Font Size: a A A

Research On Key Technologies Of Blockchain Privacy Protection

Posted on:2022-12-27Degree:MasterType:Thesis
Country:ChinaCandidate:B J HanFull Text:PDF
GTID:2518306776460754Subject:Computer Software and Application of Computer
Abstract/Summary:PDF Full Text Request
Blockchain technology has been very popular in recent years,General Secretary Xi Jinping pointed out in the meeting that blockchain technology should be regarded as the core breakthrough of independent innovation,and he emphasized the need to speed up blockchain technology and promote the innovation and development of this industry.It has gradually attracted everyone's attention and attention.In recent years,the blockchain has transitioned from the original Bitcoin to applications in various industries,such as securities trading,online payment,logistics,medical care and many other scenarios.However,with the development and promotion of these applications,the privacy protection issues faced by blockchain technology have gradually emerged.This technology uses a consensus mechanism and special networking technology.Therefore,privacy protection technology mainly involves Is transaction information privacy and identity information privacy protection.Privacy leakage is an issue that needs attention in blockchain technology.Digital signature algorithms and hash algorithms in cryptography are widely used in blockchains to verify the correctness of blocks and transactions.In actual blockchain application.,it is not only necessary to verify the real identity information of each node,but also the public key address of the node.In the past,the PKI system was associated with a trusted center with too much weight,which did not meet the "decentralization" and "trustless" characteristics of blockchain.Therefore,the certificateless encryption and signature system can be widely used in the blockchain field.This article mainly studies the blockchain privacy protection technology based on the knowledge of cryptography.Mainly from the following aspects:(1)Based on the research on the decentralization scheme in the SM2 blockchain,the working mechanism of the blockchain is different from the traditional centralized structure.It does not rely on a specific central node to store and process data,so it can prevent the problem of information leakage caused by malicious centers.Starting from the problems of user identity privacy and transaction privacy leakage in the blockchain transaction process,a new secure and verifiable identity concealment ring signature scheme is constructed.SM2 Decentralized Privacy Solution.(2)Based on the research on the identity anonymity scheme in the SM9 blockchain,this section takes the public chain transaction as a specific application scenario,and designs a model that can prove to have privacy protection.The results of the security analysis show that the scheme is unforgeable,and guarantees the anonymity and forward security between transaction nodes,which can provide effective security and privacy protection support for the public chain.(3)Based on the research on the tamper-proof scheme in the zero-knowledge proof blockchain,blockchain technology is a chronological data structure formed by the combination of data blocks in a chain.Its underlying privacy protection technology is cryptography technology,which guarantees The unforgeable and untamperable block transactions can safely store simple,sequential data that can be verified in the system.For immutability,based on zero-knowledge proof technology,a tamper-proof privacy protection scheme is designed.
Keywords/Search Tags:blockchain technology, privacy protection, decentralization, identity anonymity, tamper-proof modification, ring signature, zero-knowledge proof
PDF Full Text Request
Related items