期刊文献+

基于完整性的区块链电子存证方法研究 被引量:7

Research on the block-chain based method of electronic certificate deposit with integrity
下载PDF
导出
摘要 为了保证电子证据链的完整性,提出采用区块链和云存储的混合架构,利用电子证据文件构建默克尔树,并与案件号、存证人员身份信息共同组成区块体。以上一区块的Hash值、区块编号、区块体默克尔树根节点Hash值和存入时间戳组成区块头,将区块头和区块体共同存储到相应的区块链中,最后通过二维码实现对电子证据的检索、查询和验证。保证了电子证据真实、可溯源、不可篡改,提高电子证据的可信度。 In order to ensure the integrity of the electronic evidence chain,a hybrid architecture of block-chain and cloud storage is proposed.The electronic evidence file is used to construct the Merkel tree,and to form the block body together with the case number and the identity information of the depositor.The Hash value of the previous block,the block number,the Hash value of the block body Merkel root node,and the time stamp of the block form the block header.The block header and the block body are collectively stored in the corresponding block-chain,and finally generate the two-dimensional code.The code implements the retrieval,query and verification of electronic evidence.It ensures that electronic evidence is truly traceable,cannot be falsified,and improves the credibility of electronic evidence.
作者 李振汕 Li Zhenshan(Department of Information Engineering,Guangxi Police College,Nanning,Guangxi 530200,China)
出处 《计算机时代》 2019年第12期1-4,共4页 Computer Era
关键词 电子证据 区块链 完整性 默克尔树 electronic evidence block-chain integrity Merkel tree
  • 相关文献

参考文献4

二级参考文献54

  • 1王芳.数字证据的性质及相关规则[J].法学,2004(8):72-79. 被引量:12
  • 2李晓勇,左晓栋,沈昌祥.基于系统行为的计算平台可信证明[J].电子学报,2007,35(7):1234-1239. 被引量:35
  • 3Trusted Computing Group. TCG specification architecture overview revision1.2[EB/OL].http://www.Trusted computing group.org/,2013.
  • 4SAILER R,ZHANG X L,JAEGER T. Design and implementation of a TCG-based integrity measurement architecture[A].Berkley:USENIX Association,2004.23-28.
  • 5JAEGER T,SAILER R,SHANKAR U. PRIMA:Policy-Reduced integrity measurement architecture[A].New York:ACM,2006.19-28.
  • 6LOSCOCCO P A,WILSON P W,PENDERGRASS J A. Linux kernel integrity measurement using contextual inspection[A].New York:ACM,2007.21-29.
  • 7YAN J,ZHAO Y. Trusted attestation of behavior measurement based on Merkle hash tree[J].Journal of Computational Information Systems,2013,(9):3443-3451.
  • 8SUH G E,CLARKE D,GASSEND B. AEGIS:Architecture for tamper-evident and tamper-resistant[A].New York:ACM,2003.23-26.
  • 9CHEN L,LANDFERMANN R,LOHR H. A protecol for propertybased attestation[A].New York:ACM,2006.7-16.
  • 10WANG Q,WANG C,PEN K. Enabling public auditability and data dynamics for storage security in cloud computing[J].{H}IEEE Transactions on Parallel and Distributed Systems,2011,(5):847-859.

共引文献307

同被引文献52

引证文献7

二级引证文献12

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部