Fabric Blockchain Design Based on Improved SM2 Algorithm

Fabric Blockchain Design Based on Improved SM2 Algorithm

Jinhua Fu, Wenhui Zhou, Suzhi Zhang
Copyright: © 2023 |Pages: 13
DOI: 10.4018/IJSWIS.322403
Article PDF Download
Open access articles are freely available for download

Abstract

As one of the most widely used federated chains, hyperledger fabric uses many cryptographic algorithms to ensure the security of information on the chain, but the ECDSA cryptographic algorithm used in the fabric system has backdoor security risks. In this paper, the authors adopt SM2 algorithm to replace the corresponding ECDSA algorithm for blockchain design based on fabric platform. Firstly, they optimize the part of SM2 signature algorithm process with inverse operation and effectively reduce the time complexity by reducing the inverse operation in the whole process, and the experimental results show that the improved SM2 algorithm improves the signature and verification efficiency by about 5.7%. Secondly, by adding SM2 algorithm template and interface to the BCCSP module of fabric platform to realize the shift value of SM2 algorithm and compare the performance with the native fabric system, the network startup time is reduced by about 29%. The experimental results show the effectiveness of the improved SM2 algorithm, and also the performance of the optimized fabric system is improved.
Article Preview
Top

Introduction

Blockchain, a new type of distributed database (You, 2022) in essence, integrates a series of emerging information technologies including consensus mechanism, encryption algorithm, network communication, distributed architecture, and smart contract. All these technologies also contribute to the characteristics of blockchain, such as decentralization, openness, transparency, traceability and non-tampering. Its emergence has brought new solutions to the trust problems, privacy problems and data differences (George, 2022) in the process of multi-party cooperation. It is a huge boost to the establishment and strengthening of the integrity system of the whole Internet, and even to the strengthening of the integrity system in the real world. Blockchain can realize reliable trust transmission at low cost; therefore, it can definitely serve as the cornerstone of trust in the Internet of value and trust of the next generation.

At present, blockchain technology has penetrated into the development of all walks of life, and it has made continuous innovations and breakthroughs. Meanwhile, the problems of Internet and information security caused by its development should be taken into consideration (Avkurova et al., 2022). Individuals, enterprises, and countries cannot ignore network and information security, especially in the current international environment that is becoming increasingly complicated, challenging, and uncertain.

In blockchain technology, a large number of cryptographic algorithms are used (Guo & Yu, 2022; Jose & Prakash, 2014), such as the Hash algorithm (Kuznetsov et al., 2021), digital signature technology, symmetric encryption algorithm, and the asymmetric encryption algorithm. Different types of encryption algorithms are all crucial in different modules, and they jointly ensure the security of data in blockchain. However, many cryptographic algorithms used worldwide now have been cracked and attacked frequently, for there are backdoor security risks and a large number of uncontrollable factors. Therefore, research on how to solve the security risks of cryptographic algorithms in blockchain application has become critical to determine whether blockchain technology can be widely used in all walks of life or not.

To keep encryption and decryption algorithms independent and controllable, China’s State Cryptography Administration has released a series of more efficient and secure commercial cryptographic algorithms since 2010, such as SM2, SM3, SM4, SM9, and so on. After 2020, a range of national standards related to cryptography were promulgated, such as the Cryptography Law of the People’s Republic of China, which effectively standardized and promoted the application of national commercial cryptographic algorithms in every field.

The alliance chain (Li et al., 2021) has different forms and structures from public chains, such as BTC and ETH, and it achieves a balanced state between decentralization and centralization, both of which make the alliance chain the main form of blockchain that attracts wide attention from people. Hyperledger Fabric (Androulaki et al., 2018) is one of the most popular alliance chains at present, and its security mechanism is particularly important. The encryption and decryption algorithms involved in it are all international algorithms, such as Elliptic Curve Digital Signature Algorithm (ECDSA), AES, SHA-256, and so on (Cao et al., 2022).

Complete Article List

Search this Journal:
Reset
Volume 20: 1 Issue (2024)
Volume 19: 1 Issue (2023)
Volume 18: 4 Issues (2022): 2 Released, 2 Forthcoming
Volume 17: 4 Issues (2021)
Volume 16: 4 Issues (2020)
Volume 15: 4 Issues (2019)
Volume 14: 4 Issues (2018)
Volume 13: 4 Issues (2017)
Volume 12: 4 Issues (2016)
Volume 11: 4 Issues (2015)
Volume 10: 4 Issues (2014)
Volume 9: 4 Issues (2013)
Volume 8: 4 Issues (2012)
Volume 7: 4 Issues (2011)
Volume 6: 4 Issues (2010)
Volume 5: 4 Issues (2009)
Volume 4: 4 Issues (2008)
Volume 3: 4 Issues (2007)
Volume 2: 4 Issues (2006)
Volume 1: 4 Issues (2005)
View Complete Journal Contents Listing