基于时间控制加密与区块链的招投标系统模型研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Bidding Model Based on Timed-Release Encryption and Blockchain
  • 作者:曹淏文 ; 袁科 ; 王亚慧 ; 闫永航 ; 周黎鸣 ; 柴秀丽
  • 英文作者:CAO Haowen;YUAN Ke;WANG Yahui;YAN Yonghang;ZHOU Liming;CHAI Xiuli;School of Computer and Information Engineering,Henan University;
  • 关键词:联盟链 ; 共识算法 ; 招投标 ; 时间控制加密
  • 英文关键词:consortium blockchain;;consensus algorithm;;bidding;;time-release encryption
  • 中文刊名:HDZR
  • 英文刊名:Journal of Henan University(Natural Science)
  • 机构:河南大学计算机与信息工程学院;
  • 出版日期:2019-03-16
  • 出版单位:河南大学学报(自然科学版)
  • 年:2019
  • 期:v.49
  • 基金:国家自然科学基金(61672300,61802111);; 河南省高等学校重点科研项目基础研究计划(18A413004);; 河南省科技攻关计划(172102210189)
  • 语种:中文;
  • 页:HDZR201902013
  • 页数:8
  • CN:02
  • ISSN:41-1100/N
  • 分类号:87-94
摘要
目前的招投标活动存在标书泄密、篡改与证伪等问题.为此,提出一种基于时间控制加密与联盟链(区块链三大分支之一)的招投标系统模型.该模型采用时间控制加密技术解决标书泄密的问题,采用联盟链技术解决标书篡改和证伪问题,同时针对联盟链技术在应用时产生的区块结构与共识算法问题给出解决方案.安全分析与实验测试表明,该模型能够安全高效地解决上述问题.
        At present,there are some problems in bidding activities,such as leakage,tampering and falsification of bidding documents.To solve these problems,a bidding model was proposed based on timed-release encryption and consortium blockchain(one of the three branches of blockchain).This model used timed-release encryption to solve the problem of leaking bidding documents,and used consortium blockchain to solve the problem of tampering and falsifying bidding documents.At the same time,we gave a solution about the problem of block structure and consensus algorithm occurring in the application of consortium blockchain.Security analysis and experimental tests show that the model can solve the above problems safely and efficiently.
引文
[1]袁科,刘哲理,贾春福,等.TRE加密技术研究[J].计算机研究与发展,2014,51(6):1206-1220.YUAN K,LIU Z L,JIA C F,et al.Research on timed-release encryption[J].Journal of Computer Research and Development,2014,51(6):1206-1220.
    [2]袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494.YUAN Y,WANG F Y.Blockchain:The state of the art and future trends[J].Acta Automatica Sinica,2016,42(4):481-494.
    [3]蔡维德,郁莲,王荣,等.基于区块链的应用系统开发方法研究[J].软件学报,2017,28(6):1474-1487.CAI W D,YU L,WANG R,et al.Blockchain application development techniques[J].Journal of Software,2017,28(6):1474-1487.
    [4]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[EB/OL].http://bitcoins.info/bitcoin,2018-8-7.
    [5]LARIMER B D.Transactions as proof-of-stake[EB/OL].http://7fvhfe.com1.z0.glb.clouddn.com/wp-content/uploads/2014/01/TransactionsAsProofOfStake10.2018-8-7.
    [6]FAN C I,CHEN J C,HUANG S Y,et al.Provably secure timed-release proxy conditional re-encryption[J].IEEE Systems Journal,2015:1-12.
    [7]HONG J N,XUE K P,XUE Y J,et al.TAFC:Time and attribute factors combined access control for time-sensitive data in public cloud[EB/OL].https://ieeexplore.ieee.org/document/7878659,2018-8-7.
    [8]WATANABE Y,SHIKATA J.Timed-release computational secret sharing and threshold encryption[J].Designs Codes&Cryptography,2017,86(1):1-38.
    [9]LIU J,JAGER T,KAKVI S A,et al.How to build time-lock encryption[J].Designs,Codes and Cryptography,2018,86:2549-2586.
    [10]MERKLE R C.A digital signature based on a conventional encryption function[C]//The Conference on Advances in Cryptology.1987:369-378.
    [11]陈一稀.区块链技术的“不可能三角”及需要注意的问题研究[J].浙江金融,2016(2):17-20.CHEN Y X.Research on the“Impossible Trinity”of block chain technology and the problems should pay attention on[J].Zhejiang Finance,2016(2):17-20.
    [12]CASTRO M,LISKOV B.Practical byzantine fault tolerance and proactive recovery[J].ACM transactions on Computer Systems,2002,20(4):398-461.
    [13]LAMPORT L,REED B C,JUNQUEIRA F P,et al.In search of an understandable consensus algorithm[C]//USENIXAnnual Technical Conference.2014:305-320.
    [14]袁科,刘哲理,贾春福,等.一对多场景下的公钥时控性可搜索加密[J].电子学报,2015,43(4):760-768.YUAN K,LIU Z L,JIA C F,et al.Public key timed-release searchable encryption in one-to-many scenarios[J].Acta Electronica Sinica,2015,43(4):760-768.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700