首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
区块链账本公开,以实现交易的溯源与可验证,但账本的透明使得区块链用户的隐私成为一个亟待解决的问题.为了解决联盟链交易中的交易金额和身份的隐私暴露问题,提出了基于群签名和同态加密的联盟链双隐私保护方法,在满足交易溯源和可验证的前提下,实现收付款者身份和交易金额的隐私保护.将群签名中群的概念与联盟链恰当结合,并提出一种部分身份匿名的概念,使方案能够满足对其他交易节点匿名,同时确保主要节点可验证.并利用Paillier同态加密的加同态性质验证交易的合法性,保护交易金额的隐私.提出主要节点的4步验证方法,通过对群签名、账户所属权和交易金额合法性的验证,实现主要节点对交易合法性的监管.通过分析,该方案可以抵抗篡改攻击和公钥替换攻击,且交易合法性验证合理,最后,通过与其他方案的对比分析,该方案的计算开销是合理的.  相似文献   

2.
作为目前被广泛使用的一种区块链,联盟链相较于公有链虽然具有更好的隐私性,但也仍然面临着因去匿名化方法而导致用户身份隐私泄露的问题。为了保护联盟链中用户的身份隐私,并且增加系统的容错性,提出了将可追踪环签名和实用拜占庭容错结合的联盟链身份隐私保护方法。该方法的核心思想是通过可追踪环签名来使联盟链中用户的身份具有条件匿名性,条件匿名性指的是用户在一定条件下是匿名的,即用户在正常交易时是匿名的,而当用户之间产生交易纠纷时,也可以对交易相关用户的身份进行去匿名化。此外,将可追踪环签名与实用拜占庭容错相结合,去匿名化的任务由联盟链中的节点通过实用拜占庭容错完成,减少了联盟链中心机构的权利和责任,即使用户对中心机构具有匿名性,也保证系统在中心机构出错时能够正常运行。通过实验分析和对比,该方案能够在合理的计算开销内保护用户身份隐私,并且保证较高的安全性和容错性。  相似文献   

3.
杨亚涛  蔡居良  张筱薇  袁征 《软件学报》2019,30(6):1692-1704
为了解决区块链交易过程中的隐私泄漏问题,对SM9标识密码算法进行改进,提出了基于身份认证的多KGC群签名方案.以联盟链为基础,设计了基于SM9算法可证明安全的区块链隐私保护方案,并对以上方案进行安全性与效率分析.通过分析证明,方案具有签名不可伪造、保证节点匿名及前向安全等特性.通过效率分析:该方案较Al-Riyami等人提出的无证书签名方案减少2次双线性对运算,验签效率提高约40%;较Tseng等人与Chen等人提出的方案分别减少4次与2次指数运算,计算效率整体得到提高.该方案通过多KGC群签名保护交易双方的用户身份,实现在节点间进行身份验证的同时,保护了节点的隐私.  相似文献   

4.
环签名作为一种特殊的群签名,因其不仅可以在不需要环成员协作的情况下完成签名,还能保证签名者的匿名性这一特点,已被广泛应用在匿名投票、匿名存证以及匿名交易等领域。首先,以时间为主线,将环签名发展分为不同的阶段,在每个阶段内又根据属性将环签名分为门限环签名、可链接环签名、可撤销匿名性的环签名、可否认的环签名等签名方案。通过对环签名发展历程的分析可知,环签名在门限环签名和可链接环签名领域的研究进展较为突出,其应用领域也最为广泛。在后量子时代,诸如基于大整数分解、离散对数等传统数论问题的密码方案已经不再安全,格公钥密码体制因其抗量子性、存在最坏实例到普通实例的规约等诸多优势成为后量子时代密码标准的最佳候选。因此,着重对现有基于格的门限环签名和基于格的可链接环签名进行了详尽的分析和效率比对。环签名天然的匿名特性使得其在产业区块链时代有着得天独厚的优势,因此将环签名在区块链中的几个应用进行了详细阐述。诸如对环签名在匿名投票、医疗数据共享、车联网领域的应用进行了概述和流程分析;又对环签名在虚拟货币、SIP云呼叫协议、Ad Hoc网络领域的应用意义进行了简单梳理。最后,对环签名技术近几年的研究进行分析...  相似文献   

5.
为了解决区块链交易中兼具隐私保护和监管功能的问题,提出一种可监管的区块链交易隐私保护方案。通过采用概率公钥加密算法实现区块链交易用户真实身份的隐藏,利用承诺方案和零知识证明技术实现交易金额的隐私保护,并保证交易的合法性验证,借助基于身份的加密体制实现监管机构对区块链交易的监督,并且监管机构无须存储用户的真实身份和密钥信息,大幅降低存储计算和密钥管理压力。该方案不依赖具体的共识机制,可作为独立模块应用在现有区块链技术中,具有简单和实用的特点,在数字资产、金融科技和能源交易等领域中具有广泛的应用价值。  相似文献   

6.
由于区块链中交易的有效性建立在账本公开验证的基础上,这带来了隐私保护的安全问题。目前的研究成果往往过度强调隐私性,使得区块链在实际应用中不受监管。如何在区块链上既保证用户信息的隐私性又使得用户能够被特定监管人所追踪是一个值得研究的问题。基于零知识证明、隐身地址技术和环签名,提出了一种可追踪的区块链账本隐私保护方案。通过使用可追踪的零知识证明、可追踪的隐身地址和可追踪的环签名,使得一般用户无法通过分析历史账本降低匿名性,同时管理者能够解密交易信息。该方案增强了区块链账本的隐私性,也保证了区块链能够被监管。理论分析证明了方案拥有较强的安全性和可追踪性。仿真实验结果表明方案具有强匿名性,且不会对传统区块链的性能带来显著影响。  相似文献   

7.
王震  范佳  成林  安红章  郑海彬  牛俊翔 《软件学报》2019,30(6):1705-1720
随着互联网中隐私保护技术的发展,身份认证已成为保护计算机系统和数据安全的一道重要屏障.然而,信息技术的快速发展使传统身份认证手段暴露出一些弊端,例如,区块链技术的兴起对身份认证提出了更高的要求,在认证身份的同时需要保护用户的身份隐私等.采用匿名认证技术可解决用户身份隐私泄露的问题,但目前大多数方案未考虑可监管的问题,一旦用户出现不诚信行为,很难进行追责,因此,需要在匿名认证过程中建立监管机制.针对以上问题和需求,主要设计了一种可监管的匿名认证方案,通过匿名证书的方式确定用户的资源访问权限和使用权限,同时,用户在出示证书时可选择性地出示属性,确保用户的隐私信息不过度暴露;此外,方案中引入监管机制,可信中心(CA)对匿名认证过程进行监管,一旦出现欺诈行为,可对相关责任人进行追责.该方案主要采用安全的密码学算法构建,并通过了安全性的分析证明,能够高效实现可监管的匿名身份认证,适宜在区块链(联盟链)和其他具有匿名认证需求和可监管需求的系统中使用.  相似文献   

8.
传统的公平合同签署协议通过引入中心化的可信第三方来保证协议的公平性。当第三方不诚实且和签署一方进行合谋,就会对另一方产生不公平。同时,第三方可能会泄露参与方的敏感信息,这将极大地威胁参与方的隐私。故合同签署的公平性和隐私性均依赖于第三方的可靠性。基于区块链的公平合同签署协议可去中心化从而避免依赖第三方来解决公平性,但区块链可被公开访问和验证,这为参与方的隐私问题又带来新的挑战。已有的基于公开区块链的隐私保护公平合同签署协议利用参与方共享的秘密因子对合同信息及公钥进行加密从而隐藏了参与方数字证书中的真实身份信息;但在协议的承诺阶段,由于区块链的假名性,执行两笔保证金交易时可能会泄露正在签署合同的参与方信息。为最大限度保护参与方的身份隐私,本文基于混币技术,通过引入半诚实可信第三方来提供参与者身份的混淆服务,并结合盲的可验证加密签名方案,设计出新的隐私保护公平合同签署协议。该协议可支持多个合同签署人通过区块链完成公平的合同签署,不仅可以保护与合同相关的隐私内容,还可以保护参与方的身份隐私。  相似文献   

9.
针对物联网终端交易的跨平台、去中心化、隐私、安全需求,提出基于联盟链的匿名交易方案,确保用户身份隐匿。通过划分基础域和互联域实现中心化身份认证和去中心化交易;对身份认证,提出基于Merkle树的双因素认证方案,实现各节点身份与消息的去耦;针对通信中明文消息暴露用户身份问题,提出基于CoinJoin思想的聚合签名隐私保护方案,混淆交易身份,以抵抗身份关联分析攻击;最后针对一致性和记账权问题,提出基于信誉评价策略的共识机制。安全性与效率分析表明,所提方案能以较低存储和计算开销保护终端身份隐私。  相似文献   

10.
利用区块链钱包保存的私钥对交易进行签名是区块链上交易的唯一途径,钱包中存储的私钥一旦丢失或泄露将造成无法挽回的损失.目前主流的钱包管理方案都将钱包集中存储在单个位置或者依赖可信第三方的参与,无法抵抗单点失效.针对区块链的钱包安全问题,提出一个基于无可信中心门限椭圆曲线数字签名的区块链钱包保护方案.该方案在无可信中心参与的情况下由参与者合作生成公私钥和各自的私钥碎片,超过门限阈值的参与者合作才能对交易进行有效签名,可有效抵抗单点攻击,保障钱包安全.经过安全性分析,该方案满足抗伪造性、匿名性、鲁棒性、不可追溯性和不可撤销性.通过效率分析,该方案完成签名仅需常数轮,可在增加较少签名时间的情况下保障区块链钱包安全.  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

18.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

19.
基于复小波噪声方差显著修正的SAR图像去噪   总被引:4,自引:1,他引:3  
提出了一种基于复小波域统计建模与噪声方差估计显著性修正相结合的合成孔径雷达(Synthetic Aperture Radar,SAR)图像斑点噪声滤波方法。该方法首先通过对数变换将乘性噪声模型转化为加性噪声模型,然后对变换后的图像进行双树复小波变换(Dualtree Complex Wavelet Transform,DCWT),并对复数小波系数的统计分布进行建模。在此先验分布的基础上,通过运用贝叶斯估计方法从含噪系数中恢复原始系数,达到滤除噪声的目的。实验结果表明该方法在去除噪声的同时保留了图像的细节信息,取得了很好的降噪效果。  相似文献   

20.
Abstract  This paper considers some results of a study designed to investigate the kinds of mathematical activity undertaken by children (aged between 8 and 11) as they learned to program in LOGO. A model of learning modes is proposed, which attempts to describe the ways in which children used and acquired understanding of the programming/mathematical concepts involved. The remainder of the paper is concerned with discussing the validity and limitations of the model, and its implications for further research and curriculum development.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号