信息安全研究 ›› 2024, Vol. 10 ›› Issue (3): 223-.

• 学术论文 • 上一篇    下一篇

后量子时代区块链中哈希函数比较研究

刘昂1,2文津3许盛伟4陈颖5秦晓宏5蓝浩书5


  

  1. 1(北京电子科技学院网络信息化管理处北京100070)
    2(北京邮电大学网络空间安全学院北京100876)
    3(北京电子科技学院网络空间安全系北京100070)
    4(北京电子科技学院信息安全研究所北京100070)
    5(北京电子科技学院密码科学与技术系北京100070)

  • 出版日期:2024-03-23 发布日期:2024-03-08
  • 通讯作者: 许盛伟 博士,教授,博士生导师.主要研究方向为大数据安全、网络信任体系、密码应用. 18510529691@163.com
  • 作者简介:刘昂 博士研究生,工程师.主要研究方向为密码学、区块链. liuang0826@163.com 文津 硕士研究生.主要研究方向为信息安全和人工智能安全. wenj_2@163.com 许盛伟 博士,教授,博士生导师.主要研究方向为大数据安全、网络信任体系、密码应用. 18510529691@163.com 陈颖 博士,教授,硕士生导师.主要研究方向为数据挖掘、人工智能和图像处理. ychen@besti.edu.cn 秦晓宏 硕士,讲师.主要研究方向为信息隐藏及密码技术. qinxh@besti.edu.cn 蓝浩书 硕士研究生.主要研究方向为区块链. 1015314926@qq.com

A Comparative Research on Hash Function in Blockchain in Post Quantum Era#br#
#br#

Liu Ang1,2, Wen Jin3, Xu Shengwei4, Chen Ying5, Qin Xiaohong5, and Lan Haoshu5#br#

#br#
  

  1. 1(Network and Information Management Division, Beijing Electronic Science and Technology Institute, Beijing 100070)
    2(School of Cyberspace Security, Beijing University of Posts and Telecommunications, Beijing 100876)
    3(Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, Beijing 100070)
    4(Institute of Information Security, Beijing Electronic Science and Technology Institute, Beijing 100070)
    5(Department of Cryptologic Science and Technology, Beijing Electronic Science and Technology Institute, Beijing 100070)

  • Online:2024-03-23 Published:2024-03-08

摘要: 哈希函数在区块链中扮演着安全基石的重要角色,对区块链系统中共识机制的构建和数据完整性保护发挥着不可替代的作用.然而随着量子技术的加速发展,量子计算机的出现将对经典哈希函数构成严重安全威胁,基于量子算法的并行计算特性,Grover量子算法在寻找哈希冲突时较经典搜索算法能提供2次加速,从而能有效实施针对经典哈希函数的量子计算攻击,例如挖矿攻击、伪造攻击,对区块链的安全构成严重挑战.阐述了哈希函数的抗原像性、弱抗碰撞性及强抗碰撞性,分析了针对经典哈希函数的量子计算攻击主要形式:原像攻击和第二原像攻击.从抗量子安全的角度对区块链中的哈希函数展开比较研究,从构造、输入、输出、优点、缺点等方面出发,对5类典型哈希算法进行分析与对比,并对区块链中的哈希函数提出设计建议,为后量子时代区块链中的哈希函数的设计提供有益参考.

关键词: 量子计算, 区块链, 哈希函数, 量子, Merkle树

Abstract: Hash functions play an important role as the cornerstone of security in blockchain systems, playing an irreplaceable role in building consensus mechanisms and protecting data integrity. However, with the accelerated development of quantum technology, the emergence of quantum computers will pose a serious security threat to classical hash functions. Based on the parallel characteristics of quantum computing, Grover’s algorithm can provide squared acceleration compared with the classical counterpart in searching for hash conflicts. Quantum algorithms represented by the Grover’s algorithm can effectively implement quantum computing attacks against classical hash functions, such as mining attacks and forgery attacks. This paper explains the original image collision resistance, weak collision resistance and strong collision resistance of hash functions, and analyzes the main forms of quantum computing attacks against classical hash functions: preimage collision attacks and second image collision attacks. This paper conducts a comparative study on hash functions in blockchain from the perspective of antiquantum security, and five typical hash functions are analyzed and compared from the aspects of construction, input, output, advantages and disadvantages, and proposes the advice for designing hash functions in blockchain. Overall, this paper provides useful references for the design of hash functions in blockchain in the postquantum era.

Key words: quantum computing, blockchain, hash function, quantum, Merkle tree

中图分类号: