• <tr id="yyy80"></tr>
  • <sup id="yyy80"></sup>
  • <tfoot id="yyy80"><noscript id="yyy80"></noscript></tfoot>
  • 99热精品在线国产_美女午夜性视频免费_国产精品国产高清国产av_av欧美777_自拍偷自拍亚洲精品老妇_亚洲熟女精品中文字幕_www日本黄色视频网_国产精品野战在线观看 ?

    Distributed Secure Storage Scheme Based on Sharding Blockchain

    2022-03-14 09:22:38JinWangChenchenHanXiaofengYuYongjunRenandSimonSherratt
    Computers Materials&Continua 2022年3期

    Jin Wang,Chenchen Han,Xiaofeng Yu,Yongjun Ren and R.Simon Sherratt

    1School of Computer Science and Mathematics,Fujian University of Technology,Fuzhou,350118,China

    2School of Computer&Communication Engineering,Changsha University of Science&Technology,Changsha,410004,China

    3School of Business,Nanjing University,Nanjing,210093,China

    4School of Computer,School of Software,School of Cyberspace Security,Engineering Research Center of Digital Forensics,Ministry of Education,Nanjing University of Information Science&Technology,Nanjing,210044,China

    5Department of Biomedical Engineering,University of Reading,RG6 6AY,UK

    Abstract: Distributed storage can store data in multiple devices or servers to improve data security.However, in today’s explosive growth of network data, traditional distributed storage scheme is faced with some severe challenges such as insufficient performance, data tampering, and data lose.A distributed storage scheme based on blockchain has been proposed to improve security and efficiency of traditional distributed storage.Under this scheme,the following improvements have been made in this paper.This paper first analyzes the problems faced by distributed storage.Then proposed to build a new distributed storage blockchain scheme with sharding blockchain.The proposed scheme realizes the partitioning of the network and nodes by means of blockchain sharding technology,which can improve the efficiency of data verification between nodes.In addition,this paper uses polynomial commitment to construct a new verifiable secret share scheme called PolyVSS.This new scheme is one of the foundations for building our improved distributed storage blockchain scheme.Compared with the previous scheme, our new scheme does not require a trusted third party and has some new features such as homomorphic and batch opening.The security of VSS can be further improved.Experimental comparisons show that the proposed scheme significantly reduces storage and communication costs.

    Keywords: Blockchain; distributed storage; verifiable secret share polynomial commitment

    1 Introduction

    Traditional centralized storage systems use centralized storage servers to store all data, which places high requirements on server performance, including reliability and security.At the same time, with the explosive growth of network data, centralized storage systems cannot satisfy the needs of large-scale applications.As a peer-to-peer storage method, distributed storage is gradually replacing traditional storage methods [1,2].Distributed storage is to distribute data to multiple data storage servers to share the load to improve data security and storage efficiency.Nowadays,distributed storage has been widely used and favored by many companies.Common distributed storage systems, such as an efficient and scalable distributed file storage system called GFS proposed by Google.

    However, distributed storage still has some problems in data security and system performance:

    1)Data security.Data security is always a hot topic.When network failure or equipment abnormality occurs, data may be lost.The user may lose part or all of the data.In addition, some malicious attackers will also steal or tamper with the stored data.

    2)Data management.Usually, the data is stored in different devices or servers.Different servers may have different data types, which is inconvenient for data management.In addition, because the update is not timely, the software version number may be different.

    3)Performance issues.The performance of distributed storage mechanisms is equally important.Such as capacity expansion and network optimization.

    The combination of blockchain and distributed storage technology in the database provides a way to solve the above problem.The distributed storage system based on the blockchain can be used to securely store all kinds of data, and can be applied to fields such as smart grid, smart home, and Internet of Vehicles.As the underlying technology of Bitcoin, blockchain has received widespread attention due to its strong security characteristics [3].Blockchain was originally used to construct cryptocurrency.Because the blockchain has the characteristics of anti-tampering,openness and transparency, it was subsequently regarded as one of the methods to construct a secure data storage scheme [4-6].The blockchain itself is a distributed setting, but because of the Merkle tree structure used in data storage, it needs to pay more storage costs when dealing with large-scale applications.

    Secret share combined with blockchain has some applications such as electronic voting,consensus algorithms, and P2P storage scheme [7-10].Such a scheme usually requires the participation of a Dealer, and we cannot guarantee that the Dealer is credible.This paper proposes an improved verifiable secret share scheme based on polynomial commitment without Dealer to replace the secret share scheme in distributed storage blockchain.

    The specific contributions of this paper are as follows:

    (1) This paper proposes a verifiable secret share scheme based on polynomial commitment(PolyVSS, for short).Compared with the previous scheme, our new scheme does not require a trusted third party and has homomorphic characteristics.

    (2) Use PolyVSS to construct a distributed storage scheme based on blockchain.This scheme uses sharding technology to realize the partitioning of nodes and transactions.Experimental comparisons show that the proposed scheme can reduce storage and communication costs.

    The structure of this paper is as follows.In Section 2, we introduce the related work of this paper.In Section 3, we first give the structure of a distributed storage blockchain based on PolyVSS.Section 4 introduces the proposed PolyVSS and analyzes its security.In Section 5, we analyzed the performance of the distributed storage blockchain and summarized in Section 6.

    2 Related Work

    2.1 Verifiable Secret Share

    Secret share is one of the important research directions of modern cryptography.The earliest secret share scheme was proposed by Shamir.In their scheme, there is a dealer who is responsible for dividing a secret intonparts and distributing them tonmembers.After knowing anytor more shares (t≤n), these members can reconstruct the secret.

    Due to the excessive trust given to the dealer, we cannot guarantee that the dealer will not have malicious behavior.To prevent the dealer from malicious behavior, verifiable secret share(VSS) is proposed [11].Verifiable secret share is based on secret share, adding a step of share verification.To put it simply, members verify the legitimacy of the secret distributed by the dealer.An important feature of VSS is unconditional privacy.This feature prevents the shared information from being obtained by a collection of members without permission.In addition to VSS, some practical variants of VSS schemes have been proposed, such as verifiable multi-secret share [12], non-interactive verifiable secret share, and public verifiable secret share.

    Harin et al.[13,14] gave the formal definition of (n, t, n) secret share.In this scheme,nshare-holders participate in sharing a master secret together, and everyone can randomly select a sub-secret and use an algorithm to generate sub-shares.Then using the homomorphic feature,each shareholder can combine all the sub-shares into the master share.Finally, the master share can be restored to the master secret through the reconstruction algorithm.

    2.2 Polynomial Commitment

    The concept of commitment is at the core of almost all modern cryptographic protocol constructions.In this case, making a commitment simply means that a participant in the protocol can choose a value from a certain (limited) set and commit to his choice so that he can no longer change his mind.However, he does not have to reveal his choice (although he may choose to reveal it at some point in the future).Cryptography commitment has been applied to the blockchain.Zerocoin [15] uses Pedersen commitment to bind a series of numberssto Zerocoinz.The commitment C is as follows:

    wherepis unknown.Given the generatorsgandh, the user randomly selects the random numberssandz, and the commitment C can be calculated.It is difficult to calculate the random numberssandzwhen only knowing the commitment C, even if one of them is revealed.In addition to this, Kate et al.[16] proposed the first efficient polynomial commitment, which was subsequently used to construct a blockchain-based zero-knowledge proof protocol.Their scheme has the characteristics of a static accumulator.Next, we will introduce the construction of polynomial commitment:

    The polynomial commitment scheme is constructed based on bilinear pairing.First, we useG=〈e,G,GT〉to represent the generation of bilinear groups (see Definition 6).The algorithm of polynomial commitment can be divided into four phases:

    1) Initialization phase:

    This step mainly generates a public-private key pair 〈pk,sk〉, where the public key is expressed aspk=〈G,g,g?,g?2...,g?n〉.The private keysk=?cannot be used in the next steps.

    2) Commit phase:

    Calculate the corresponding commitmentC=gF(?)∈G.Since the polynomial can be expressed asx=the commitment can also be written as:

    3) Open phase:

    This step opens the committed polynomialC.

    4) Verify phase:

    At this phase, the verifier first needs to verify the legitimacy of the commitment:

    If the equation holds, the verification passes.Otherwise, it fails.Then output a triple〈α,F(α),ωα〉, whereωα=gfα(?)is the witness in the indexα.gfi(?)satisfies:

    Finally, verify the evaluation in the indexα:

    If the equation holds, the verification passes.Otherwise, it fails.

    Suppose there is an adversaryΘ.The polynomial commitment satisfies the three characteristics of polynomial binding, evaluation binding, and computational hiding:

    Polynomial Binding.We say that the polynomial commitment is polynomial binding if it is satisfied:

    Evaluation Binding.We say that the polynomial commitment is evaluation binding, if it is satisfied:

    Computational Hiding.Assuming there is an adversaryΘ, given 〈pk,C〉 and 〈iυ,F(iυ),ωFαυ〉.Where 1 ≤υ≤deg(F), and for eachυ, the verify phase can be verified successfully.No adversaryΘcan determineF(?υ)with non-negligible probability for any un-queried index ?υ.

    In addition, the polynomial commitment also satisfies strong correctness, the proof of which has been given in the paper [16].

    3 The Proposed Distributed Storage Scheme Based on Sharding Blockchain

    3.1 System Model of Distributed Storage Scheme Based on Blockchain

    Before introducing the system model of DSB, we first introduce a few related notions.LetBtdenote the t-th block,Htdenote the hash value stored with the(i+1)th transaction, andhi=h(ψi).ψt=(hi-1,h′(Bi)),hi-1is the hash of the previous block.handh′are two hash functions respectively.The specific structure is shown in Fig.1.Thei-th block is hashed and stored together with the hash of the previous block.

    Figure 1: Hash chain in distributed storage scheme based on blockchain

    As we can see from the Fig.1, the DSB scheme is to hash the entire block.Below we give the definition of DSB.

    Definition 1Distributed Storage Based on Blockchain (DSB).DSB consists of three phases.

    First give a node partition:

    wherenrepresents the total number of nodes.indicates that the nodes are divided intoRsubsets of sizer+1.The specific stages are as follows.

    1) Initial phase

    2) Encryption phase

    There is an encryption algorithm denoted asφ, and the block can be encrypted with a key:

    3) Storage phase

    Distribute and storeamongr+ 1 nodes in partitionχ, and then use secret share algorithm to storeandψt.

    3.2 The Structure of Distributed Storage Scheme Based on Blockchain

    We constructed our storage scheme based on the blockchain, and introduce some of the corresponding concepts are related to the blockchain in this section [17-19].First, we will introduce the components of the framework of our scheme:

    1)Data management center (DMC): The data management center is responsible for sending data verification requests and distributing data to nodes in designated shard.

    2)Node: The node is responsible for the maintenance of the ledger and the verification of the data.

    3)Shard: With the help of blockchain sharding technology [20,21], the nodes in our scheme are randomly divided into a specified number of shards, and the number of nodes in each shard is the same.

    4)Blockchain database: The blockchain database is used to store data that has been verified by the nodes.

    5)P2P network: P2P networks have advantages in building distributed applications [22-24].Our scheme uses a distributed P2P network without central node, and a network is randomly established between nodes.

    First, the DMC sends a request to the nodes.After receiving the request, each node runs PolyVSS three-phase algorithm to distribute and store data.Fig.2 shows the structure of a sharding-based blockchain storage system (assuming that all nodes are divided into three shards).It should be noted that the structure is the same regardless of the number of shard.Each dashed box in the figure represents a shard, and each shard has the same number of nodes.The nodes in each shard are independent of each other, do not affect each other, and can communicate with each other when necessary.This can prevent malicious nodes in different shards from colluding with each other and prevent double-spending attacks.Of course, in order to prevent all malicious nodes from being divided into the same shard, we refer to the technique of the paper [20], so that the node allocation is completely random.

    The number of nodes is not as many as possible.With reference to the practical Byzantine fault-tolerant algorithm, we generally limit the number of nodes in each shard to no more than 100.When the number of nodes exceeds 100, the efficiency of reaching consensus among nodes will become low.Of course we can increase the number of shard.In our scheme, there are a total of three shards and we assume that the number of nodes in each shard is 50.

    Let the total number of nodes beNub,Frepresents the number of shards, we havewherer+1 is the size of each shard.The specific scheme is given in the next section.

    3.3 The Proposed Scheme Based on Sharding Blockchain

    Our scheme is based on sharding blockchain, and can process multiple data in parallel, which theoretically improves the efficiency of data verification.Our scheme is divided into three phases:request phase, secret share phase and storage phase.

    Figure 2: Data storage scheme based on sharding blockchain

    1) Request phase

    When a piece of data needs to be added to the chain, the Data Management Center (DMC)will send a request to all nodes in a shard.

    2) Data verification phase

    Each nodeNiindependently selects a sub-secretSi, and the master secret can be expressed as

    For each sub-secretSi,Nirandomly selects a t-degree polynomialFi(x), and the corresponding sub-secret isFi(0)=Si.

    Niuses the Commit algorithm to generate the commitmentCand broadcast it throughout the P2P network.

    Forj∈[1,n],Nirespectively calculates a witnesswjand the sub-share:

    and then sends 〈j,Fi(xj),wj〉to otherNiin the network through a trusted channel.

    After receiving 〈j,Fi(xj),wj〉, eachNistarts to run the evaluation verification algorithm in the polynomial commitment.

    After the verification is passed, all nodes accept the corresponding sub-secret, and use the Lagrange interpolation to restore the corresponding sub-secret.

    3) Data storage stage

    After PolyVSS is executed, the verified data is uploaded to the blockchain.The specific process is shown in Fig.3.

    Figure 3: Data creation, distribution, verification and storage process based on PolyVSS protocol

    4 The Proposed Verifiable Secret Sharing Scheme Based on Polynomial Commitment

    In this section, we will first introduce the formal definition of VSS and some cryptographic assumptions.Then, the specific construction is given.We also conduct security and performance analysis of the scheme.

    4.1 Preliminary

    First of all, we give the formal definition of VSS scheme and several security features that it needs to satisfy.

    Definition 2Verifiable secret share (VSS).A VSS scheme is divided into two phases:

    Share phase: At the beginning of the phase, the Shareholder holds an inputs, and the corresponding share can be calculated usings.

    Reconstruction phase: With anytshares, users can use Lagrangian interpolation formulas to reconstruct the secret value.

    To facilitate the description of the application later, in the following text we will use node instead of Shareholder.Usually, a VSS scheme needs to satisfy two security features: Secrecy and Correctness.Below we give their definitions.

    Definition 3Secrecy.The adversary cannot calculate the correct sharingsduring the share phase.

    Definition 4Correctness.The reconstructed value should be equal to the shared secretsor every honest node will reach a result and accuse the node of maliciousness by outputting ⊥.

    Some VSS schemes have introduced cryptographic commitment, such as Pedersen commitment with homomorphic characteristics.Cryptographic commitment generally consists of two phases:commit and open, which are respectively to commit and open the message.Polynomial commitment is also a kind of homomorphic commitment, which can be constructed based on discrete logarithm and Pedersen commitment.The polynomial commitment algorithm is based on the two traditional commitment algorithms, combined with the characteristics of the accumulator to add a verification algorithm.The existing research points of verifiable secret share scheme based on polynomial commitments are mainly in the scheme construction of asynchronous and synchronous models [25-27].

    Here are a few cryptographic assumptions used for the security proof of our scheme.

    Definition 5Discrete Logarithm Assumption (DLA).Given a groupG*of generating elementsg,G*=G, and a random number?∈ZP, the probability thatg?is computed by?is?κfor each adversary.

    Definition 6Bilinear Pairing.LetG1,G2be the additive cyclic group of orderp,GTis the multiplicative group of the same order, ande:G1,G2→GTis expressed as a bilinear mapping.

    AssumingM∈G1,N∈G2,α,β∈the bilinear pairs satisfy three properties:

    (1) Bilinear:e(Mα,Nβ)=e(M,N)αβ;

    (2) Non-degenerate: There existsMandNsatisfye(M,N)1;

    (3) For anyMandN, there exists an efficient algorithm that allows the result ofe(M,N)to be derived in polynomial time (PPT).

    4.2 The Proposed Scheme Based on Polynomial Commitment

    Our scheme is an improvement on the (n, t, n) verifiable secret sharing scheme [13].In the(n, t, n) scheme, the firstnrepresentsnsub-shares,trepresents the threshold, the knowledge of the threshold cryptography is used here, and the lastnrepresents n participants.One advantage of such a scheme is that it does not require a trusted third party, which is not completely trusted.Scheme without a trusted third party can improve security.

    On the basis of the previous scheme, polynomial commitment is introduced.Our scheme is divided into two phases: share phase and reconstruction phase.At the beginning of the scheme,the node runs the initial algorithm in the polynomial commitment, randomly selects a generatorg, a random numberα∈and then generates a public keypk=〈g,g,gα,...,gαt〉.

    1) Share phase

    Master secret generation algorithm: Each nodePiindependently chooses a sub-secretSi, the master secret can be expressed as=S1+...+Sn.

    Verification algorithm: After receiving 〈j,Fi(xj),wj〉, eachPistarts to run the verify algorithm in the polynomial commitment.If the verification of a share holderPi′fails, other nodes will return an accusation message to opposePi′.If more thantnodes accusePi′, obviously,Pi′is wrong and disqualified.On the contrary,Pi′broadcasts the corresponding share and 〈i,Fi(x),wi〉to the accusing party.If the revealed share fails to be verified again, thenPi′is unqualified and the agreement ends, otherwise, eachPiacceptssij.

    2) Reconstruction phase:

    In the reconstruction phase, whent+1 shared holders pass the verification algorithm, eachPiinterpolation pair 〈i,Fi(x)〉to determineSi=Fi(0), and then calculates the master secretS.

    4.3 Analysis of the Proposed PolyVSS Scheme

    4.3.1 Security Analysis

    First, we give the adversary model.We consider a networkP={P1,P2,...,Pn}composed ofnparticipants.Our adversaryΘis t-bounded and adaptive and can compromise and coordinate the actions of up totofnparties.It can damage any party under any circumstances during the execution of the protocol, as long as the amount of damage is bounded byt.

    Theorem 1:The proposed VSS scheme based on polynomial commitment satisfies correctness and secrecy.

    Proof: We will prove that our scheme satisfies the correctness and secrecy features.

    Correctness.Compared with other VSS schemes, our scheme does not have dealers.That is to say, in our scheme, we do not need to consider whether the dealer is honest.Suppose that the node uses the polynomialF(x)to share a secretsand remains honest throughout the execution of the sharing phase.LetCbe the commitment sent to each node.Considering the strong correctness of the polynomial commitment, all honest nodes will get the correct share of the secretsconsistent withC.Suppose a malicious node is allowed to broadcast its triplet 〈i′,Fi′(x),wi′〉, but the final verified value is not equal.Since polynomial commitment is computational binding, only honest nodes can reconstruct the secret.

    Secrecy.The secrecy of our scheme comes from the hiding feature of polynomial commitment.Regardless of whether the node is malicious or honest, it is difficult for an adversary to obtain secret-related information.Suppose there is a t-bounded adversaryΘ, which can obtaintmessages〈i,Fi(x),wi〉.Since polynomial commitment is constructed based on discrete logarithms, it has hiding features.Below we first prove hiding.

    Suppose there is an algorithmEconstructed by adversary that can break the DLA.Let 〈g,g?〉as an instance of the discrete logarithm problem that algorithmEneeds to solve.AlgorithmErandomly chooses a number?∈o generate a public keypk=〈G,g,g?,g?2,...,g?n〉 to the adversaryΘ.AlgorithmEsets 〈τ,φ(τ)〉as the index of polynomialφ(x)at indexτ.Then supposeφ(0)=u, which is the answer to the DL instance, and usen+1 exponential evaluation to calculategφ(x), 〈0,g?〉and other selected pairs 〈τ,gφ(τ)〉.Finally,Ecalculates the testimony 〈τ,F(τ)〉:

    And sendpkand witness tuple 〈τ,φ(τ),ωτ〉to the adversaryΘ.Once the adversaryΘreturns the polynomialφ(x),Ereturns the constant termφ(0)as the solution of the DLA instance.

    It is easy to see that the success probability of solving the DLA instance is the same as the success probability ofΘ, and the time required is larger than the time required byΘby a small constant.That is, it is impossible to reconstruct the polynomialF(x)and the corresponding secret by only revealing suchtmessages.

    4.3.2 PolyVSS Performance Analysis

    This section compares the computational costs and functions of the six schemes in the four stages of parameter setting, reconstruction, verification, and recovery.

    The polynomial commitment scheme given in Section 2.2 can only open and verify the evaluation of one index and is not suitable when multiple guidelines need to be opened.A batch polynomial commitment was proposed to open and verify the evaluation of multiple indexes.The batch polynomial commitment mainly modifies the verify phase.Let all the indexesτto be opened form a setW?Zp, that isτ∈W.Wsatisfies |W|<t.Algorithm output triples〈W,r(x),ωW〉, whereωW=gfw(α)is the witness of all indexes.h(x)is expressed as the remainder of.fw(x)is expressed as:

    Finally, the verifier verifies the correctness of the following equation:

    With the aid of batch polynomial commitment, whennindexes need to be opened, the burden of witness calculation is reduced fromnto 1.

    We compared the computational cost and functions of several VSS schemes [28-32].The specific comparison is shown in Tab.1, wherenrepresents how many operations are done, andtcan be represented as the number of nodes.The function comparison is shown in Tab.2.

    5 Performance Analysis of Our Proposed Distributed Storage Scheme

    5.1 Security Analysis

    Denial of service (DoS) attack is a method used to disrupt legitimate users’access to the target network or website resources [33-35].Usually this is achieved by overloading a target with a large amount of traffic (usually a web server), or by sending malicious requests that cause the target resource to malfunction or completely collapse [36-41].

    Table 1: Computational costs

    Table 2: Function comparison

    Blockchain will also suffer from DoS attacks.In the traditional blockchain, when a node is attacked, it needs to visit other nodes (because each node stores the entire ledger) to recover local data.In our scheme, when a node in the network is attacked, the node can use the reconstruction algorithm of the PolyVSS scheme to recover the corresponding data by accessing otherr+1 nodes.Therefore, our scheme can effectively deal with single point of failure.

    Theorem 2:The proposed distributed storage scheme can reconstruct secret by accessing anyr+1 nodes.

    Proof: Sincedeg(F)≤t, the polynomialF(x)can be interpolated by accessing anyr+1 nodes.

    Below we analyze the cost of restoring communication.For convenience, we use DSB and LSS-DSB respectively to replace the name of the scheme in the paper [42-45].The data of the corresponding schemes are given in Tab.3.We use symbolsStorto represent recovery communication cost, and symbolsComto represent storage cost.

    Table 3: Comparison of storage scheme

    The core of our scheme is the secret sharing scheme, which is also an important tool to achieve recovery.The Shamir secret share used in DSB is one of the most classic schemes.Local secret share is based on Shamir secret share, introducing two new concepts: global secret and local secret.Among them, information as global secret is more important than a local secret.Global secrets are maintained by all users, while local secrets are maintained by individuals.Unlike their two schemes, our scheme does not have a central party, such as the dealer in the Shamir’s scheme.In addition, participants in our scheme will mutually verify the legality of share, thereby improving security.

    Blockchain.Due to the characteristics of traditional blockchains, each node needs to store the entire ledger.When a single point of failure occurs, it is necessary to access all other nodes to restore all transaction data.AssumingBt∈Fτ,ψt∈Fp, whereFτ,Fpare two prime number domains, so the recovery communication cost is:

    The symbol ∝means proportional.Once the size of the prime number field is determined,the storage cost of the blockchain is fixed.

    DSB.Nodes need to visitr+1 other subsets of nodes to recover all data in DSB.Assumingso the recovery communication cost is:

    γrepresents the additional cost of accessing other subsets and its value is fixed.Obviously, the recovery communication cost is related tor, and asrincreases, the communication recovery cost also increases.

    LSS-DSB.The node can recover the entire data by accessing r subsets locally.Compared with DSB, no additional recovery communication cost is required.The recovery communication cost is:

    Our scheme.In our scheme, the node also needs to accessr+1 other nodes to recover data.The recovery communication cost is:

    Assumingp=2400,τ=240, the recovery communication cost is shown in Fig.4.Our scheme is superior to DSB in terms of communication cost, similar to LSS-DSB.

    5.2 Storage Analysis

    In this section, we will compare the storage cost of several schemes when storing a transaction.The data of the corresponding schemes are given in Tab.3, here is a brief analysis of several schemes.

    Blockchain.In traditional blockchains based on Bitcoin, nodes usually store the entire transaction ledger.The storage overhead for each node of the blockchain to store a transaction is:

    Figure 4: Comparison of recovery communication cost

    DSB.Different from traditional blockchain, DSB uses coding technology to reduce storage overhead, but the node needs to store a private key.The storage overhead for each node of DSB to store a transaction is:

    LSS-DSB.Local secret share (LSS) divides secrets into one global secret and many local secrets.The most important information will be treated as global secrets.The LSS-based DSB scheme can efficiently store private keys and hash values, which can further reduce storage overhead.The storage overhead for each node of LSS-DSB to store a transaction is:

    Our scheme.In our scheme, the node does not need to store additional private keys.The storage overhead of each node storing a transaction is:

    Assumingp=2400,τ=240andγ=200, the comparison of storage overhead is shown in Fig.5.From the figure, we can see that as the size of shard increases, the storage cost of the blockchain is constant, and our scheme becomes smaller and tends to be constant as the size of the shard increases.Compared with several other schemes, our scheme is the best.

    Figure 5: Comparison of storage cost

    6 Conclusion

    Distributed storage is one of the important directions of future storage system development and blockchain provides solutions to the security and performance problems of distributed storage.This paper first uses polynomial commitment to improve verifiable secret share and constructs a new VSS scheme.Then use the new VSS scheme to construct a distributed storage mechanism based on blockchain.Compared with the previous scheme, the scheme proposed in this paper also achieves low storage cost, and is also superior to the DSB scheme in terms of recovery communication cost.Future research directions mainly include the following points: (1) Replace transaction and network with state sharding to further optimize storage cost; (2) Realize efficient communication across partitions.

    Funding Statement:This work was supported by the National Natural Science Foundation of China under Grant 62072249, 61772280, 61772454, 62072056.J.Wang and Y.Ren received the grants, and the URL of the sponsors’website is http://www.nsfc.gov.cn/.This work was also supported by the Project of Transformation and Upgrading of Industries and Information Technologies of Jiangsu Province (No.JITC-1900AX2038/01).X.Yu received the grant, and the URL of the sponsors’website is http://gxt.jiangsu.gov.cn/.

    Conflicts of Interest:The authors declare that they have no conflicts of interest to report regarding the present study.

    亚洲人成网站在线播| 88av欧美| 日韩欧美 国产精品| 国内精品久久久久精免费| 熟女人妻精品中文字幕| 亚洲,欧美精品.| 国产精品综合久久久久久久免费| 免费在线观看日本一区| 久久天躁狠狠躁夜夜2o2o| 日本与韩国留学比较| 脱女人内裤的视频| 午夜精品一区二区三区免费看| 亚洲精品日韩av片在线观看| 国产亚洲精品综合一区在线观看| 我的女老师完整版在线观看| 亚洲最大成人手机在线| 亚洲 国产 在线| 久久香蕉精品热| 少妇的逼水好多| 日韩欧美精品免费久久 | 国产精品女同一区二区软件 | 国产三级中文精品| 无遮挡黄片免费观看| 久久久成人免费电影| 欧美日韩黄片免| 真人做人爱边吃奶动态| 亚洲精品一卡2卡三卡4卡5卡| 波野结衣二区三区在线| 91麻豆av在线| 免费观看的影片在线观看| 国产精品一及| 动漫黄色视频在线观看| 男人舔奶头视频| 美女免费视频网站| 一个人看的www免费观看视频| 国产精品野战在线观看| 欧美色欧美亚洲另类二区| 色综合站精品国产| 免费高清视频大片| 久久久久久国产a免费观看| 嫩草影院新地址| 成人美女网站在线观看视频| 欧美日韩亚洲国产一区二区在线观看| 啦啦啦观看免费观看视频高清| 国产av麻豆久久久久久久| 午夜亚洲福利在线播放| 美女cb高潮喷水在线观看| 免费观看的影片在线观看| 丝袜美腿在线中文| 制服丝袜大香蕉在线| 两个人视频免费观看高清| 99热只有精品国产| 久久久精品欧美日韩精品| 久久久久久九九精品二区国产| 日日干狠狠操夜夜爽| 2021天堂中文幕一二区在线观| 婷婷色综合大香蕉| 黄色日韩在线| 久久热精品热| 一级黄色大片毛片| 韩国av一区二区三区四区| 国产精品乱码一区二三区的特点| 在线观看舔阴道视频| 免费看光身美女| 国产日本99.免费观看| 91麻豆av在线| 成人一区二区视频在线观看| 午夜精品一区二区三区免费看| 国产又黄又爽又无遮挡在线| 老司机午夜十八禁免费视频| 嫩草影院新地址| 国产不卡一卡二| 最后的刺客免费高清国语| 美女黄网站色视频| 亚洲电影在线观看av| 国内精品久久久久久久电影| 18禁在线播放成人免费| 中文字幕人成人乱码亚洲影| 成年女人看的毛片在线观看| 在线观看舔阴道视频| 少妇的逼水好多| 久久久精品大字幕| 国产 一区 欧美 日韩| 午夜福利成人在线免费观看| 欧美午夜高清在线| 精品久久久久久久久亚洲 | 黄色女人牲交| 岛国在线免费视频观看| 久久精品国产99精品国产亚洲性色| 午夜日韩欧美国产| 波多野结衣高清无吗| 久久精品综合一区二区三区| 国产69精品久久久久777片| 国产又黄又爽又无遮挡在线| 看免费av毛片| 免费无遮挡裸体视频| 国产高潮美女av| av在线观看视频网站免费| 免费av毛片视频| 国产一区二区在线观看日韩| 在线天堂最新版资源| 老女人水多毛片| 国产成人影院久久av| 一边摸一边抽搐一进一小说| 两人在一起打扑克的视频| 国产久久久一区二区三区| 欧美潮喷喷水| 午夜福利在线观看免费完整高清在 | av中文乱码字幕在线| 国产高清视频在线播放一区| 又黄又爽又免费观看的视频| 欧美中文日本在线观看视频| 真人做人爱边吃奶动态| 国产高清视频在线播放一区| 亚洲av免费在线观看| 亚洲av电影在线进入| 日本 欧美在线| av在线天堂中文字幕| 中文字幕av成人在线电影| 男女那种视频在线观看| 亚洲欧美日韩东京热| 在线十欧美十亚洲十日本专区| 级片在线观看| 国产亚洲精品av在线| www.熟女人妻精品国产| xxxwww97欧美| 国产av麻豆久久久久久久| 91九色精品人成在线观看| 女同久久另类99精品国产91| 欧美bdsm另类| 毛片一级片免费看久久久久 | 高清毛片免费观看视频网站| 国产精品久久久久久久久免 | 欧美激情久久久久久爽电影| 真实男女啪啪啪动态图| 美女高潮的动态| 99riav亚洲国产免费| 国产极品精品免费视频能看的| 男女下面进入的视频免费午夜| 欧美色欧美亚洲另类二区| 国产高清视频在线观看网站| 一进一出抽搐gif免费好疼| 一本综合久久免费| 嫩草影院入口| a在线观看视频网站| 看黄色毛片网站| 老司机午夜十八禁免费视频| 国产成人a区在线观看| 高清日韩中文字幕在线| 国产精品一区二区性色av| 欧美最黄视频在线播放免费| 一卡2卡三卡四卡精品乱码亚洲| 精品无人区乱码1区二区| 国产视频内射| 亚洲美女搞黄在线观看 | 一级毛片久久久久久久久女| 乱人视频在线观看| 日韩欧美精品免费久久 | 欧美区成人在线视频| 国产欧美日韩一区二区三| 免费观看的影片在线观看| 一本精品99久久精品77| 内射极品少妇av片p| 18禁黄网站禁片免费观看直播| 69人妻影院| 国产亚洲欧美98| 老司机深夜福利视频在线观看| 一级a爱片免费观看的视频| 男女床上黄色一级片免费看| 三级毛片av免费| 内射极品少妇av片p| 婷婷色综合大香蕉| 给我免费播放毛片高清在线观看| 午夜日韩欧美国产| 日韩中字成人| 在线观看午夜福利视频| 在线国产一区二区在线| 一级a爱片免费观看的视频| 午夜老司机福利剧场| 国产欧美日韩精品一区二区| 热99在线观看视频| 日韩亚洲欧美综合| 欧美+日韩+精品| 少妇被粗大猛烈的视频| 精品久久久久久久末码| 看黄色毛片网站| 久久人人精品亚洲av| 免费在线观看成人毛片| 免费观看精品视频网站| 18禁在线播放成人免费| 一本一本综合久久| 精品久久久久久久久久免费视频| 好看av亚洲va欧美ⅴa在| 99国产极品粉嫩在线观看| 欧美性猛交黑人性爽| 亚洲av日韩精品久久久久久密| 制服丝袜大香蕉在线| 少妇人妻精品综合一区二区 | 久久久久久大精品| 很黄的视频免费| 国产精品亚洲美女久久久| 在线观看av片永久免费下载| 无遮挡黄片免费观看| 日韩欧美精品v在线| 色哟哟·www| 禁无遮挡网站| 一级av片app| 国产伦精品一区二区三区四那| 亚洲人成网站在线播放欧美日韩| 3wmmmm亚洲av在线观看| 欧美性猛交黑人性爽| 真人一进一出gif抽搐免费| 亚洲美女搞黄在线观看 | 免费看美女性在线毛片视频| 国产美女午夜福利| 亚洲在线观看片| 动漫黄色视频在线观看| 精品国产三级普通话版| 嫩草影院新地址| 夜夜夜夜夜久久久久| 亚洲不卡免费看| 亚洲无线观看免费| 中文字幕av成人在线电影| 国产一区二区激情短视频| 精品欧美国产一区二区三| 亚洲av电影在线进入| 国产av在哪里看| 免费av毛片视频| 丰满乱子伦码专区| 成人av在线播放网站| 成人美女网站在线观看视频| av天堂中文字幕网| 成人三级黄色视频| 18禁在线播放成人免费| 三级毛片av免费| 国产av麻豆久久久久久久| 悠悠久久av| 国产三级黄色录像| 99精品久久久久人妻精品| 亚洲第一电影网av| 黄色日韩在线| 波多野结衣高清作品| 久久草成人影院| 不卡一级毛片| 性插视频无遮挡在线免费观看| 欧美最黄视频在线播放免费| 久久精品久久久久久噜噜老黄 | 亚洲成a人片在线一区二区| 一级黄色大片毛片| 听说在线观看完整版免费高清| 国产又黄又爽又无遮挡在线| 国产野战对白在线观看| 日本一二三区视频观看| 看十八女毛片水多多多| 亚洲最大成人av| 最近最新中文字幕大全电影3| 久久精品人妻少妇| 综合色av麻豆| 久99久视频精品免费| a级一级毛片免费在线观看| 日本五十路高清| 嫩草影院入口| 亚洲一区二区三区不卡视频| 日本精品一区二区三区蜜桃| 一级av片app| 日韩欧美 国产精品| 99久久无色码亚洲精品果冻| 国产精品人妻久久久久久| 国产欧美日韩一区二区三| 国内精品久久久久久久电影| 全区人妻精品视频| 男女之事视频高清在线观看| 中文字幕久久专区| 美女高潮喷水抽搐中文字幕| 久久久久久久久中文| 熟女电影av网| 色哟哟·www| 欧美另类亚洲清纯唯美| 人人妻,人人澡人人爽秒播| 99国产精品一区二区蜜桃av| 精品国内亚洲2022精品成人| 免费电影在线观看免费观看| 成人亚洲精品av一区二区| 成人国产一区最新在线观看| 欧美成狂野欧美在线观看| 国产探花极品一区二区| 午夜福利免费观看在线| 一级作爱视频免费观看| 国产精品野战在线观看| 他把我摸到了高潮在线观看| 国产精品久久电影中文字幕| 亚洲国产精品999在线| 精品一区二区三区视频在线| 国产精品不卡视频一区二区 | 色精品久久人妻99蜜桃| 国产综合懂色| 夜夜看夜夜爽夜夜摸| 久久人人爽人人爽人人片va | av在线老鸭窝| 久久久久亚洲av毛片大全| 国产精品女同一区二区软件 | 免费黄网站久久成人精品 | 日本a在线网址| 青草久久国产| 最近最新中文字幕大全电影3| 亚洲成人免费电影在线观看| 88av欧美| 国产淫片久久久久久久久 | 91字幕亚洲| 极品教师在线免费播放| 51国产日韩欧美| 搞女人的毛片| 婷婷六月久久综合丁香| 亚洲精品久久国产高清桃花| 久久人妻av系列| 黄色日韩在线| www.999成人在线观看| 成人性生交大片免费视频hd| 国产精品不卡视频一区二区 | 18+在线观看网站| 亚州av有码| 欧美国产日韩亚洲一区| 一a级毛片在线观看| 国产成人av教育| av在线蜜桃| 搡老妇女老女人老熟妇| 国产激情偷乱视频一区二区| 宅男免费午夜| 国产aⅴ精品一区二区三区波| 97人妻精品一区二区三区麻豆| 国产成人aa在线观看| 中文亚洲av片在线观看爽| 丝袜美腿在线中文| 亚洲无线观看免费| 一个人免费在线观看的高清视频| a级一级毛片免费在线观看| 亚洲av美国av| 尤物成人国产欧美一区二区三区| 日韩欧美精品v在线| 18禁黄网站禁片午夜丰满| 亚洲av二区三区四区| 偷拍熟女少妇极品色| 亚洲av成人精品一区久久| 国内揄拍国产精品人妻在线| 亚洲av不卡在线观看| ponron亚洲| 精品欧美国产一区二区三| 亚洲av二区三区四区| 一夜夜www| 久久久久免费精品人妻一区二区| 长腿黑丝高跟| 久久久精品大字幕| 五月玫瑰六月丁香| 看免费av毛片| 国产一区二区激情短视频| 亚洲欧美日韩高清在线视频| 深夜a级毛片| 琪琪午夜伦伦电影理论片6080| 高清日韩中文字幕在线| 久久久色成人| 精品久久久久久久久久免费视频| 亚洲第一区二区三区不卡| 色哟哟·www| 69人妻影院| 欧美一区二区亚洲| 内地一区二区视频在线| 成人国产综合亚洲| 久久久成人免费电影| 精品免费久久久久久久清纯| 国内精品久久久久久久电影| h日本视频在线播放| 中文字幕熟女人妻在线| 国内精品久久久久精免费| 精华霜和精华液先用哪个| 熟女人妻精品中文字幕| av福利片在线观看| 99视频精品全部免费 在线| 欧美日韩中文字幕国产精品一区二区三区| 一卡2卡三卡四卡精品乱码亚洲| 午夜福利在线观看免费完整高清在 | 热99re8久久精品国产| 精品久久久久久久人妻蜜臀av| 美女免费视频网站| 亚洲欧美清纯卡通| 99久久99久久久精品蜜桃| 国产伦精品一区二区三区视频9| 精品一区二区三区视频在线| 欧美乱色亚洲激情| 黄片小视频在线播放| 51国产日韩欧美| 国产精品乱码一区二三区的特点| 少妇人妻一区二区三区视频| 成人无遮挡网站| 日日夜夜操网爽| 五月伊人婷婷丁香| 好男人在线观看高清免费视频| 窝窝影院91人妻| 国产av不卡久久| 精品国内亚洲2022精品成人| a级毛片免费高清观看在线播放| av黄色大香蕉| av在线观看视频网站免费| 亚洲美女黄片视频| 精品久久国产蜜桃| 亚洲欧美精品综合久久99| 全区人妻精品视频| 美女高潮喷水抽搐中文字幕| 欧美丝袜亚洲另类 | 国产精品影院久久| 极品教师在线免费播放| 乱码一卡2卡4卡精品| 日韩欧美国产一区二区入口| 国产精品久久久久久人妻精品电影| 成人欧美大片| 99久久精品热视频| 精品一区二区三区视频在线| 白带黄色成豆腐渣| АⅤ资源中文在线天堂| 成年女人毛片免费观看观看9| 中文亚洲av片在线观看爽| 亚洲熟妇中文字幕五十中出| 欧美丝袜亚洲另类 | 老熟妇仑乱视频hdxx| 久久午夜福利片| 欧美日韩国产亚洲二区| 国产成年人精品一区二区| 蜜桃亚洲精品一区二区三区| 亚洲专区国产一区二区| 偷拍熟女少妇极品色| 久久精品国产亚洲av天美| 三级国产精品欧美在线观看| 一级毛片久久久久久久久女| 日日摸夜夜添夜夜添小说| 欧美日韩国产亚洲二区| 欧美潮喷喷水| 久久这里只有精品中国| 亚洲国产色片| 在线十欧美十亚洲十日本专区| 精品久久久久久久久av| 久9热在线精品视频| 午夜久久久久精精品| 亚洲成人精品中文字幕电影| 一进一出抽搐动态| 午夜福利在线观看免费完整高清在 | 丁香六月欧美| 精品一区二区免费观看| 免费在线观看亚洲国产| 一区二区三区高清视频在线| 欧美成人一区二区免费高清观看| 久久精品国产亚洲av涩爱 | 听说在线观看完整版免费高清| 成人美女网站在线观看视频| 深夜a级毛片| 18禁裸乳无遮挡免费网站照片| 日韩欧美国产一区二区入口| 国产伦精品一区二区三区视频9| 热99re8久久精品国产| 九九在线视频观看精品| 69人妻影院| 国产亚洲精品av在线| 国产欧美日韩精品亚洲av| 精品午夜福利视频在线观看一区| 成人国产一区最新在线观看| 国产亚洲av嫩草精品影院| 看十八女毛片水多多多| 性色av乱码一区二区三区2| 免费一级毛片在线播放高清视频| 97超视频在线观看视频| 欧美国产日韩亚洲一区| 国产男靠女视频免费网站| 午夜精品久久久久久毛片777| 熟女电影av网| 欧美黑人巨大hd| 99国产精品一区二区三区| 国产一区二区三区在线臀色熟女| 脱女人内裤的视频| 国产私拍福利视频在线观看| 一本精品99久久精品77| 免费av毛片视频| 亚洲人成网站在线播| 亚洲成人中文字幕在线播放| 中文字幕精品亚洲无线码一区| 成人av一区二区三区在线看| 亚洲最大成人手机在线| 热99re8久久精品国产| 国产精品一区二区三区四区免费观看 | 久久亚洲精品不卡| 亚洲久久久久久中文字幕| 久久久成人免费电影| 日韩欧美国产在线观看| 久久这里只有精品中国| 如何舔出高潮| 精品久久久久久久久亚洲 | 亚洲第一电影网av| 香蕉av资源在线| 久久国产精品人妻蜜桃| 欧美黑人欧美精品刺激| 人妻丰满熟妇av一区二区三区| 亚洲熟妇中文字幕五十中出| 啦啦啦韩国在线观看视频| 变态另类丝袜制服| 国产伦精品一区二区三区四那| 亚洲18禁久久av| www.熟女人妻精品国产| 黄色女人牲交| 亚洲美女搞黄在线观看 | 观看免费一级毛片| 日韩中字成人| 欧美极品一区二区三区四区| 亚洲成人中文字幕在线播放| 色综合欧美亚洲国产小说| 久久精品夜夜夜夜夜久久蜜豆| 亚洲avbb在线观看| 婷婷六月久久综合丁香| 国产 一区 欧美 日韩| 国产欧美日韩精品亚洲av| 少妇的逼水好多| 欧美日韩中文字幕国产精品一区二区三区| 中文字幕久久专区| a级毛片免费高清观看在线播放| 欧美高清成人免费视频www| 色综合站精品国产| 久久久久久久久中文| 亚洲av日韩精品久久久久久密| 中文字幕av在线有码专区| 欧美精品国产亚洲| 天堂av国产一区二区熟女人妻| 天堂√8在线中文| 欧美最黄视频在线播放免费| 亚洲内射少妇av| 久久久精品大字幕| 在线免费观看的www视频| 极品教师在线视频| 国产真实伦视频高清在线观看 | 如何舔出高潮| 亚洲成人中文字幕在线播放| 老司机福利观看| 久久亚洲精品不卡| 亚洲第一电影网av| 国产欧美日韩一区二区三| www.熟女人妻精品国产| 婷婷六月久久综合丁香| 精品人妻一区二区三区麻豆 | 免费看日本二区| 日韩欧美精品v在线| 蜜桃亚洲精品一区二区三区| 午夜福利视频1000在线观看| 国产高潮美女av| 国产欧美日韩一区二区精品| 亚洲成人免费电影在线观看| 久久天躁狠狠躁夜夜2o2o| 婷婷精品国产亚洲av| 1024手机看黄色片| 久久久久久九九精品二区国产| 久久久久性生活片| 一进一出好大好爽视频| netflix在线观看网站| 男女视频在线观看网站免费| 亚洲专区中文字幕在线| 欧洲精品卡2卡3卡4卡5卡区| 色综合站精品国产| h日本视频在线播放| 国产中年淑女户外野战色| 婷婷六月久久综合丁香| 国产又黄又爽又无遮挡在线| 欧美性猛交黑人性爽| 国产精品1区2区在线观看.| 国产成人av教育| 国内揄拍国产精品人妻在线| 丁香六月欧美| 中国美女看黄片| 日本免费一区二区三区高清不卡| 欧美中文日本在线观看视频| 国产精品久久久久久精品电影| 麻豆一二三区av精品| 欧美一区二区亚洲| 白带黄色成豆腐渣| 能在线免费观看的黄片| 丰满的人妻完整版| 在线播放无遮挡| 禁无遮挡网站| 欧美在线黄色| 真人做人爱边吃奶动态| 亚洲五月天丁香| av天堂在线播放| 国产色爽女视频免费观看| 免费观看人在逋| 日本黄色视频三级网站网址| 欧美中文日本在线观看视频| АⅤ资源中文在线天堂| 激情在线观看视频在线高清| 很黄的视频免费| 99热只有精品国产| 国产毛片a区久久久久| 少妇人妻精品综合一区二区 | 亚洲欧美激情综合另类| 美女高潮喷水抽搐中文字幕| 欧美3d第一页| 午夜福利高清视频| 国产日本99.免费观看| 亚洲成人中文字幕在线播放| 成人亚洲精品av一区二区| 欧美最新免费一区二区三区 | 亚洲欧美日韩无卡精品| 国产精品伦人一区二区| 精华霜和精华液先用哪个| 尤物成人国产欧美一区二区三区| 亚洲国产欧洲综合997久久,| 丁香六月欧美| 国内毛片毛片毛片毛片毛片| 国产午夜精品论理片| 女人十人毛片免费观看3o分钟| 亚洲专区国产一区二区| 亚洲欧美日韩高清专用| 嫩草影视91久久|