基于零知识证明的区块链钱包身份认证方案
Blockchain wallet identity authentication scheme based on zero knowledge proof
刘新,胡翔瑜,李宝山
( 内蒙古科技大学 信息工程学院,内蒙古 包头 014010)
摘 要: 区块链用户在不进行比特币交易的情况下,无法向他人证明自己的比特币数量,针对这一问题,利用椭圆 曲线系统提出了基于零知识证明的区块链钱包身份认证方案,用户可以在不泄漏私钥任何信息和不公布公钥的前提下进行钱包地址的身份认证,从而完成比特币资产证明,该方案具有正确性和安全性,适用于拍卖、财富排名等 应用场景。
关键词: 区块链; 比特币钱包地址; 零知识证明; 身份认证; 椭圆曲线
DOI: 10.16559 /j.cnki.2095 - 2295.2022.03.012
基金项目: 国家自然科学基金资助项目( 92046001;61962009);内蒙古自治区自然科学基金资助项目( 2021MS06006);内蒙古自治区科技重大专项基金资助项目包头市昆都仑区科技计划基金资助项目( YF2020013);内蒙古纪检监察大数据实验室开放项目基金资助项目( IMDBD2020020);北京市教育委员会基本科研业务费项目资助项目( 2019ZD025)。
作者:刘新,胡翔瑜,李宝山
参考文献:
[1]Nakamoto S.Bitcoin: A peer-to-peer electronic cash system [EB/OL].http: / /bitcoin.org /bitcoin.pdf.2008( 4) :2.
[2] Liu Q,Liu Z,Long Y,et al.Making monero hard-to-trace and more efficient[C]/ / 2019 18th IEEE International conference on trust,security and privacy in computing and communications.Rotorua,New Zealand: IEEE,2019:514.
[3] Zhang Y C,Long Y,Liu Z,et al.Z-Channel: Scalable and efficient scheme in Zerocash[J].Computers and Security,2019,86( 09) ,112.
[4] Sasson E B,Chiesa A,Garman C,et al.Zerocash: Decentralized anonymous payments from bitcoin[C]/ / 2014 IEEE Symposium on security and privacy.CA,USA: IEEE,2014: 459.
[5] 董贵山,陈宇翔,范佳,等.区块链应用中的隐私保护 策略研究[J].计算机科学,2019,46( 05);29.
[6] 刘明达,陈左宁,拾以娟,等.区块链在数据安全领域 的研究进展[J].计算机学报,2021,44( 01);1.
[7] Wang Y,Li Y,Yn Z,et al.16-qubit IBM universal quantum computer can be fully entangled[J].NPJ Quantum Information,2018,4( 1);1.
[8] Kiktenko E O,Pozhar N O,Anufriev M N,et al.Quantum-secured blockchain[J].Quantum Science and Technology,2018,3( 3);035.
[9] Fernández-Caramès T M,Fraga-Lamas P.Towards postquantum blockchain: A Review on blockchain cryptography resistant to quantum computing attacks[J].IEEE Access,2020,8: 21091.
[10] Decker C,Guthrie J,Seidel J,et al.Making bitcoin exchanges transparent[C]/ / European symposium on research in computer security.Berlin: Springer,Cham,2015:561.
[11] 蔡晓晴,邓尧,张亮,等.区块链原理及其核心技术 [J].计算机学报,2021,44( 01);84.
[12] Liu Z,Seo H,Castiglione A.Memory-efficient implementation of elliptic curve cryptography for the Internetof-Things[J].IEEE Transactions on Dependable and Secure Computing,2019,16( 3);521.
[13] Goldwasser S,Micali S,Rackoff C.The knowledge complexity of interactive proof systems[J].SIAM Journal on computing,1989,18( 1);186.
[14] Rivest R,Shamir A,Adleman L.A method for obtaining digital sinatures and public key cryptosystems[J].Communications of the ACM,1978,21( 2);120.
[15] Paillier P.Public-key cryptosystems based on composite degree residuosity classes[C]/ /International conference on the theory and applications of cryptographic techniques.Berlin,Germany: Springer,1999: 223.
[16] ElGamal T.A public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE transactions on information theory,1985,31( 4);469.