计算机科学与探索 ›› 2020, Vol. 14 ›› Issue (12): 2039-2049.DOI: 10.3778/j.issn.1673-9418.1912056

• 网络与信息安全 • 上一篇    下一篇

抗货币失效的区块链钱包保护协议研究

周健,孙丽艳,付明   

  1. 1. 安徽财经大学 管理科学与工程学院,安徽 蚌埠 233041
    2. 北京邮电大学 计算机学院,北京 100083
  • 出版日期:2020-12-01 发布日期:2020-12-11

Research on Wallet Protection Against Currency Failure in Blockchain

ZHOU Jian, SUN Liyan, FU Ming   

  1. 1. School of Management Science and Engineering, Anhui University of Finance and Economics, Bengbu, Anhui 233041, China
    2. School of Computer Science, Beijing University of Posts and Telecommunications, Beijing 100083, China
  • Online:2020-12-01 Published:2020-12-11

摘要:

区块链钱包保护是区块链中的安全交易基础,私钥是钱包安全的核心,私钥不能基于可靠第三方进行保护,因此私钥丢失或被盗将导致客户财产的损失。针对该问题,提出一种分布式钱包保护和恢复机制,通过门限密钥机制根据网络规模将钱包私钥分成多份密钥碎片,即使密钥持有者离线,门限数量的持有者为新成员分配密钥碎片,保持密钥碎片更新的同步,当密钥丢失后,超过区块链成员规模半数的私钥碎片能够保证私钥的恢复,动态的门限机制设计使得攻击者必须成功攻击半数成员以上才能窃取钱包私钥。基于哈希值的碎片密钥树能够快速检测出规模小于规定数量的密钥碎片,消除网络中失效的密钥碎片,保证全局私钥的完整性。建议方案证明通过安全存储方式保护钱包是可行的。

关键词: 区块链, 钱包, 门限密钥, 分布式存储, 安全

Abstract:

The protection of blockchain wallet is the basis of secure transaction in blockchain. Private key is the core of wallet security. The private key cannot be protected based on a reliable third party. Therefore, the loss or theft of private key will lead to the loss of customer property.  To solve this problem, a distributed protection and recovery mechanism is proposed. Every wallet private key is divided into multiple key fragments by threshold key mechanism according to the network scale. Even if the wallet is offline, the threshold number of holders holding key fragements from the wallet cooperates to distribute key fragments to new members, which keeps the update of key fragments synchronized. When the key is lost, the number of private key fragments exceeding the threshold of half the blockchain member scale can ensure the recovery of the private key. The dynamic threshold mechanism design makes the attacker must attack more than half of the members to steal the wallet private key successfully. The hash based shard key tree can quickly detect the number of key fragments smaller than the specified size, the invalid key fragments are detected and eliminated efficiently in the network, and the integrity of the global private key is guaranteed. The suggested method of wallet protection is feasible from the aspect of secure storage.

Key words: blockchain, wallet, threshold cryptography, distributed storage, security