-10-22 复旦大学 Fine-grained controllable decentralized editable block chain construction method and system
CN113822680A (en) * 2021-08-31 2021-12-21 北京市农林科学院信息技术研究中心 Editable block chain tracing method and system
CN113973003A (en) * 2021-06-30 2022-01-25 江苏腾武信息技术有限公司 Verification method of cloud cluster scheduling storage information based on block chain
WO2022242337A1 (en) * 2021-05-18 2022-11-24 华为技术有限公司 Method and apparatus for blockchain editing

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583885A (en) * 2017-09-01 2019-04-05 埃森哲环球解决方案有限公司 Bout controls rewritable block chain
CN110061850A (en) * 2019-04-24 2019-07-26 电子科技大学 The collision calculation method and editable block chain building method of chameleon hash function
CN110457297A (en) * 2019-07-10 2019-11-15 北京航空航天大学 Editable block catenary system and method based on more authorization center encryption attributes

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583885A (en) * 2017-09-01 2019-04-05 埃森哲环球解决方案有限公司 Bout controls rewritable block chain
CN110061850A (en) * 2019-04-24 2019-07-26 电子科技大学 The collision calculation method and editable block chain building method of chameleon hash function
CN110457297A (en) * 2019-07-10 2019-11-15 北京航空航天大学 Editable block catenary system and method based on more authorization center encryption attributes

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ALEXANDER MARSALEK ETAL: "《A correctable public blockchain》" *
任艳丽;徐丹婷;张新鹏;谷大武;: "基于门限环签名的可删除区块链" *
李佩丽;徐海霞;马添军;穆永恒;: "可更改区块链技术研究" *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112187455A (en) * 2020-09-24 2021-01-05 西南交通大学 Method for constructing distributed public key infrastructure based on editable block chain
CN112187455B (en) * 2020-09-24 2023-04-18 西南交通大学 Method for constructing distributed public key infrastructure based on editable block chain
CN112437069A (en) * 2020-10-23 2021-03-02 湖南天河国云科技有限公司 Block chain editing method based on distributed key management
CN112380584A (en) * 2021-01-13 2021-02-19 北京笔新互联网科技有限公司 Block chain data updating method and device, electronic equipment and storage medium
CN112380584B (en) * 2021-01-13 2021-04-16 北京笔新互联网科技有限公司 Block chain data updating method and device, electronic equipment and storage medium
WO2022242337A1 (en) * 2021-05-18 2022-11-24 华为技术有限公司 Method and apparatus for blockchain editing
CN113536389A (en) * 2021-06-15 2021-10-22 复旦大学 Fine-grained controllable decentralized editable block chain construction method and system
CN113393241A (en) * 2021-06-18 2021-09-14 中国工商银行股份有限公司 Editing method and device of block chain account book data
CN113438073A (en) * 2021-06-24 2021-09-24 福建师范大学 Block chain compiling and correcting method based on period and supporting appointed modification times
CN113438073B (en) * 2021-06-24 2023-05-09 福建师范大学 Block chain compiling and correcting method based on period and supporting appointed modification times
CN113973003A (en) * 2021-06-30 2022-01-25 江苏腾武信息技术有限公司 Verification method of cloud cluster scheduling storage information based on block chain
CN113822680A (en) * 2021-08-31 2021-12-21 北京市农林科学院信息技术研究中心 Editable block chain tracing method and system

Also Published As

Publication number Publication date
CN111460497B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
CN111460497B (en) Editable block chain system
CN108830602B (en) Permission chain construction and management and control method based on chameleon hash function
Duong et al. Twinscoin: A cryptocurrency via proof-of-work and proof-of-stake
CN106878000B (en) Alliance chain consensus method and system
CN109327512B (en) Game data partition storage method based on block chain hash addressing and re-encryption
CN109583885A (en) Bout controls rewritable block chain
CN111639935A (en) Account book modification method applicable to editable block chain
CN111901350A (en) Block chain system, data processing method, computer device and storage medium
CN110554616B (en) Intelligent home data chaining method and system of Internet of things on block chain
CN109743182B (en) Intelligent contract approval method and system based on block chain
CN114915404A (en) Block chain data storage extension model construction method for Internet of things
CN111683058A (en) Data storage system based on block chain and storage method thereof
CN112801778B (en) Alliance type bad asset block chain system
CN113407977B (en) Cross-chain extension method and system based on aggregated signature
CN109428892A (en) Multistage rewritable block chain
CN112887078B (en) Method and device for editing blocks in block chain
CN112968883A (en) Block chain heterogeneous consensus method with high safety and terminal
Cai et al. Privacy-protected deletable blockchain
EP4290802A1 (en) Blockchain editing method and blockchain node
CN113626875A (en) Knowledge graph file storage method for block chain fragment enabling
CN115796261A (en) Block chain-based lightweight group consensus federated learning method
CN115604014A (en) Data integrity auditing method, equipment and storage medium
CN109120609B (en) Social information reporting method and device based on block chain
CN114528565A (en) Efficient sensitive data uplink algorithm based on block chain
CN112685750A (en) Data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant