Abstract
As the core of the blockchain, reliable key management is the necessary guarantee for the security of the blockchain business. However, existing key management methods of blockchain mainly include local storage, offline storage, and wallet storage, and cannot meet the requirements of security, ease of use, and cost at the same time. Moreover, the key management scheme of the blockchain itself lacks a secure and efficient solution to manage the user’s key. In addition, the situation of collaborative signatures should be considered in the blockchain to meet the needs of users. To this end, secure multi-party computation (SMPC) is the most used technology, and the security of these schemes can be further improved. In order to improve the security and efficiency of blockchain key management and meet the needs of collaborative work, key hierarchical management and collaborative signature schemes incorporating SMPC and feature encryption are proposed. In this scheme, the keys are divided into three layers, and the keys of the upper layer are used to encrypt the keys of the lower layer, thus ensuring the security of all keys. Moreover, the processes of key generation, recovery, revocation and update, and multi-party signature are designed in detail. Compared with other schemes through theory analysis and experiment, our schemes can reduce the file-sharing time and the storage overhead of the user. This can improve the utilization of system resources and system efficiency, while ensuring a high level of security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Albakri, A., Harn, L., Maddumala, M.: Polynomial-based lightweight key management in a permissioned blockchain. In: CNS, pp. 1–9. IEEE (2019)
Ali, M.S., Dolui, K., Antonelli, F.: IoT data privacy via blockchains and IPFS. In: IOT, pp. 14:1–14:7. ACM (2017)
Barkol, O., Ishai, Y., Weinreb, E.: On d-multiplicative secret sharing. J. Cryptol. 23(4), 580–593 (2010)
Benaloh, J.C.: Secret sharing homomorphisms: keeping shares of a secret secret (extended abstract). In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 251–260. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7_19
Department, I.S.: Digital money wallet security white paper. https://www.anquanke.com/post/id/146233. Accessed 17 Sep 2020
Dodis, Y., Reyzin, L., Smith, A.: Fuzzy extractors: how to generate strong keys from biometrics and other noisy data. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523–540. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-24676-3_31
Fan, K., Lou, S., Su, R., Li, H., Yang, Y.: Secure and private key management scheme in big data networking. Peer Peer Netw. Appl. 11(5), 992–999 (2018)
Kingo: Classification and comparative analysis of bitcoin wallets. https://www.8btc.com/article/30431. Accessed 17 Sep 2020
Lei, A., Cruickshank, H.S., Cao, Y., Asuquo, P.M., Ogah, C.P.A., Sun, Z.: Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J. 4(6), 1832–1843 (2017)
Levent, E., Manpreet, K., Gudise, V.A.K.R.: Implementation and performance analysis of PBKDF2, Bcrypt, Scrypt algorithms. In: Proceedings of the ICWN, p. 66. The Steering Committee of WorldComp (2016)
Liu, J., Ping, J., Fu, X.: Research on a distributed public key system based on blockchain. Netinfo Secur. 18(8), 25–33 (2018)
Lou, J., Zhang, Q., Qi, Z., Lei, K.: A blockchain-based key management scheme for named data networking. In: 2018 1st IEEE International Conference on HotICN, pp. 141–146. IEEE (2018)
Ma, C.: Method and system for implementing blockchain private key protection based on key segmentation. China Patent CN106548345A (March 2017)
Ma, M., Shi, G., Li, F.: Privacy-oriented blockchain-based distributed key management architecture for hierarchical access control in the IoT scenario. IEEE Access 7, 34045–34059 (2019)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Xia, D., Wei, Z., Xu, K., Xu, J., Liu, X., Bi, W.: Energy blockchain private key storage algorithm based on image information hiding. Power Syst. Autom. 31(1), 7–11 (2019)
Yao, A.C.: Protocols for secure computations (extended abstract). In: FOCS, pp. 160–164. IEEE Computer Society (1982)
Zhang, H., Wang, J., Ding, Y.: Blockchain-based decentralized and secure keyless signature scheme for smart grid. Energy 180, 955–967 (2019)
Zhao, H., Bai, P., Peng, Y., Xu, R.: Efficient key management scheme for health blockchain. CAAI Trans. Intell. Technol. 3(2), 114–118 (2018)
Zhao, H., Zhang, Y., Peng, Y., Xu, R.: Lightweight backup and efficient recovery scheme for health blockchain keys. In: ISADS, pp. 229–234. IEEE Computer Society (2017)
Acknowledgement
The authors acknowledge the support from National Key R&D Program of China under Grant No. 2017YFB1400700, National Natural Science Foundation of China under Grant No. 61772514 and Beijing Municipal Science & Technology Commission (Project Number: Z191100007119006).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Zhang, R., Li, Z., Zheng, L. (2021). Secure and Efficient Key Hierarchical Management and Collaborative Signature Schemes of Blockchain. In: Sun, X., Zhang, X., Xia, Z., Bertino, E. (eds) Artificial Intelligence and Security. ICAIS 2021. Lecture Notes in Computer Science(), vol 12737. Springer, Cham. https://doi.org/10.1007/978-3-030-78612-0_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-78612-0_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-78611-3
Online ISBN: 978-3-030-78612-0
eBook Packages: Computer ScienceComputer Science (R0)