作者投稿和查稿 主编审稿 专家审稿 编委审稿 远程编辑

计算机工程 ›› 2023, Vol. 49 ›› Issue (4): 1-13. doi: 10.19678/j.issn.1000-3428.0065927

• 热点与综述 • 上一篇    下一篇

区块链隐私保护机制研究

王群1,2, 李馥娟1,3, 倪雪莉1,2, 夏玲玲1,2, 梁广俊1,2   

  1. 1. 江苏警官学院 计算机信息与网络安全系, 南京 210031;
    2. 江苏省电子数据取证分析工程研究中心, 南京 210031;
    3. 计算机软件新技术国家重点实验室(南京大学), 南京 210093
  • 收稿日期:2022-10-08 修回日期:2022-12-21 发布日期:2023-02-08
  • 作者简介:王群(1971-),男,教授、博士,主研方向为网络空间安全、区块链技术;李馥娟,教授;倪雪莉,讲师、硕士;夏玲玲,副教授、博士;梁广俊,讲师、博士。
  • 基金资助:
    国家自然科学基金(61802155);江苏省高校自然科学研究重大项目(20KJA520004);江苏省社会科学基金(21MLD012);计算机软件新技术国家重点实验室(南京大学)开放课题(KFKT2022B23);江苏省市场监督管理局科技计划项目(KJ21125027)。

Research on Blockchain Privacy Protection Mechanism

WANG Qun1,2, LI Fujuan1,3, NI Xueli1,2, XIA Lingling1,2, LIANG Guangjun1,2   

  1. 1. Department of Computer Information and Cybersecurity, Jiangsu Police Institute, Nanjing 210031, China;
    2. Jiangsu Electronic Data Forensics and Analysis Engineering Research Center, Nanjing 210031, China;
    3. State Key Laboratory for Novel Software Technology at Nanjing University, Nanjing 210093, China
  • Received:2022-10-08 Revised:2022-12-21 Published:2023-02-08

摘要: 区块链作为一类由多节点共同维护的分布式账本,综合运用P2P网络、共识算法、智能合约、密码学等技术,在开放网络环境中构建高效率、低成本的去中心化信任机制,实现防篡改、防伪造等安全功能,但同时面临严重的数据隐私泄露风险。基于对区块链隐私的理解和对隐私数据形成过程的分析,重点从身份隐私、数据隐私、网络隐私等3个方面分析目前区块链隐私保护的具体技术、工作机制和实现协议。针对身份隐私保护研究,在讨论混币技术的基础上,对比分析中心化混币技术和去中心化混币技术的实现原理和应用特点;针对数据隐私保护研究,介绍零知识证明和环签名技术在区块链隐私保护中的应用;针对网络隐私保护研究,讨论网络数据隐藏技术和通道隔离技术。从隐私内容、隐私威胁、隐私保护机制等3个方面对身份隐私、数据隐私和网络隐私进行对比分析,并结合当前区块链应用,在系统梳理隐私保护研究新进展的基础上,展望区块链隐私保护机制的未来发展趋势。

关键词: 区块链, 隐私保护, 混币技术, 隐写, 通道隔离

Abstract: As a type of distributed ledger maintained by multiple nodes, blockchain integrates a P2P network, consensus algorithm, smart contract, and cryptography technology to build an efficient and low-cost decentralized trust mechanism in an open network environment and realizes security-related functions such as tamper-proof and anti-forgery functions. Howerer, it also faces serious data privacy disclosure. Based on an understanding of blockchain privacy and analysis of data formation involving privacy, the specific technologies, workings, and implementation protocols of blockchain privacy protection are analyzed in detail, focusing on identity, data, and network privacy. For identity privacy protection, based on discussion of the technology of currency mixing, the implementation principles and application characteristics of centralized currency mixing technology and decentralized currency mixing technology are compared and analyzed.For data privacy protection, the applications of zero-knowledge proof and ring signature technology in blockchain privacy protection are introduced.For network privacy protection, network data hiding and channel isolation technologies are discussed. This study compares and analyzes identity, data, and network privacy from three aspects:privacy content, privacy threats, and privacy protection mechanisms.It also anticipates the future development trend of the blockchain privacy protection mechanism based on a systematic review of recent progress on privacy protection combined with current blockchain applications.

Key words: blockchain, privacy protection, mixing technology, steganography, channel separation

中图分类号: