区块链在隐私计算中的应用研究进展Application Research and Progress of Blockchain in Privacy Computing
刘炜;唐琮轲;马杰;刘宇昭;田钊;佘维;
摘要(Abstract):
大数据时代背景下,数据安全面临严峻挑战,隐私计算能够解决这一问题。隐私计算是在保护数据不外泄的前提下实现对数据计算分析的信息技术。区块链拥有不可篡改、可追溯等特性,将区块链应用在隐私计算中,发挥其优势,实现技术多元应用。首先介绍区块链和隐私计算的相关技术,分析隐私计算所面临的问题以及区块链赋能隐私计算;其次总结现有的区块链应用在多方安全计算、联邦学习、可信执行环境中的研究理论进展;最后展望区块链应用在隐私计算中的发展趋势。
关键词(KeyWords): 隐私计算;多方安全计算;联邦学习;可信执行环境;区块链
基金项目(Foundation): 国家自然科学基金项目(62176239);; 河南省高校科技创新人才支持计划(21HASTIT031);; 河南省重大公益专项(201300210300);; 河南省高等学校青年骨干教师培养计划(2019GGJS018);; 河南省重点研发与推广专项(212102310039,212102310554);; 郑州大学教育教学改革研究与实践项目(2021ZZUJGLX168)
作者(Authors): 刘炜;唐琮轲;马杰;刘宇昭;田钊;佘维;
DOI: 10.13705/j.issn.1671-6841.2022109
参考文献(References):
- [1] 中华人民共和国国务院.中共中央国务院关于构建更加完善的要素市场化配置体制机制的意见[EB/OL].(2020-04-09)[2021-12-21].http://www.gov.cn/zhengce/2020-04/09/content_5500622.htm.STATE COUNCIL OF THE PEOPLE′S REPUBLIC OF CHINA.Opinions of the central committee and the state council on building a more perfect market-oriented system and mechanism for the allocation of factors of production[EB/OL].(2020-04-09)[2021-12-21].http://www.gov.cn/zhengce/2020-04/09/content_5500622.htm.
- [2] 许健,关杏元,刘曦子,等.基于区块链和多方安全计算技术的联合征信应用[J].银行家,2021(7):116-118.XU J,GUAN X Y,LIU X Z,et al.Joint credit investigation application based on block chain and multi-party secure computing technology [J].Banker,2021(7):116-118.
- [3] 严强.区块链+隐私计算:科技驱动数据安全体系建设[J].金融电子化,2021(7):43-45.YAN Q.Blockchain+privacy computing:technology driving data security system construction [J].Electronic finance,2021(7):43-45.
- [4] 黄舍予.隐私计算+区块链:让数据真正成为生产要素[N/OL].人民邮电,2021-09-15(3)[2021-12-20].DOI:10.28659/n.cnki.nrmyd.2021.003020.HUANG S Y.Privacy computing+blockchain:make data a real factor of production [N/OL].Posts and telecommunications,2021-09-15(3)[2021-12-20].DOI:10.28659/n.cnki.nrmyd.2021.003020.
- [5] 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494.YUAN Y,WANG F Y.Development status and prospect of blockchain technology [J].Acta automatica sinica,2016,42(4):481-494.
- [6] 戴安博,陈恭亮.POW区块链共识算法分析与展望[J].通信技术,2019,52(12):2839-2845.DAI A B,CHEN G L.Analysis and prospect of CONSENSUS algorithm of POW blockchain [J].Communications technology,2019,52(12):2839-2845.
- [7] 刘懿中,刘建伟,喻辉.区块链共识机制研究:典型方案对比[J].中兴通讯技术,2018,24(6):2-7.LIU Y Z,LIU J W,YU H.Research on blockchainconsensus mechanism:comparison of typical schemes [J].ZTE communications technology,2018,24(6):2-7.
- [8] 张雅萍,任秀丽.基于配对制度的DPoS共识机制[J].计算机应用研究,2021,38(10):2909-2914.ZHANG Y P,REN X L.DPoS Consensus mechanism based on pairing system [J].Computer application research,2021,38(10):2909-2914.
- [9] 方维维,王子岳,宋慧丽.一种面向区块链的优化PBFT共识算法[J].北京交通大学学报,2019,43(5):58-64.FANG W W,WANG Z Y,SONG H L.An optimized PBFT consensus algorithm for blockchain [J].Beijing jiaotong university,2019,43(5):58-64.
- [10] GARTNER.Gartner releases key strategic technology trends for 2021[EB/OL].(2020-10-20) [2022-04-01].https://www.gartner.com/cn/new sroom/press-releases/2021-top-strategictechnologies-cn.
- [11] YAO A C.Protocols for secure computations[C]//Proceedings of the 23rd Annual Symposium on Foundations of Computer Science.Piscataway:IEEE Press,1982:160-164.
- [12] GOLDREICH O,MICALI S,WIGDERSON A.How to play any mental game[C]//Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing.New York:ACM Press,1987:218-229.
- [13] RIVEST R L,ADLEMAN L,DERTOUZOS M L.On data banks and privacy homomorphisms[J].Foundations of secure computation,1978,4(11):169-180.
- [14] 李浪,余孝忠,杨娅琼.同态加密研究进展综述[J].计算机应用研究,2015,32(11):3209-3214.LI L,YU X Z,YANG Y Q.A review of homomorphic encryption [J].Computer application research,2015,32(11):3209-3214.
- [15] 陈智罡,王箭,宋新霞.全同态加密研究[J].计算机应用研究,2014,31(6):1624-1631.CHEN Z G,WANG J,SONG X X.Research on homomorphic encryption [J].Computer application research,2014,31(6):1624-1631.
- [16] 刘明洁,王安.全同态加密研究动态及其应用概述[J].计算机研究与发展,2014,51(12):2593-2603.LIU M J,WANG A.Research trends and applications of homomorphic encryption [J].Computer research and development,2014,51(12):2593-2603.
- [17] 杨攀,桂小林,姚婧.支持同态算术运算的数据加密方案算法研究[J].通信学报,2015,36(1):171-182.YANG P,GUI X L,YAO J.Research on algorithmof data encryption scheme supporting homomorphic arithmetic operation [J].Journal of communications,2015,36(1):171-182.
- [18] SHAMIR A.How to share a secret[J].Communications of the ACM,1979,22(11):612-613.
- [19] BLAKLEY G R.Safeguarding cryptographic keys[C]//International Workshop on Managing Requirements Knowledge.Piscataway:IEEE Press,1979:313-313.
- [20] RABIN M O.How to exchange secrets with oblivious transfer[J].Cryptology ePrint archive,2005,2005:187.
- [21] EVEN S,GOLDREICH O,LEMPEL A.A randomized protocol for signing contracts[J].Communications of the ACM,1985,28(6):637-647.
- [22] BEAVER,D.Precomputing oblivious transfer [C]//Annual International Cryptology Conference.Berlin:Springer Press,1995:97-109.
- [23] 徐秋亮,蒋瀚,赵圣楠.多方安全计算关键技术:茫然传输协议[J].山东大学学报(理学版),2021,56(10):61-71.XU Q L,JIANG H,ZHAO S N.Key technology of secure multi-party computing:dazed transport protocol [J].Journal of Shandong university (natural science),2021,56(10):61-71.
- [24] GOLDREICH O.Foundation of crytography:basic tools[M].New York:Cambridge University Press,2000.
- [25] LINDELL Y,PINKAS B.A proof of security of Yao′s protocol for two-party computation[J].Journal of cryptology,2009,22(2):161-188.
- [26] BELLARE M,HOANG V T,ROGAWAY P.Foundations of garbled circuits[C]//Proceedings of the ACM Conference on Computer and Communications Security.New York:ACM Press,2012:784-796.
- [27] 石聪聪,高先周,黄秀丽.联邦学习隐私模型发布综述[J].南京信息工程大学学报(自然科学版),2022,14(2):127-136.SHI C C,GAO X Z,HUANG X L.Survey on private model publishing for federated learning[J].Journal of Nanjing university of information science & technology (natural science edition),2022,14(2):127-136.
- [28] 冯登国,刘敬彬,秦宇.创新发展中的可信计算理论与技术[J].中国科学:信息科学,2020,50(8):1127-1147.FENG D G,LIU J B,QIN Y.Trusted computing theory and technology in innovation development [J].Science China:information science,2020,50(8):1127-1147.
- [29] OMTP.OMTP advanced trusted environment OMTP TR1v1[EB/OL].(2009-05-28)[2022-04-10].http://www.omtp.org/OM TP_Advanced_Trusted_Environment_OM TP_TR1_v1_1.pdf.
- [30] COSTAN V,DEVADAS S.Intel SGX explained[J].Cryptology ePrint archive,2016,2016:86.
- [31] XING B C,SHANAHAN M,LESLIE-HURD R.Intel? software guard extensions (Intel? SGX) software support for dynamic memory allocation inside an enclave[C]//Proceedings of the Hardware and Architectural Support for Security and Privacy.New York:ACM Press,2016:1-9.
- [32] ANT GROUP.Confidential computing cloud service[EB/OL].(2020-10-16)[2021-12-21].https://www.ibm.com/cloud/learn/confidential-computing.
- [33] ARM.TrustZone [EB/OL].(2015-08-02) [2021-12-21].http://www.arm.com/zh/products/processors/technologies/trustzone/index.php.3.
- [34] 黄强,张德华,汪伦伟.可信计算硬件设备虚拟化关键保障机制研究[J].信息网络安全,2015(9):70-73.HUANG Q,ZHANG D H,WANG L W.Research on key guarantee mechanism of trusted computing hardware device virtualization [J].Information network security,2015(9):70-73.
- [35] 范冠男,董攀.基于TrustZone的可信执行环境构建技术研究[J].信息网络安全,2016(3):21-27.FAN G N,DONG P.Research on construction technology of trusted execution environment based on trustzone [J].Information network security,2016(3):21-27.
- [36] 刘炜,彭宇飞,田钊.基于区块链的医疗信息隐私保护研究综述[J].郑州大学学报(理学版),2021,53(2):1-18.LIU W,PENG Y F,TIAN Z.A review of medical information privacy Protection based on blockchain [J].Journal of Zhengzhou university (natural science edition),2021,53(2):1-18.
- [37] WANG N,CHAU S,ZHOU Y.Privacy-preserving energy storage sharing with blockchain and secure multi-party computation[J].ACM SIGENERGY energy informatics review,2021,1(1):32-50.
- [38] 朱岩,宋晓旭,薛显斌.基于多方安全计算的区块链智能合约执行系统[J].密码学报,2019,6(2):246-257.ZHU Y,SONG X X,XUE X B.Intelligent contract execution system based on secure multi-party computation in blockchain [J].Journal of cryptologic research,2019,6(2):246-257.
- [39] 王童,马文平,罗维.基于区块链的信息共享及多方安全计算模型[J].计算机科学,2019,46(9):162-168.WANG T,MA W P,LUO W.Information sharing and secure multi-party computing model based on block chain [J].Computer science,2019,46(9):162-168.
- [40] PARTHASARATHY S,HARIKRISHNAN A,NARAYANAN G,et al.Secure distributed medical record storage using blockchain and emergency sharing using multi-party computation[C]//The 11th IFIP International Conference on New Technologies,Mobility and Security.New York:IEEE Press,2021:1-5.
- [41] ZHOU J P,FENG Y X,WANG Z Y,et al.Using secure multi-party computation to protect privacy on a permissioned blockchain[J].Sensors,2021,21(4):1540.
- [42] 刘峰,杨杰,李志斌.一种基于区块链的泛用型数据隐私保护的多方安全计算协议[J].计算机研究与发展,2021,58(2):281-290.LIU F,YANG J,LI Z B.A generic secure multi-party computing protocol for data privacy protection based on block chain [J].Computer research and development,2021,58(2):281-290.
- [43] PEDERSEN T P.Non-interactive and information-theoretic secure verifiable secret sharing[C]//Annual International Cryptology Conference.Berlin:Springer Press,1991:129-140.
- [44] SCHNORR C P.Efficient identification and signatures for smart cards[C]//Conference on the Theory and Application of Cryptology.Berlin:Springer Press,1989:239-252.
- [45] BONEH D,LYNN B,SHACHAUL H.Short signatures from the Weil pairing[C]//International Conference on the Theory and Application of Cryptology and Information Security.Berlin:Springer Press,2001:514-532.
- [46] WANG J,SHEN Y,WANG B.Sealed-bid auction scheme based on blockchain and secure multi-party computation[C]//The 5th Information Technology,Networking,Electronic and Automation Control Conference.Piscataway:IEEE Press,2021:407-412.
- [47] ALFELD S,ZHU X J,BARFORD P.Data poisoning attacks against autoregressive models[C]//Proceedings of the AAAI Conference on Artificial Intelligence.Palo Alto:AAAI Press,2016:1452-1458.
- [48] LI B,WANG Y N,SINGH A.et al.Data poisoning attacks on factorization-based collaborative filtering[C]//International Conference on Neural Information Processing Systems.New York:ACM Press,2016:1893-1901.
- [49] KIM H,PARK J,BENNIS M,et al.Blockchained on-device federated learning[J].IEEE communications letters,2019,24(6):1279-1283.
- [50] 于秋雨,卢清华,张卫山.基于区块链的工业物联网联邦学习系统架构[J].计算机系统应用,2021,30(9):69-76.YU Q Y,LU Q H,ZHANG W S.Architecture of industrial IoT federated learning system based on block chain [J].Computer system application,2021,30(9):69-76.
- [51] QI Y,HOSSAIN M S,NIE J,et al.Privacy-preserving blockchain-based federated learning for traffic flow prediction[J].Future generation computer systems,2021,117:328-337.
- [52] POLAP D,SRIVASTAVA G,YU K.Agent architecture of an intelligent medical system based on federated learning and blockchain technology[J].Journal of information security and applications,2021,58:102748.
- [53] FENG L,ZHAO Y Q,GUO S Y,et al.BAFL:a blockchain-based asynchronous federated learning framework[J].IEEE transactions on computers,2021,71(5):1092-1103.
- [54] LIU Y,SUN S,AI Z P.FedCoin:a peer-to-peer payment system for federated learning[EB/OL].(2020-02-26)[2021-12-10].https://arxiv.org/abs/2022.11711.
- [55] JIA R,DAO D,WANG B,et al.Towards efficient data valuation based on the shapley value[C]//The 22nd International Conference on Artificial Intelligence and Statistics.New York:PMLR,2019:1167-1176.
- [56] KORKMAZ C,KOCAS H E,UYSAL A,et al.Chain FL:decentralized federated machine learning via blockchain[C]//The Second International Conference on Blockchain Computing and Applications.Piscataway:IEEE Press,2020:140-146.
- [57] KUMAR R,KHAN A A,KUMAR J,et al.Blockchain-federated-learning and deep learning models for COVID-19 detection using CT imaging[J].IEEE sensors journal,2021,21(14):16301-16314.
- [58] LALONDE R,BAGCI U.Capsules for object segmentation[EB/OL].(2018-04-11)[2021-12-10].https://arxiv.org/1804.04241.
- [59] SABOUR S,FROSST N,HINTON G E.Dynamic routing between capsules[C]//International Conference on Neural Information Processing Systems.New York:ACM Press,2017:3859-3869.
- [60] ZHANG W,LU Q,YU Q,et al.Blockchain-based federated learning for device failure detection in industrial IoT[J].IEEE internet of things journal,2020,8(7):5926-5937.
- [61] ZHU X,BADR Y.A survey on blockchain-based identity management systems for the Internet of Things[C]//International Conference on Internet of Things.Piscataway:IEEE Press,2018:1568-1573.
- [62] PARK M,KIM J,KIM Y,et al.An SGX-based key management framework for data centric networking[C]//International Workshop on Information Security Applications.Cham:Springer International Publishing,2019:370-382.
- [63] AHMAD A,KIM K,M.SARFARAZ I,et al.OBLIVIATE:a data oblivious file system for Intel SGX[C]//The Network and Distributed System Security Symposium.Reston:Internet Society,2018:1-15.
- [64] AYOADE G,KARANDE V,KHAN L,et al.Decentralized IoT data management using blockchain and trusted execution environment[C]//International Conference on Information Reuse and Integration.Piscataway:IEEE Press,2018:15-22.
- [65] SIRIS V A,DIMOPOULOS D,FOTIOU N,et al.IoT resource access utilizing blockchains and trusted execution environments[C]//Global IoT Summit.Piscataway:IEEE Press,2019:1-6.
- [66] WANG Y,LI J,ZHAO S Y,et al.Hybridchain:a novel architecture for confidentiality-preserving and performant permissioned blockchain using trusted execution environment[J].IEEE access,2020(8):190652-190662.
- [67] ZHANG Y X,L Y,FANG L,et al.Privacy-protected electronic voting system based on blockchain and trusted execution environment[C]//The 5th International Conference on Computer and Communications.Piscataway:IEEE Press,2019:1252-1257.
- [68] MADDALI L,THAKUR M S D,VIGNESWARAN R,et al.VeriBlock:a novel blockchain framework based on verifiable computing and trusted execution environment[C]//International Conference on Communication Systems & Networks.Piscataway:IEEE Press,2020:1-6.
- [69] WANG D W,CHEN X,WU H Q,et al.A blockchain-based vehicle-trust management framework under a crowdsourcing environment[C]//The 19th International Conference on Trust,Security and Privacy in Computing and Communications.Piscataway:IEEE Press,2020:1950-1955.
- [70] KOTLA R,ALVISI L,DAHLIN M,et al.Zyzzyva:speculative byzantine fault tolerance[C]//Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles.New York:ACM Press,2007:45-58.
- [71] ENKHTAIVAN B,TAKENOUCHI T,SAKO K.A fair anonymous auction scheme utilizing trusted hardware and blockchain[C]//The 17th International Conference on Privacy,Security and Trust.Piscataway:IEEE Press,2019:1-5.
- [72] SU G X,YANG W Y,LUO Z D,et al.BDTF:a blockchain-based data trading framework with trusted execution environment[C]//The 16th International Conference on Mobility,Sensing and Networking.Piscataway:IEEE Press,2020:92-97.