999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Deletable and Modifiable Blockchain Scheme Based on Record Verification Trees and the Multisignature Mechanism

2021-08-26 09:38:26DaojunHanJinyuChenLeiZhangYatianShenYihuaGaoandXuehengWang

Daojun Han,Jinyu Chen,Lei Zhang,?,Yatian Shen,Yihua Gao and Xueheng Wang

1Henan Key Laboratory of Big Data Analysis and Processing,Henan University,Kaifeng,47500,China

2Institute of Data and Knowledge Engineering,Henan University,Kaifeng,47500,China

3School of Computer and Information Engineering,Henan University,Kaifeng,47500,China

4Department of Network and Finance,Agricultural Bank of China Limited Xuchang Branch,Xuchang,461000,China

5School of Software,Pingdingshan University,Pingdingshan,467000,China

6Department of Network and Finance,Agricultural Bank of China Limited Nanyang Branch,Nanyang,473000,China

ABSTRACT As one of the most valuable technologies,blockchains have received extensive attention from researchers and industry circles and are widely applied in various scenarios.However,data on a blockchain cannot be deleted.As a result,it is impossible to clean invalid and sensitive data and correct erroneous data.This,to a certain extent,hinders the application of blockchains in supply chains and Internet of Things.To address this problem,this study presents a deletable and modifiable blockchain scheme(DMBlockChain)based on record verification trees(RVTrees)and the multisignature scheme.(1)In this scheme,an RVTree structure is designed and added to the block structure.The RVTree can not only ensure that a record is true and valid but,owing to its unique binary structure,also verify whether modification and deletion requests are valid.(2)In DMBlockChain,the multisignature mechanism is also introduced.This mechanism requires the stakeholders’signatures for each modification or deletion request and thus ensures that a record will not be modified arbitrarily.A user’s request is deemed valid only if it is dually verified by the RVTree and the multisignature mechanism.The analysis finds that DMBlockChain can provide a secure and valid means for modifying and deleting records in a block while ensuring the integrity of the block and that DMBlockChain can effectively save space in some scenarios that require frequent records modification.

KEYWORDS Blockchain;record verification trees;multisignature;DMBlockChain

1 Introduction

The concept of blockchains has received extensive attention from researchers since it was first put forward.Blockchains are widely applied in fields such as digital currencies[1],supply chains[2,3],the Internet of Things[4–7],intelligent healthcare[8–10],and intelligent agriculture[11–14].Currently,blockchains are primarily used to store transactions and data.Available blockchains meet storage needs for transactions.Blockchains can satisfy user requirements for data storage,such as decentralization,trust building,and data tamper-proofing,compared to conventional centralized storage.However,some researchers have found that the non-revisability of blockchain data can be very inconvenient in three main ways.First,Erroneous information cannot be modified[15,16].Blockchains are used extensively to store certificates,health records,Internet of Things(IoT)data,and asset information.The authenticity and validity of these data are ensured through storage in blockchains.However,writing data into a blockchain as read-only prevents erroneous information in records from being corrected.Second,Sensitive information cannot be deleted.The basic data storage function of blockchains is often abused for storing pornography and illegally obtained data by violating intellectual property rights.For example,there are large stores of child pornography and illegal intellectual data in Bitcoin blockchains[17–21].Third,Invalid data cannot be cleaned.After a blockchain has been in operation for a period of time,blocks generated early on may contain large quantities of undeletable redundant data[22].These data take up a large amount of storage space,which wastes resources and may also violate relevant laws.For example,both the General Data Protection Regulation of the European Union and the Fair Credit Reporting Act of the United States consider the right to be forgotten a fundamental right of data subjects.

Thus,researchers have developed techniques to modify and delete block records,such as chameleon-hash functions and polynomials,that improve the hash verification structure and transaction mode of blocks.Most of these schemes realize the modification and deletion of individual data,i.e.,a user can alter block data after passing node authentication,and other users cannot interfere in these alteration operations.However,this design is inapplicable to some scenarios.For example,in a supply chain,an enterprise may need to upload data to a blockchain for inspection by other enterprises or government agencies.The enterprise can modify erroneous data in the blockchain in a timely fashion to minimize effects on the normal production of other enterprises.However,the ability of an enterprise to freely modify uploaded data could impact governmental monitoring.For example,an enterprise could modify product data with quality issues to evade penalties.This problem also exists in other fields,such as the IoT and medical services.Therefore,a blockchain design that allows block data to be modified and deleted while simultaneously restricting user operation has relatively high practical significance for fields such as supply chains and the IoT.

1.1 Contribution

This paper presents a deletable and modifiable blockchain scheme(DMBlockChain)based on record verification trees(RVTrees)and the multisignature scheme.We make the following contributions.

(1)In this study,data modification and deletion functions are achieved at the transaction level.In our scheme,a record verification tree(RVTree)structure is designed and added to the block structure.A user can modify or delete data simply by changing the record list without modifying other data in the block.This operation does not affect the verification relationship in the block data,and other users can directly see the data modification history.

(2)In this study,a multisignature mechanism is introduced.A modification operation can pass node authentication only when a sufficient number of stakeholders sign the modification record.This restriction on the information owner protects the interests of stakeholders and makes malicious attacks more difficult.

(3)An experiment based on a consortium blockchain is performed in this study.The experimental results show that the proposed scheme realizes block data modification and deletion functions and effectively saves space in scenarios requiring frequent modifications and deletions.

1.2 Organization

The rest of the paper is organized as follows.Section 2 introduces the related work of this paper.Section 3 introduces relevant knowledge on bilinear mapping,the Lagrange interpolation method,and security models.Section 4 describes DMBlockChain and its block structure as well as how to modify and delete block records in detail.Section 5 presents an analysis of the integrity and security of DMBlockChain as well as an experimental analysis of its performance.The final section summarizes this paper and presents a preliminary discussion on noteworthy research directions.

2 Related Works

The tamper-proof property of conventional blockchains relies on integrity verification.Fig.1 shows the two main processes of blockchain integrity verification within a block and for the entire block.The first process comprises integrity verification of the body and head of the block.A Merkle tree verifies the transaction authenticity of the block head(Fig.1,relationship ①).The integrity of the Merkle tree is verified by the Merkle root of the block head(Fig.1,relationship ②).The authenticity of the Merkle root of the block head is verified by the hash of the block head(Fig.1,relationship ③).For an entire block,the head hash is verified by the subsequent block(Fig.1,relationship ④).Blocks are connected by successive hash values into a chain.This chain structure ensures the integrity and tamper-proofness of the blocks.

Figure 1:Verification relationship of blockchain

For blockchains,the block head hash and Merkle tree guarantee the integrity of the block horizontally and vertically,respectively.Therefore,the design of editable blockchains must start with the verification relationship,that is,implement the editing function of block data while ensuring the integrity of the verification relationship.The literature shows that editable blockchain schemes have been designed to begin with relationships ①and ④.

(1)Relationship ① refers to the verification relationship between the Merkle tree and the transaction,where in the Merkle tree guarantees the authenticity of the transaction by using a hash algorithm.Several researchers have started with this relationship by changing the verification relationship in block to enable the modification and deletion of block data.For example,Ren et al.[23]proposed a deletable blockchain scheme based on threshold ring signatures.In this scheme,after receiving agreement and signatures from the majority of the nodes,the system can effectively delete the blockchain data while maintaining the overall blockchain structure.Later,Ren et al.[24]proposed a revisable blockchain scheme based on a trapdoor one-way function.In this scheme,a manoeuvring factor is introduced to reconstruct the signature subblock of each block.Block data can be validly modified as long as a specific threshold number of nodes agree.Additionally,the modification should not destroy the block-linking structure.The whole network can still verify data validity by the original verification procedure.Puddu et al.[17]proposed a variable blockchain scheme based on the PoW consensus protocol,whereby a specific type of transaction executes the modifications while the user monitors these changes.In addition,the scheme designed two new applications,namely,a collaborative recommendation system that can review inappropriate content and a time-locked encryption mechanism that can decrypt messages after a certain period of time.Lee et al.[18]implemented the modification and deletion of transactions by means of truncated hashes of the transaction content,and only the modified version is required to have a truncated hash equal to its original target value when a record must be modified.

(2)Relationship ④refers to the verification relationship between blocks,which is crucial in implementing a chain structure.The current block header contains the block header hash of the previous block to ensure the integrity of the previous block.The integrity of the current block is ensured by the next block.Several researchers have started with this relationship by changing the verification relationship between blocks to enable the modification and deletion of block data.For example,Based on a chameleon hash,Accenture proposed a revisable blockchain scheme[25].This scheme finds a collision of the existing data by finding the trapdoor of the chameleon hash and thereby revises the blockchain data.Subsequently,References[15,19,20,22]combined the secret sharing,trapdooring,and access structures to improve the chameleon hash in varying degrees on the basis of Reference[25]and enhance its performance and functional extensions.Deuber et al.[21]proposed the first editable decentralized blockchain protocol for permissionless systems based on the proof of work(PoW)consensus that can be easily adapted to any consensus mechanism.Cheng et al.[16]put forward a novel polynomial-based blockchain structure that organizes data segments in each block using Lagrange interpolation methods to enable block data editing.

These schemes can implement the modification and deletion of block[26]data but is only partially applicable to supply chains,Internet of Things(IoT)[27,28],and other scenarios because of the limitations of the consensus mechanism and scope of application as well as the unconstrained editing behavior of users[29,30].

3 Related Knowledge

To better describe DMBlockChain,the relevant knowledge used in this scheme is first presented.

3.1 Bilinear Mapping

3.2 Lagrange Interpolation Method

3.3 Security Model

In this section,the security model used in this study is given to facilitate the subsequent security analysis of DMBlockChain.In classic mode,security is defined by a security game between a challenger and an adversary,which is defined as follows:

Setup:The adversary A gives a record verification treeRVTree?to be challenged and sends it to the challenger C.

Phase 1.The adversary A produces keys corresponding to the record setsS1,S2,...,Sq1.None ofS1,S2,...,Sq1satisfyRVTree?.

Challenge.The adversary A submits two random secret valuesThe challenger C selects a random numberb∈{0,1}and encryptsMbinRVTree?.The verification parameterVP?is given to the adversary A.

Phase 2.The adversary A repeats Phase 1.However,none of the record setsSq1+1,...,Sqsatisfy theRVTree?corresponding to the challenge.

Guess.The adversary A outputs the guessb′ofb.

In this game,the advantage of the adversary A is defined as follows:

Definition 1.If the advantage of the adversary within the polynomial time is negligible in the above game,then the scheme proposed in this study is considered secure.

4 DMBlockChain

To address the blockchain data modification and deletion problems,this study presents a feasible scheme,DMBlockChain,based on access tree-based secret sharing technology.DMBlockChain validly deletes and modifies the records in the blocks without damaging the integrity of the blockchain.DMBlockChain is characterized by decentralization,tamper-proofing,and valid modification and deletion.The conventional blockchain scheme is more similar to an account book,whereas DMBlockChain is more similar to a database system.The core of DMBlockChain lies in the introduction of an RVTree-based data structure.The verification mechanism of this structure allows a user to validly modify and delete the records in the blocks.A multisignature technology is also introduced.The stakeholders of a record are required to sign the record,which prevents the record owner from freely modifying or deleting the record.This section first introduces the RVTree design scheme and then describes the block structure and how blocks are modified and deleted.

4.1 RVTree

4.1.1 Overview

An RVTree is a binary and ternary mixed tree,as shown in Fig.2.This tree contains a number n of layers.From the first layer to the(n?2)thlayer are structure trees.Each structure tree is a ternary tree;i.e.,each node of a structure tree has three leaf nodes.Each node of a structure tree represents a threshold gate.From the nthlayer to the(n?1)thlayer are information trees.Each information tree is a binary tree;i.e.,each node of an information tree has two leaf nodes.

Figure 2:Record verification trees(full)

An RVTree is created by the following procedure.

First,the system establishes an information tree for each record(to verify authenticity).One leaf node stores the hash of the record(to verify the validity of the modification and deletion operations),and another leaf node stores the hash of the signature of the record.The parent node stores an OR gate.In our design,RVTree verifies not only the original record but also the modification or deletion operation and uses OR gate to connect the two hashes when one of the hashes can be verified by RVTree as a way to modify or delete the record.

Second,from the bottom up to the(n?2)thlayer,every three information trees constitute one structure tree.The root node of each structure tree represents an AND gate.Starting from the(n?3)thlayer,every three structure trees constitute one composite structure tree.The root node of each composite structure tree represents an AND gate.When there remains only one root node,an RVTree is established.AND gate are used in this design because each information tree represents a record,and we need to connect all the records in the block to form a whole and secure the records.Records are compared with one another,and AND gate is used to connect multiple records effectively.Each structure tree contains no more than three child nodes that are not leaf child nodes.This design reduces the complexity in decrypting the secret value ofVP.If one node is used to connect all the binary trees,the order of the polynomial could be exceedingly high.This could lead to an enormous computational load during the decryption process and thereby render it even more difficult to verify the integrity of the block.If less than three information or structure trees remain,then the remaining one or two will form a tree.The structure of a record verification tree with five records is illustrated in Fig.3.

Figure 3:Record verification trees(non-full)

4.1.2 RVTree Scheme

There is a system of polynomials that corresponds to the RVTree.Here,the following functions are first defined.Index(x)represents the index of the nodex.Parent(x)represents the parent node of the nodex.The hash functionmaps any records in binary strings to random set elements.For a leaf nodex,lethashxbe the hash digest of the record related tox.

The initialization,generation,and verification algorithms are the main core RVTree algorithms.They are described below:

Setup.The initialization algorithm is run by the authorization centre.The initialization algorithm first selects aq-order bilinear group G0withgas its generator and then generates a system security parameter SP.

Generate(SP,RL).The generation algorithm is run by the blockchain nodes.This algorithm creates an RVTreebased on the record setRLand the creation rule and then selects a(Kx?1)-order polynomialqxfor each nodexof the RVTree.Subsequently,this algorithm randomly selects anas the secret value stored by the access treeand stores it in the root nodeRof the access tree.LetqR(0)=s.For other nodes,letqx(0)=qparent(x)(index(x)).In addition,letYbe the set of records stored in all the leaf nodes of the access tree.The hash of verification parameterVPHash,and the hash of the secret valueSHashare calculated.

The blockchain nodes packageVPHash,andSHashand other block information into a block and broadcast it to the whole network.After being verified,the block can be stored on the blockchain.

Verification(RL,VP).Verification algorithm.The key generation algorithm usesRLandVPas inputs and ultimately outputs the verification result.

First,the system executes a decryption algorithmDecryptNode(VP,x).This algorithm calculates the values stored in the nodes,starting from the leaf nodes of the access tree.In addition,this algorithm recursively calculates the values of the nodes of the previous layer.Through layerby-layer calculations,this algorithm could ultimately decrypt the secret value of the root node.There are two scenarios in this process.

For the leaf nodes,letibe the value recorded in the nodex.

Ifi /∈RL,thenDecryptNode(VP,x)=⊥.

Ifi∈RL

For the non-leaf nodes,decryption operations are performed layer by layer from top to bottom.For all the child nodes z belonging to the nodex,the algorithm callsDecryptNode(VP,z)and stores the output asFzSxis a set of a numberkxof nodeszin whichFz/=⊥.If there is no such set,the function returns ⊥.Otherwise,based on Eq.(1),calculate:

The algorithm then calculates the value of the root nodeRof the access tree.

Finally,letShash′=hash(A·VPHash).WhetherShash′is consistent withShashis determined.IfShash′is consistent withShash,the record is true and valid;otherwise,the record in the block has been tampered with.

4.2 Block Design

Fig.4 shows the block design of DMBlockChain.In this scheme,the Merkle tree in a block is replaced by an RVTree(For details,see Section IV A).In addition,a verification parameter,a record list,and a new record list are added.A block is composed of a header and a body.

Figure 4:Block structure

Block header.The block header consists of the timestamp,the hash of the parent block,and the version number,which are in the original block structure,as well as a newly added the hash of verification parameter and a newly added the hash of the secret value.In the proposed scheme,the hash of the secret value is used to verify the authenticity of verification parameter.The hash of the secret value is calculated based on the secret value stored in the verification tree and the hash digest of verification parameter.The hash of the secret value is used to ensure the integrity of the record and the authenticity of verification parameter.The rest is consistent with the block structure of a conventional blockchain.

Block body:The block body consists of an RVTree,a record list,and a verification parameter.The RVTree is an important component that ensures the integrity of the block.The RVTree is connected upstream to the hash of the block and downstream from the record list to ensure the integrity of the record.The record list consists of a record list,a signature list,and a new record list.All records during the creation of the block are stored in the record list.The signature list and the new record list are in the default state.When a user deletes a record,the nodes delete the record corresponding to the record list and then store the signature information relating to the user’s deletion operation in the signature list.When a user modifies a record,the nodes also delete the record corresponding to the record list,then store the signature information relating to the user’s modification operation in the record list,and finally store the updated record in the new record list.

4.3 Record Modification and Deletion

This section focuses on the description of the block modification and deletion processes.In addition,block generation is introduced.A comparison of block structure diagrams better shows the block modification and deletion processes.

4.3.1 Block Generation

The block generation process in the proposed scheme is similar to that in the conventional blockchain scheme.However,the main difference between the proposed and conventional blockchain schemes is that a Merkle tree is created in the conventional blockchain scheme,whereas an RVTree is created in the proposed scheme.Here,generation of three records is used as an example.Fig.5 shows the created block structure.

Figure 5:Block example(initial state)

4.3.2 Record Deletion

Fig.6 is the flow chart of the record deletion process.Algorithm 1 shows the record deletion process.Fig.7 shows the block structure after record deletion.

When a user wants to delete the recordRL1in the blocki,the user must first sign the hashhash1ofRL1(Sign(hash1))and then generates a deletion requestDelInfo′={address,del,Sign(hash1)}.In addition,the user sends the deletion request to the stakeholders.Stakeholders generally consist of business partners,industry associations,and government regulators.Each stakeholder signs the hashhash2of the deletion request.The file owner collects all the signatures and generates a messageDelInfo={address,del,Sign(hash1),MuSign(hash2)}and broadcasts it to the blockchain network.All the nodes generate a hash digesthashsignby hashing the signature information contained in the deletion request and subsequently substitutehashsign,along with the hash sethashlistof the other records,into the RVTree algorithmVerification()and decrypt the secret value stored in the RVTree.Afterwards,the nodes obtainhash3by first calculating and then hashing the secret value andVPHash.The following verifications are then performed:(1)hash3is compared withSHash.(2)The multiple signatures are verified.If these two verifications are passed,then the deletion operation is accepted;otherwise,the deletion operation is rejected.Finally,the verification result is broadcast to the blockchain network.After receiving verification from the majority of the nodes of the network,the recordRL1is deleted from the block,and the deletion request is inserted into the signature list.

Figure 6:Flow chart of the record deletion process

Algorithm 1:An example of deleting block records Input: RL1:Record Information; address:Hash Address; del:Delete Sign; Shash:Secret Hash;hashlist:Record hash list; VPHash:Verify parameter hash;Output: DelInfo:Delete Information 1.hash1 ←Hash(RL1)2.sign1 ←Sign(hash1)3.DelInfo′←{address,del,sign1}4.sign2 ←MuSignimages/BZ_231_668_775_686_821.pngHashimages/BZ_231_794_775_812_821.pngDelInfo′■■5.DelInfo ←{address,del,sign1,sign2}6.Broadcast(DelInfo)to blockchain network 7.hashsign1 ←Hash(sign1)8.key ←Verificationimages/BZ_231_716_991_735_1036.pnghashsign1,hashlist,VP■9.hash3 ←Hash(VPHash·key)10.if hash3=SHash 11.then Result1 ←{DelInfo,true}12.else Result1 ←{DelInfo,false}13.if sign2 14.then Result2 ←{DelInfo,Yes}15.else Result2 ←{DelInfo,No}16.Result ←Result1+Result2 17.Broadcast(Result)to blockchain network 18.if Result=(DelInfo,true,Yes)19.then Add(DelInfo)to block and Delete(RL1)20.else Reject the request

Figure 7:Block example(status after deletion of record)

4.3.3 Record Modification

Fig.8 is the flow chart of the record modification process.Algorithm 2 shows the record modification process.Fig.9 shows the block structure after record modification.

Figure 8:Flow chart of the record modification process

Algorithm 2:An example of modifying block records Input: RL1:Record Information; address:Hash Address; mod:Modify Sign; Shash:Secret Hash;RL′1:New Record; hashlist:Record hash list; VPHash:Verify parameter hash;Output: ModifyInfo:Modify Information and RL′1 1.hash1 ←Hash(RL1)2.hash′1 ←Hashimages/BZ_233_626_667_644_713.pngRL′1■3.sign1 ←Sign(hash1)4.sign′1 ←Signimages/BZ_233_600_775_619_821.pnghash′1■5.ModifyInfo′←■address,mod,sign1,hash′1,sign′1■6.sign2 ←MuSignimages/BZ_233_668_885_686_930.pngHashimages/BZ_233_794_885_812_930.pngModifyInfo′■■7.ModifyInfo ←■address,mod,sign1,hash′1,sign′1,sign2■8.Broadcastimages/BZ_233_542_994_561_1040.pngModifyInfo,RL′1■to blockchain network 9.hashsign1 ←Hash(sign1)10.key ←Verificationimages/BZ_233_732_1139_754_1184.pngimages/BZ_233_739_1102_757_1148.pnghashsign1,hashlist,VP■11.hash3 ←Hash(VPHash·key)12.if hash3=SHash 13.then Result1 ←{ModifyInfo,true}14.else Result1 ←{ModifyInfo,false}15.if sign2 16.then Result2 ←{ModifyInfo,Yes}17.else Result2 ←{ModifyInfo,No}18.hash4 ←Hashimages/BZ_233_649_1534_667_1579.pngRL′1■19.if hash4=hash′1 and sign′1 20.then Result3 ←{ModifyInfo,Yes}21.else Result3 ←{ModifyInfo,No}22.Result ←Result1+Result2+Result3 23.Broadcast(Result)to blockchain network 24.if Result=(ModifyInfo,true,Yes,Yes)25.then Addimages/BZ_233_609_1948_632_1994.pngimages/BZ_233_619_1912_637_1957.pngModifyInfo,RL′1■to block 26.Delete(RL1)27.else Reject the request

When a user wants to modify the recordRL1in the blocki,the user must first sign the hashhash1ofRL1Sign(hash1)and then obtainsby hashing the new recordIn addition,the user must signSubsequently,the system generates a modification requestThe user sends the modification request to the stakeholders.Each stakeholder signs the hash hash2 of the modification request.The file owner collects all the signatures,generates a messageModifyInfo=and sends it,along with the recreated recordto the blockchain network.All nodes generate a hash digesthashsignby hashing the signature information contained in the modification request and subsequently substitute it,along with the hash sethashlistof the other records,into the RVTree algorithmVerification()and decrypt the secret value stored in the RVTree.Afterwards,the nodes obtainhash3by first calculating and then hashing the secret value and the hash of verification parameter.The following verifications are then performed:(1)hash3is compared withSHash.(2)The newly generated record is hashed,and its hash is compared with the hash contained in the modification request.(3)The multiple signatures are verified.If these three verifications are passed,the modification operation is accepted;otherwise,the modification operation is rejected.Finally,the verification result is broadcast to the blockchain network.After receiving verification from the majority of the nodes of the network,the recordRL1is deleted from the block,and the modification request and the new record are inserted into the signature list and the new record list,respectively.

Figure 9:Block example(status after modifying records)

5 Analysis

The following analysis demonstrates the practical significance,effectiveness,feasibility,and security of the proposed scheme.First,DMBlockChain is compared with references[15–24].Then,the security of DMBlockChain is analysed.Finally,the performance of DMBlockChain is analysed through experiments.

5.1 Comparative Analysis

In this section,DMBlockChain is compared with references[15–24].As demonstrated in Tab.1,in terms of scope of application,the scheme in references[15,17,18,21–24]is only applicable to one type of blockchain(e.g.,PoW consensus-based blockchain),while DMBlockChain and that in references[16,19,20]are applicable to most types of blockchains with a broad scope of application.From the editing level,references[15,16,19–23]implemented only block-level data modifications,while DMBlockChain and references[17,18,24]performed record-level data modifications.In addition,DMBlockChain constrains the user’s actions and is suitable for use in scenarios,such as supply chain and IoT.

Table 1:Comparison of schemes

5.2 Security Analysis

Security analysis will be conducted on the solution of this study in terms of both block generation and record editing.Security analysis of the block generation process includes both security of the record verification tree and block integrity.The security of the block record editing process includes both block security during modification or deletion and interrupted operation security.

5.2.1 RVTree Security Analysis

Theorem 1.In a bilinear group model,the RVTree scheme proposed in this study is secure against chosen-plaintext attacks.

Proof:It is assumed that there is one adversary A that is able to break the proposed scheme.C is a challenger.The following operations are performed:

Setup.The adversary A gives a record verification treeRVTree?to be challenged and sends it to the challenger C.

Phase 1.The adversary A inquires the challenger C about the keys corresponding to the hash sets of multiple records,S1,S2,...,Sq1.None ofS1,S2,...,Sq1satisfy theRVTree?.

Challenge.The adversary A submits two random secret valuesThe challenger C selects a random numberb∈{0,1}.LetqR(0)=Mb,which corresponds to the root nodeRof the RVTree,be equal to Mb.For other nodes,letqx(0)=qparent(x)(index(x)).Calculate:

TheVPis then sent to the adversary A.

Phase 2.Similar to Phase 1,the adversary A continues to inquire the challenger C about the keys corresponding toSq1+1,...,Sq.It is required that the hash sets of records,Sq1+1,...,Sqdo not satisfy the challengedRVTree?.

Guess.The adversary A outputs the guessb′ofb.Ifb′=b,when the adversary A decrypts the secret value,his or her advantage is equal toThe advantage of the adversary within the polynomial time is negligible.The scheme established in this study is secure under the defined security model.

5.2.2 Block Integrity Analysis

For a conventional blockchain,the header of a block contains the hash of the previous block,which is obtained by hashing the header of the previous block.The blocks are linked by hashes successively to form a blockchain.This chain structure ensures the integrity and tamper-proofing of the blocks.Transaction authenticity is guaranteed by a Merkle tree.The hash of a block ensures its transverse integrity,whereas the Merkle tree ensures its longitudinal integrity.

In DMBlockChain,the Merkle tree is replaced by a record verification tree.The transverse integrity of the blocks relies completely on the chain structure formed by the hash of the block.The longitudinal integrity of the block relies completely on the record verification tree and verification parameter.Fig.10 shows the correlations among the hash of the block,the hash of the secret value,record verification tree,the hash of verification parameter,and verification parameter.the hash of the block ensures the integrity of the chain structure between blocks and the authenticity of the hash of the secret value.The hash of the secret value ensures the authenticity of the record verification tree and the hash of verification parameter.The record verification tree ensures the authenticity of the record list.the hash of verification parameter ensures the authenticity of verification parameter.

Figure 10:Block association

5.2.3 Security Analysis of the Blockchain at Record Modification or Deletion

During modification and deletion operations,only the recorded information is modified while the rest remains unchanged and the binding relationship between blocks is unaffected.If the block data of a single or multiple nodes is erroneous or lost,then these nodes will request block data from other nodes.When the lost data are received,the nodes will verify the authenticity of the data and add it to the block after passing verification.

There is a change in the data in a block after a record it contains is modified or deleted.Therefore,it is necessary to re-verify the integrity of the blockchain.Whether a valid verification can be established between the user’s request and the block is the key to verification.An RVTree is the core of establishing a verification between the block and the user’s request.In addition,the validity of the new record is guaranteed by the user’s request.Therefore,it is necessary only to verify whether the new record and the modification or deletion request are valid.

Request security.The validity of a modification or deletion request is guaranteed by the RVTree.A leaf node of the RVTree stores the hash of the signature corresponding to the original record.The unidirectionality of the hash function ensures that the signature information for a user’s record could not be falsified.In addition,the signature algorithm,to a certain extent,ensures the security of signature information.As long as owners keep their private keys securely,the forgery of the valid proof is impossible.Therefore,the authenticity of a user’s request is considered secure as long as the request contains the correct signature information for the record.

New record security.When a user must modify a record,the user should submit a new record.The owner of the record should sign the hash of the record.The signature of the record owner ensures the validity of the new record.In addition,the stakeholders sign the whole modification request.The signature mechanism ensures the security of a new record.

In addition,the multisignature mechanism is introduced.The owner of a record can validly modify or delete the record only if the owner receives signatures from multiple stakeholders.Such a design constrains not only the user’s actions but also increases the difficulty for malicious users to forge requests,thereby enhancing the scheme’s resilience to attacks.

In summary,the RVTree ensures the validity of the user’s request.The user’s request ensures the validity of the new record.The hash,signature,and multisignature algorithms collectively ensure the security of the block at record modification or deletion.

5.2.4 Impact of Interrupt Operation

During the execution of a modification or deletion operation,the user may interrupt the operation,but the integrity of the block remains unaffected by this interruption.We analyze the operation according to the three stages of execution.

(1)From the user-generated request to the stakeholder signature stage.If a request is interrupted with a wish,then the operation is simply undone and the blockchain remains unaffected.

(2)From the user request broadcast in the blockchain network to the node verification request stage.In this phase,some nodes may have completed the requested operation.If a user requests an interrupt operation,then the node performing the completed operation validates the revocation request.If the revocation is valid,then the node requests the original record from the other nodes and restores the original record.Nodes that do not perform operations abort them.

(3)The nodes are consistent,and the operation execution phase is complete.At this stage,the operation is complete and the user cannot interrupt it.

5.3 Performance Analysis

To test the feasibility and performance of DMBlockChain,simulations were performed in a hardware environment consisting of 16 computers,each with a 2.4-GHz Intel Core i7 processor and 4 GB of random access memory,and a software environment consisting of the Ubuntu 18 operating system,Python 3,and a consortium blockchain based on the Practical Byzantine Fault Tolerance consensus protocol.First,the block packaging times corresponding to various numbers of records were statistically analysed.The times required by the generation and verification processes of the RVTree and the Merkle tree were then statistically analysed.Finally,the conventional and proposed blockchain schemes were compared in terms of storage space occupancy.The experimental results showed that DMBlockChain not only realizes modification and deletion of block data but also ensures the integrity of block data.

Compared to the conventional blockchain scheme,DMBlockChain needs a relatively long time to generate an RVTree.Thus,the focus was placed on comparing the generation times for the RVTree and Merkle tree.In addition,the verification times for the RVTree and the Merkle tree were compared.Fig.11 shows the statistics of the block packaging times of the system corresponding to various numbers of records.As demonstrated in Fig.11,the time required by the system to package records was in direct proportion to the number of records.

Figure 11:Record packaging efficiency

The RVTree and Merkle tree generation and verification processes were compared in terms of time efficiency.Fig.12 shows the statistics of the generation times corresponding to various numbers of records.As demonstrated in Fig.12,the time efficiency for Merkle tree generation and verification was consistent and increased relatively slowly.In comparison,in DMBlockChain,the RVTree generation and verification times increased rapidly with increasing number of records.Compared to the Merkle tree,it took a longer time to generate and verify an RVTree.

Figure 12:RVTree and Merkle generation and verification time comparison

Moreover,the RVTree and the Merkle tree were compared in terms of the space occupied by the generated data.Fig.13 shows the generated data sizes corresponding to various numbers of records.As demonstrated in Fig.13,there was a relatively insignificant change in the space occupied by the data generated by the Merkle tree.In comparison,in DMBlockChain,the space occupied by the RVTree increased rapidly with increasing number of records.Compared to the Merkle tree,the RVTree occupied a larger storage space.Furthermore,a block with 50 records was statistically analysed.On average,each record in the RVTree occupied a space of 1.4 K.By contrast,each record in the Merkle tree occupied a space of 0.02 K.Let n be the number of the modifications of the block and y the space saving rate;thus,As demonstrated in Fig.14,when n >70,y >0 for the RVTree.Therefore,it can be inferred that DMBlockChain can effectively save space in scenarios that require frequent record modification.

Figure 13:Storage space comparison between RVTree and Merkle

Figure 14:The change of occupancy of storage space

6 Conclusions

This study presents a blockchain scheme based on RVTrees and the multisignature mechanism DMBlockChain.In this scheme,an RVTree is introduced to the block structure,thereby realizing modification and deletion of records on the blockchain.The simultaneous introduction of multiple signature mechanisms to constrain the user’s editing behavior is suitable for IoT and supply chain applications.Experimental simulation results show that DMBlockChain can realize deletion and modification of records in a block while ensuring its integrity.However,the space occupancy of DMBlockChain is relatively high,whereas its time efficiency is relatively low.Therefore,on this basis,future studies should focus on further reducing the generation time and space occupancy of the RVTree.

Funding Statement:This work was supported by the Scientific and technological project of Henan Province(Grant Nos.202102310340,212102210414),Foundation of University Young Key Teacher of Henan Province(Grant Nos.2019GGJS040,2020GGJS027),Key scientific research projects of colleges and universities in Henan Province(Grant No.21A110005),and National Natual Science Foundation of China(61701170).

Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

主站蜘蛛池模板: 尤物午夜福利视频| 久久国产精品娇妻素人| 亚洲国产理论片在线播放| 手机在线看片不卡中文字幕| 伊人久综合| 国产主播一区二区三区| 国内精品免费| 亚洲国产精品日韩欧美一区| 中文字幕永久视频| 精品国产网| 国产免费怡红院视频| 亚洲欧洲免费视频| 亚洲欧州色色免费AV| 欧美人人干| 91福利在线看| 激情六月丁香婷婷四房播| 欧美视频在线不卡| 日本高清在线看免费观看| 日韩a级毛片| 无码粉嫩虎白一线天在线观看| 另类综合视频| 伊人天堂网| 国产午夜不卡| 国产91在线|中文| 国产一在线| 免费又爽又刺激高潮网址 | 中文字幕有乳无码| 福利在线一区| 强乱中文字幕在线播放不卡| 999在线免费视频| 99热这里只有成人精品国产| 91成人在线免费观看| 亚洲一级毛片在线观| 蜜桃视频一区二区三区| 久久99国产乱子伦精品免| 亚洲青涩在线| 欧美日韩资源| 三上悠亚精品二区在线观看| 亚洲精品片911| 久久免费观看视频| 久久福利网| 久久www视频| 在线欧美a| 国产美女在线观看| 欧美一级在线播放| 久久精品丝袜高跟鞋| 久久大香伊蕉在人线观看热2| 久久国产乱子伦视频无卡顿| 亚洲国产系列| 亚洲人成日本在线观看| 在线观看国产一区二区三区99| 一级黄色片网| av天堂最新版在线| 亚洲Av综合日韩精品久久久| 久久这里只有精品国产99| 久久久久九九精品影院| 亚洲欧洲日韩综合| 国产精品女人呻吟在线观看| 青青青伊人色综合久久| 国产成人久久综合一区| 98超碰在线观看| 国产色网站| 一级全免费视频播放| 99九九成人免费视频精品| 色久综合在线| 久久美女精品| 手机在线看片不卡中文字幕| 色屁屁一区二区三区视频国产| 99久久无色码中文字幕| 五月婷婷亚洲综合| 91探花国产综合在线精品| 国产乱人激情H在线观看| 香蕉国产精品视频| 国产农村精品一级毛片视频| 国产成人精品18| yy6080理论大片一级久久| 国产精品欧美在线观看| 欧美一道本| 婷婷成人综合| 国产靠逼视频| 一级爆乳无码av| 成人福利在线免费观看|