Hunion Traceability: A New Type of Blockchain Traceability System Based on SM2, SM3 and SM4

被引:2
|
作者
Zhang, Shenhui [1 ]
Meng, Hao [1 ]
Li, Xiulai [1 ,2 ]
Liu, Weiwei [3 ]
Liu, Bernie [4 ]
机构
[1] Hainan Univ, Haikou, Peoples R China
[2] Hainan Hairui Zhong Chuang Technol Co Ltd, Haikou, Peoples R China
[3] Chinese Acad Sci, SIAT, Beijing, Peoples R China
[4] HKUST, Hong Kong, Peoples R China
来源
2021 4TH INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY AND APPLICATIONS, ICBTA 2021 | 2021年
基金
海南省自然科学基金;
关键词
Blockchain; Data traceability; Data transmission security;
D O I
10.1145/3510487.3510503
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Data traceability with the great serviceability has been widely used in various scenarios. However, the existing traceability mechanism often applies internationally accepted cryptographic algorithms such as MD5 and RSA in the data transmission process. These algorithms have been confirmed to have certain loopholes in security. This paper proposes a traceability system based on SM2, SM3, and SM4 algorithms. We establish a certificate issuance verification mechanism to improve the data transmission security performance of the traceability system based on SM2 and SM3. At the same time, the system uses the SM4 algorithm to design a blockchain interaction scheme using data digest, and uses homomorphic encryption to verify the correctness of the data. In addition, we also replaced the SM2 in the system with the RSA, and the SM3 with the MD5 to test the pros and cons of the two different algorithm systems in terms of security performance and execution efficiency. The test results show that the traceability mechanism based on SM2, SM3, and SM4 performs 1-2 seconds faster than the traceability mechanism based on RSA and MD5 in terms of average transaction response time. At the same time, SM2, SM3, and SM4 also have better security performance.
引用
收藏
页码:107 / 115
页数:9
相关论文
共 50 条
  • [31] Power analysis attack of HMAC based on SM3
    Du Z.-B.
    Wu Z.
    Wang M.
    Rao J.-T.
    Tongxin Xuebao, 5 (38-43): : 38 - 43
  • [32] Synthesis and characterization of Sm2(MoO4)3, Sm2(MoO4)3/GO and Sm2(MoO4)3/C3N4 nanostructures for improved photocatalytic performance and their anti-cancer the MCF-7 cells
    Behvandi, Shahrzad
    Sobhani-Nasab, Ali
    Karimi, Mohammad Ali
    Sohouli, Esmail
    Karimi, MeisamSadeghpour
    Ganjali, Mohammad Reza
    Ahmadi, Farhad
    Rahimi-Nasrabadi, Mehdi
    POLYHEDRON, 2020, 180
  • [33] Improvements of SM4 algorithm and application in Ethernet encryption system based on FPGA
    Key Laboratory of Electronic Engineering, University of Heilongjiang, 74 Xuefu Road, Harbin, Heilongjiang, China
    J. Inf. Hiding Multimedia Signal Proces., 3 (518-526):
  • [34] High-speed Encryption & Decryption System Based on SM4 Algorithm
    Lv Qian
    Li Li
    Cao Yan-yan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 1 - 8
  • [35] 基于SM3并行实现的SM2-KDF快速实现算法
    陈学雷
    付勇
    王美琴
    密码学报, 2023, 10 (04) : 813 - 822
  • [36] A New Transparent File Encryption Method Based on SM4 for Android Platform
    Li, Yuheng
    Li, Yongzhong
    Zhang, Shipeng
    ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 520 - 531
  • [37] 基于I-SM4和SM2的混合加密算法
    孙敏
    陕童
    续森炜
    计算机科学, 2023, 50(S2) (S2) : 869 - 872
  • [38] Design of Identity Authentication Scheme for Dynamic Service Command System Based on SM2 Algorithm and Blockchain Technology
    Deng, Jie
    Jiao, Lili
    Zhang, Lili
    Ren, Yongjin
    Yin, Wengang
    ADVANCES IN INTERNET, DATA & WEB TECHNOLOGIES (EIDWT-2022), 2022, 118 : 31 - 37
  • [39] Finding Differential Characteristics of SM4 Algorithm Based on MILP
    Pan Y.
    Wang G.
    Ni J.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (10): : 2299 - 2308
  • [40] Efficient implementation scheme of SM4 algorithm based on FPGA
    Zhang, Hongke
    Yuan, Haonan
    Ding, Wenxiu
    Yan, Zheng
    Li, Bin
    Liang, Dong
    Tongxin Xuebao/Journal on Communications, 2024, 45 (05): : 140 - 150