信息网络安全 ›› 2025, Vol. 25 ›› Issue (7): 1111-1125.doi: 10.3969/j.issn.1671-1122.2025.07.010

• 理论研究 • 上一篇    下一篇

新型可组合的认证分布式数据结构模型研究

高扬, 张琪, 王琛, 徐剑()   

  1. 东北大学软件学院,沈阳 110169
  • 收稿日期:2025-05-20 出版日期:2025-07-10 发布日期:2025-08-07
  • 通讯作者: 徐剑 E-mail:xuj@mail.neu.edu.cn
  • 作者简介:高扬(1980—),男,辽宁,实验师,博士,主要研究方向为网络与信息安全、人工智能与机器学习|张琪(1997—),男,辽宁,硕士研究生,主要研究方向为隐私计算|王琛(1996—),女,辽宁,博士研究生,主要研究方向为隐私计算|徐剑(1978—),男,辽宁,教授,博士,主要研究方向为网络与信息安全、隐私计算
  • 基金资助:
    国家自然科学基金(62372096)

Research on New Composable Authenticated Distributed Data Structure Model

GAO Yang, ZHANG Qi, WANG Chen, XU Jian()   

  1. Software College of Northeastern University, Shenyang 110169, China
  • Received:2025-05-20 Online:2025-07-10 Published:2025-08-07
  • Contact: XU Jian E-mail:xuj@mail.neu.edu.cn

摘要:

认证分布式数据结构(ADDSM)模型是认证数据结构(ADS)模型的扩展,用于解决ADS模型缺乏可组合性、无法支持复杂的数据组合运算等问题。然而,ADDSM模型存在理论描述不完整、缺少数据持久化解决方案以及机密性保护缺失等问题。为此,文章构建了新型可组合的认证分布式数据结构(NC-ADDSM)。首先,文章对模型进行了完整的理论描述,包括模型的形式化定义、属性描述和安全性定义;然后,设计了初始化、数据插入、数据查询、数据验证、数据持久化等算法,用于构建NC-ADDSM;最后,设计了支持数据更新和数据查询与验证的通信协议,确保只有拥有解密密钥的实体才能获取明文数据。理论分析和实验结果表明,文章所提出的NC-ADDSM在保证安全性的同时,具有较高的执行效率。

关键词: 分布式系统, 认证数据结构, 数据持久化, 机密性

Abstract:

The Authenticated Distributed Data Structures Model (ADDSM) is proposed as an extension of the Authenticated Data Structures (ADS) model to address issues such as the ADS model’s lack of composability and its inability to support complex data combination operations. However, previous approaches suffer from incomplete theoretical descriptions, a lack of data persistence solutions, and an absence of confidentiality protection. To address this challenge, this paper proposed a new composable authenticated distributed data structure model (NC-ADDSM). Firstly, this paper provided a complete theoretical description of the model, including its formal definition, property descriptions, and security definitions. Secondly, this paper designed algorithms for initialization, data insertion, data query, data verification, and data persistence to build the NC-ADDSM. Finally, this paper proposed communication protocols that supported data update and query verification, ensuring that only entities possessing the decryption key can access plaintext data. Theoretical analysis and experimental results show that the proposed model maintains security while exhibiting high execution efficiency.

Key words: distributed systems, authenticated data structures, data persistence, confidentiality

中图分类号: