引用本文:吉斌,昌力,朱丽叶,曹斌.区块链系统节点私钥泄露的电力数据防篡改方法与验证机制设计[J].电力自动化设备,2021,41(12):
JI Bin,CHANG Li,ZHU Liye,CAO Bin.Anti-tampering method and verification mechanism design of power data for private key leakage of node in blockchain system[J].Electric Power Automation Equipment,2021,41(12):
【打印本页】   【HTML】   【下载PDF全文】   查看/发表评论  【EndNote】   【RefMan】   【BibTex】
←前一篇|后一篇→ 过刊浏览    高级检索
本文已被:浏览 3206次   下载 1154  
区块链系统节点私钥泄露的电力数据防篡改方法与验证机制设计
吉斌1,2, 昌力1,2, 朱丽叶1,2, 曹斌1,2
1.南瑞集团有限公司(国网电力科学研究院有限公司),江苏 南京 211106;2.国电南瑞科技股份有限公司,江苏 南京 211106
摘要:
基于区块链技术的电力应用系统中,私钥泄露节点的签名电力数据存在被恶意篡改或伪造的风险,且当前缺乏有效的防护措施,为此,提出数据加密方法和数据交互验证机制。结合区块链基础加密技术原理,提出随机数与电力数据的组合方法,利用非对称加密算法和Hash算法进行多重加密,构造数据发出节点私钥泄露后的数据防篡改加密方法;为了防止恶意节点利用数据发出节点的私钥对电力数据进行伪造和替换,设计电力数据交互验证机制,利用数据发出节点私钥进行加密并利用接收节点公、私钥进行解密验证;抽象加、解密和数据交互验证机制的数据模型。算例分析验证了所提数据加密方法和数据交互验证机制的有效性。
关键词:  区块链  私钥泄露  加密方法  数据交互验证  防篡改  防伪造
DOI:10.16081/j.epae.202107018
分类号:TM73
基金项目:国家电网公司科技项目(5400-202011441A-0-0-00)
Anti-tampering method and verification mechanism design of power data for private key leakage of node in blockchain system
JI Bin1,2, CHANG Li1,2, ZHU Liye1,2, CAO Bin1,2
1.NARI Group Corporation(State Grid Electric Power Research Institute Co.,Ltd.),Nanjing 211106, China;2.NARI Technology Co.,Ltd.,Nanjing 211106, China
Abstract:
In the power application system based on blockchain technology, there exists a risk of malicious tampering or forgery of signature power data of node whose private key is leaked, and there is no effective protection measures at present, for which, a data encryption method and a data interactive verification mechanism are proposed. Combined with the principle of blockchain basic encryption technology, a combination method of random number and power data is proposed, and the asymmetric encryption algorithm and Hash algorithm are used for multiple encryption, and a data anti-tampering encryption method after private key leakage of data sending node is constructed. In order to prevent malicious nodes from using the private key of data sending node to forge and replace the power data, an interactive verification mechanism of power data is designed, the private key of data sending node is used for encryption, and the public and private keys of receiving node are used for decryption and verification. The data model of encryption, decryption and data interactive verification mechanism is abstracted. Example analysis verifies the effectiveness of the proposed data encryption method and data interactive verification mechanism.
Key words:  blockchain  private key leakage  encryption method  data interactive verification  anti-tampering  anti-forgery

用微信扫一扫

用微信扫一扫