赵丙镇, 陈智雨, 闫龙川, 王栋, 玄佳兴, 蒋慧超. 基于区块链架构的电力业务交易数据隐私保护[J]. 电力系统自动化, 2021, 45(17): 20-26.
引用本文: 赵丙镇, 陈智雨, 闫龙川, 王栋, 玄佳兴, 蒋慧超. 基于区块链架构的电力业务交易数据隐私保护[J]. 电力系统自动化, 2021, 45(17): 20-26.
ZHAO Bingzhen, CHEN Zhiyu, YAN Longchuan, WANG Dong, XUAN Jiaxing, JIANG Huichao. Privacy Protection of Power Business Transaction Data Based on Blockchain Framework[J]. Automation of Electric Power Systems, 2021, 45(17): 20-26.
Citation: ZHAO Bingzhen, CHEN Zhiyu, YAN Longchuan, WANG Dong, XUAN Jiaxing, JIANG Huichao. Privacy Protection of Power Business Transaction Data Based on Blockchain Framework[J]. Automation of Electric Power Systems, 2021, 45(17): 20-26.

基于区块链架构的电力业务交易数据隐私保护

Privacy Protection of Power Business Transaction Data Based on Blockchain Framework

  • 摘要: 能源互联网的建设使得电力网络愈加开放,网络信任风险日益加剧,亟须一种兼具隐私保护和监管功能的区块链交易方案,以保证能源互联网交易的安全性及可控性。为解决传统区块链应用模式难以同时兼顾交易数据隐藏和监管这2个方面的不足,提出了一种可监管的区块链交易隐私保护模型。该模型采用概率公钥加密算法实现区块链交易用户真实身份的隐藏;利用承诺方案和零知识证明技术实现交易金额的隐私保护;借助基于身份的加密体制实现监管者对区块链交易的监督,大幅降低了存储、计算和密钥管理压力。系统应用分析表明,所提出的方案具有简单和实用的特点,能够满足业务应用的要求。

     

    Abstract: The construction of Energy Internet makes the power network more open, and the risk of network trust is increasing.There is an urgent demand for a blockchain transaction scheme with privacy protection and supervision functions to ensure the security and controllability of Energy Internet transactions. In order to solve the problem that the traditional blockchain application modes are difficult to simultaneously take into account the two aspects of transaction data hiding and supervision, a privacy protection model of blockchain transaction with supervision function is proposed. It uses the probabilistic public-key encryption algorithm to realize the hiding of the true identity of the blockchain transaction users, and uses the commitment scheme and zeroknowledge proof technology to realize the privacy protection of the transaction amounts. With the use of identity-based encryption,the supervision of blockchain transactions is realized by regulators, which greatly reduces the pressure on storage, computing and key management. System application analysis shows that the proposed scheme is simple and practical, and can meet the requirements of business applications.

     

/

返回文章
返回