Ex) Article Title, Author, Keywords
Current Optics
and Photonics
Ex) Article Title, Author, Keywords
Curr. Opt. Photon. 2022; 6(5): 453-462
Published online October 25, 2022 https://doi.org/10.3807/COPP.2022.6.5.453
Copyright © Optical Society of Korea.
Seok Hee Jeon1, Sang Keun Gil2
Corresponding author: *skgil@suwon.ac.kr, ORCID 0000-0002-3828-0939
This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/4.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
Blockchain technology provides a decentralized and peer-to-peer network, which has the advantages of transparency and immutability. In this paper, a novel secure authentication scheme applying digital holography to blockchain technology is proposed to protect privacy information in network nodes. The transactional information of the node is chained permanently and immutably in the blockchain to ensure network security. By designing a novel two-dimensional (2D) array data structure of the block, a proof of work (PoW) in the blockchain is executed through digital holography technology to verify true authentication and legal block linkage. A hash generated from the proposed algorithm reveals a random number of 2D array data. The real identity of each node in the network cannot be forged by a hacker’s tampering because the privacy information of the node is encrypted using digital holography and stored in the blockchain. The reliability and feasibility of the proposed scheme are analyzed with the help of the research results, which evaluate the effectiveness of the proposed method. Forgery by a malicious node is impossible with the proposed method by rejecting a tampered transaction. The principal application is a secure anonymity system guaranteeing privacy information protection for handling of large information.
Keywords: Authentication, Blockchain technology, Digital holography, Hash, Optical encryption
OCIS codes: (060.4785) Optical security and encryption; (070.1170) Analog optical signal processing; (070.4560) Data processing by optical means; (090.1995) Digital holography; (090.2880) Holographic interferometry
If you are handling critical information in a specific application, you can access the information after a log-in process and may be asked to change specific information through authentication proof. However, simple authentication cannot be definitive proof because the log-in process itself may be wrongfully falsified, even if log-in actions are recorded chronologically. In a secure information system, it is a big problem if any piece of information can be substituted with false information by tampering. To prevent a tamper from falsifying information, the information must not be changed even if forged information asks to change the original true information. One method to keep the information from unchanging is that the majority of information loggers have truthful copies of information by a correct log-in scheme. The solution to this problem is that we have a protocol for recording the information in the log and distributing copies of it to network users, which composes a decentralized database. As one of the emerging methods in recent years, blockchain is essentially a distributed database that can overcome the drawbacks of a centralized database. The concept of blockchain technology was first proposed in 2008 by Nakamoto, who developed the first digital currency, Bitcoin [1], which is a decentralized peer-to-peer (P2P) cryptocurrency and has the characteristics of anonymity. Blockchain technologies are gradually developing in the world and their applications have expanded to other areas such as cybersecurity, smart contract, 5G technology, internet of things (IoT), artificial intelligence (AI), education, etc. Basically, blockchain technology is based on a digital method in an accessing network to ensure trustworthy authentication and security. Recently, some researchers have studied the adoption of blockchain technology by optical networks. Kou
In this paper, we propose applying digital holography to blockchain technology for privacy information preservation and security, which is based on recent research and called an analog signature scheme using an RSA digital signature algorithm and phase-shifting digital holography (PSDH) [12]. This paper is organized as follows. In Section II, an overview of blockchain architecture is briefly presented and the proposed method to conduct blockchain technology using digital holography is described. The performance and feasibility of the proposed method are analyzed with research results in Section Ⅲ. Conclusions are summarized in Section Ⅳ.
Blockchain is a chain of blocks, and it is essentially a distributed database of information or a distributed transaction ledger in a P2P network without a centralized authority. The blockchain network consists of nodes, and each node has a copy of the same transaction. Typically, a participant who connects to the blockchain is called a node. Each block includes a transaction (
Blocks are validated using a computational process of PoW to ensure authentication. To carry out PoW, blockchain technology needs two cryptographic functions, hash and digital signature, which are used for signing and verifying information. A hash is represented as a one-way function that makes blockchain more secure and information in the blockchain immutable. A hash algorithm generates a fixed-length string of the input, where the output string is called an input hash value. Its features ensure that the blockchain cannot be tampered with. Figure 2 shows the blockchain linking through PoW. Network nodes interact with the blockchain using a hash and asymmetric cryptography with private/public key pairs. Each node converts block information including the previous hash and transactions into a hash using a hash algorithm. In most blockchains, Secure Hash Algorithm-256 (SHA-256) is used for the hash algorithm. This hash is converted to a digital signature by signing it with a private key. After transmitting the block to nodes in a network, the previous block’s hash is verified with a public key. If the node succeeds in verification, a new block is chained to its previous block and become a permanent block, and its information is not tampered with. Thus, the blockchain structure has a chronological chain of blocks from the genesis block to the current block. Blockchain technology can form a decentralized database in a secure way, providing the characteristics of robustness, transparency, and anonymity. Its principal applications range from cryptocurrency to business contracts, ensuring a secure digital identity. A major weakness of blockchain is its huge energy consumption and privacy information leakage.
No information communication system can avoid the problem of information insecurity. A well-known problem in blockchain schemes is transactional information privacy. Despite the advantages of blockchain with immutable and secure data management, it has still shortcomings in information privacy and confidentiality. Most users in the network are concerned about the traceability of individual information because block transactions are stored as public transactions that are propagated over the network. If individual privacy information is not preserved, hackers can easily track the target node by analyzing the transmitted transactions. Thus, privacy information protection becomes more important for information exchange and sharing. Several public key cryptographic algorithms can be adopted to protect privacy information, but these algorithms rely on their implementation. This paper is motivated by this challenge. Blockchain is a secure distributed information technology that involves network nodes, ensuring high anti-tampering reliability. So, we propose a blockchain-based privacy information protection authentication scheme to integrate digital holography technology with blockchain technology using a carefully designed block structure. It is effective to apply PSDH to blockchain. Essentially, to implement a privacy information protection scheme, the conventional digital signature algorithm used in PoW of blockchain is modified to a realizable asymmetric key algorithm using PSDH. Figure 3 shows the proposed blockchain-based information network consisting of nodes with PSDH. Schematically, the network consists of several nodes, which are participants in the blockchain system. Each node has PSDH hardware that is assumed to be implemented optically. PSDH consists of an optical Mach-Zehnder type interferometer to encrypt information. However, nodes should verify all the blockchain blocks, known as PoW consensus. These nodes (called full nodes) connect the blocks with transactions to the blockchain, and determine whether the blocks are valid. In contrast to public blockchain networks, the proposed blockchain network can be applied to a permissioned blockchain network because only the node with PSDH can validate the blocks and access the network. This means that the proposed blockchain is a kind of private blockchain network. Figure 4 shows a carefully designed block structure for the proposed blockchain algorithm. The proposed block structure consists of a header and a body. The header consists of a time stamp, version, number of transactions, Merkle root, nonce, and previous hash, while the body consists of a new transaction, three public key ciphers, and two digital signatures. In principle, a previous hash, a new transaction, a public key cipher, and a digital signature have the same format of 2D binary array data in this paper.
Blockchain mainly uses digital signatures to achieve consensus, verifying the proper transaction block generator, and preventing tampering with the wrongful transaction of unjustifiable nodes. Digital signatures use asymmetric cryptographic algorithms, that is, each node requires private/public key pairs. Figure 5 shows the PoW procedure for a new block linkage. As shown in Fig. 5, the digital signature algorithm includes two processes. The first operation is signature generation by signing the hash of transactions and the second operation is signature verification. To propose privacy information protection by applying digital holography to blockchain, we use the method reported in a previous paper [12], a proposal for an analog signature scheme based on RSA digital signature algorithm and phase-shifting digital holography. In [12], the term analog signature was used instead of digital signature because the encrypted digital signature forms a noise-like analog pattern. According to [12], which describes a method to modify the conventional digital signature algorithm into an optically realizable digital signature algorithm, the proposed solution would generate optical digital signatures of a hash and find an optically reconstructed hash. The optical architecture to create a new hash optimized for optical processing was not considered due to the complexity of optical implementation. This difficulty leads to a hybrid scheme that composes digital processing to produce hashes.
The PoW procedure for a new block linkage is described as follows. A block structure has a header and a body, as shown in Fig. 4. In this paper, a new transaction, public key ciphers, digital signatures in the body and only the previous hash excluding the left part in the header shown in Fig. 4 are assumed to be used in PoW for convenience. Two random numbers of 2D binary array
To generate private/public key pairs
On the other hand, a present block transaction
where ⴲ denotes XOR logic operation. Next, the signature execution node converts the present transaction
Originally, the private key
These digital signatures have a noise-like analog pattern so that a third party cannot deduce the original present hash while transmitting data. Now, the node disseminates two digital signatures DS1 and DS2 and releases three public key ciphers PC1, PC2, and PC3 to every node in the network. Similarly, public key ciphers have a noise-like pattern, which makes it difficult for a third party to find the binary data of public key
In the digital signature verification process, the node to verify digital signatures retrieves the public key
Next, to decrypt the present hash
If the computed hash value
On the one hand, a generated present transaction of Block N at Node N is generally obtained by
which is a sequential XOR logic operation of the previous transactions and the previous hashes of each block. To extract transaction information corresponding to each block, the following processing is operated as
where this processing is only allowed for authorized nodes in the network. The total number of new transactions in the body of Node N is stored in the header section of the block as shown in Fig. 4, and is referenced to recall the corresponding transaction.
The performance of the PoW procedure for a new block linkage as shown in Fig. 5 is evaluated for the feasibility of the proposed scheme. In this paper, we assume a block structure as shown in Fig. 4. Binary data of size 256 × 256 pixels (8,192 bytes) are used for a component of the block header and body including a previous hash, a new transaction, public key ciphers, and digital signatures, while data of size 16 × 8 pixels (16 bytes) is enough to express year, month, day, hour, minute, and second as a group of time stamps, 16 × 2 pixels (4 bytes) for version, 16 × 2 pixels for number of transactions, 16 × 2 pixels for Merkle root, and 16 × 2 pixels for nonce, respectively. However, we exclude the left part of the header in Fig. 4 for evaluation convenience.
The blockchain architecture as shown in Fig. 3 must start from a special block (the genesis block), which contains the first transaction initiated by a network. However, only a single blockchain exists, that is, a single sequence of blocks including all the information from the first transactions to the present transactions. This consequent linkage happens by the PoW procedure shown in Fig. 5. Simply, it is assumed that each node in the network creates its own block to join in the blockchain. The block contains privacy information such as an ID for accessing the network by a log-in process. As shown in Fig. 5, let us suppose two nodes, Node 3 and Node 4, have the same blockchain from Block 0 to Block 3. Now, Node 4 (the truthful identity of David) wants to create a new block, Block 4, and connects it to the legal blockchain by PoW consensus. Figure 6 shows data of two random numbers, private/public key pairs and a secret key. Figures 6(a) and 6(b) show two random numbers of 2D binary array
Figure 7 shows the generation of a transaction in the body of Block 4. For example, Node 4 makes its individual privacy information that is needed to register the log-in identity with the network, which is then encoded to QR code transaction
As described above, three public key ciphers are obtained by Eq. (1) and two digital signatures are obtained by Eq. (5) performing the function PSDH{∙}. Figure 8 shows intensity patterns of three public key ciphers (PC4_1, PC4_2, PC4_3) and two digital signatures (DS4_1, DS4_2), which form noise-like patterns by digital holography encryption.
In the digital signature verification process, the public key
Next, to evaluate the resistance to forgery from the perspective of protecting privacy information, it is assumed that a blockchain linkage from Block 0 to Block 4 was established by truthfully authorized nodes including all the information transactions. Now, an attacker tries to impersonate an authorized node, Node 4, to change privacy information of Block 4. The malicious node (the forged identity of Eve) makes a forged transaction of Block 4 and asks for a validation check. Figure 10 shows the generation of a forged transaction in the body of Block 4. Figures 10(a) and 10(b) show forged information of Node 4 and its QR code denoting a forged transaction
In checking the validity of the digital signature, changed decrypted public key ciphers and the forged transaction
In this paper, we propose a decentralized blockchain-based authentication scheme providing very high security and anonymity by the method of encrypting the individual transaction information of each block. Therefore, the real identity of each node cannot be revealed through data transmission and the transaction of the true block cannot be forged by a malicious hacker. The proposed method can be applied to a field handling the privacy identity of the node such as secure sensor data in a ubiquitous sensor network (USN) and state data in robot network nodes.
One of the emerging applications in blockchain technology is Bitcoin. In the case of the Bitcoin blockchain, the header data size of the block consists of 80 bytes. The details are as follows: Time stamp (4 bytes), version number (4 bytes), nonce (4 bytes), difficulty target (4 bytes), Merkle root (32 bytes), and hash of previous block header (32 bytes). In principle, the hash of the block header in the Bitcoin blockchain results in a 32-byte output using the SHA-256 hash algorithm. Compared to this algorithm, the proposed method is assumed to have a hash value of 8,192 bytes due to the 2D data of size 256 × 256 pixels. This means that the proposed hash algorithm is 256 times larger than the SHA-256 algorithm, and it is much more difficult to find a hash of the block header verifying it. Also, the weakness of the current blockchain technology is the small storage size in the body of a block, that is, the limitation of transaction descriptions in the blockchain. In a view of storage volume, the proposed method uses the block structure shown in Fig. 4, which is much more sufficient than conventional blockchain technology, to describe information of the block. If we expand data of size 512 × 512 pixels or 1024 × 1024 pixels for example, the hash value becomes too complicated to be hacked and the blockchain can store many transactions. In addition to this storage capacity, a very effective way is introduced in the method. We use a tool to convert the original information to a QR code. The text information shown in Fig. 7(a) is encoded to the QR code transaction shown in in Fig. 7(b). To protect privacy information and reduce the information size of all the transaction descriptions, we adopt an XOR logic operation between the transactions and the previous hash as Eq. (3). Despite this concise transaction expression, the privacy information of Node N is extracted sequentially by Eqs. (8) and (9). Next, we focus on considerations for a practical optical implementation of the proposed scheme. The most important part in the network shown as in Fig. 3 is the optical PSDH hardware to be used for encryption. The optical architecture of PSDH consists of spatial light modulators (SLMs), which are key components to represent input data. In the proposed method, the data size for processing blockchain technology is dependent on the displaying capability of the SLM. The commercial SLM can display the proposed data of size 256 × 256 pixels easily, and can even display an expanded data array. The limiting problem is that a precise phase type of SLM used in PSDH is very expensive to manufacture. Optical experiment for the proposed scheme will be needed in future work. A Merkle root is small-sized data in a block header summarizing all transactions in the block and a nonce is used for mining the blockchain system. Advanced research to consider the Merkle root and nonce in the block header will follow.
In this paper, we apply digital holography to blockchain technology and propose a novel secure authentication scheme for privacy information protection in a network. The proposed scheme features immutability, identity information privacy, and authentication security. A PoW consensus algorithm in the blockchain is executed to prove genuine authentication through digital holography encryption technology, resulting in legal block linkage. With a novel 2D array data structure design of the block, the PSDH technology generates a hash that is a random number of 2D array data. The proposed method provides a hash value of 8,192 bytes due to data of size 256 × 256 pixels, which is 256 times larger than the conventional SHA-256 algorithm. This means that it is much more difficult to find a hash of the block header verifying it with the proposed method. Also, the designed block structure of the 2D array allows much more sufficient storage to represent a large amount of transaction information of the block than that of the conventional blockchain. In addition, an effective way converting original information to QR code is introduced, and a combinational XOR logic operation between the transactions and the previous hash is adopted to protect privacy information. The real identity of each node cannot be revealed by a hacker while transmitting data, because the privacy information of nodes is encrypted using digital holography and stored in the blockchain. Also, a tamper-proof person cannot falsify privacy information by a forged transaction. The feasibility of the proposed scheme is analyzed by its performance evaluation. The principal application is a secure anonymity system guaranteeing privacy information protection for handling large amounts of information.
The authors declare no conflicts of interest.
Data underlying the results presented in this paper are not publicly available at the time of publication, and may be obtained from the authors upon reasonable request.
This work was supported by an Incheon National University (International Cooperative) Research Grant in 2020.
Incheon National University (International Cooperative) Research Grant in 2020.
Curr. Opt. Photon. 2022; 6(5): 453-462
Published online October 25, 2022 https://doi.org/10.3807/COPP.2022.6.5.453
Copyright © Optical Society of Korea.
Seok Hee Jeon1, Sang Keun Gil2
1Department of Electronic Engineering, Incheon National University, Incheon 22012, Korea
2Department of Electronic Engineering, The University of Suwon, Hwaseong 18323, Korea
Correspondence to:*skgil@suwon.ac.kr, ORCID 0000-0002-3828-0939
This is an Open Access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.org/licenses/by-nc/4.0/) which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.
Blockchain technology provides a decentralized and peer-to-peer network, which has the advantages of transparency and immutability. In this paper, a novel secure authentication scheme applying digital holography to blockchain technology is proposed to protect privacy information in network nodes. The transactional information of the node is chained permanently and immutably in the blockchain to ensure network security. By designing a novel two-dimensional (2D) array data structure of the block, a proof of work (PoW) in the blockchain is executed through digital holography technology to verify true authentication and legal block linkage. A hash generated from the proposed algorithm reveals a random number of 2D array data. The real identity of each node in the network cannot be forged by a hacker’s tampering because the privacy information of the node is encrypted using digital holography and stored in the blockchain. The reliability and feasibility of the proposed scheme are analyzed with the help of the research results, which evaluate the effectiveness of the proposed method. Forgery by a malicious node is impossible with the proposed method by rejecting a tampered transaction. The principal application is a secure anonymity system guaranteeing privacy information protection for handling of large information.
Keywords: Authentication, Blockchain technology, Digital holography, Hash, Optical encryption
If you are handling critical information in a specific application, you can access the information after a log-in process and may be asked to change specific information through authentication proof. However, simple authentication cannot be definitive proof because the log-in process itself may be wrongfully falsified, even if log-in actions are recorded chronologically. In a secure information system, it is a big problem if any piece of information can be substituted with false information by tampering. To prevent a tamper from falsifying information, the information must not be changed even if forged information asks to change the original true information. One method to keep the information from unchanging is that the majority of information loggers have truthful copies of information by a correct log-in scheme. The solution to this problem is that we have a protocol for recording the information in the log and distributing copies of it to network users, which composes a decentralized database. As one of the emerging methods in recent years, blockchain is essentially a distributed database that can overcome the drawbacks of a centralized database. The concept of blockchain technology was first proposed in 2008 by Nakamoto, who developed the first digital currency, Bitcoin [1], which is a decentralized peer-to-peer (P2P) cryptocurrency and has the characteristics of anonymity. Blockchain technologies are gradually developing in the world and their applications have expanded to other areas such as cybersecurity, smart contract, 5G technology, internet of things (IoT), artificial intelligence (AI), education, etc. Basically, blockchain technology is based on a digital method in an accessing network to ensure trustworthy authentication and security. Recently, some researchers have studied the adoption of blockchain technology by optical networks. Kou
In this paper, we propose applying digital holography to blockchain technology for privacy information preservation and security, which is based on recent research and called an analog signature scheme using an RSA digital signature algorithm and phase-shifting digital holography (PSDH) [12]. This paper is organized as follows. In Section II, an overview of blockchain architecture is briefly presented and the proposed method to conduct blockchain technology using digital holography is described. The performance and feasibility of the proposed method are analyzed with research results in Section Ⅲ. Conclusions are summarized in Section Ⅳ.
Blockchain is a chain of blocks, and it is essentially a distributed database of information or a distributed transaction ledger in a P2P network without a centralized authority. The blockchain network consists of nodes, and each node has a copy of the same transaction. Typically, a participant who connects to the blockchain is called a node. Each block includes a transaction (
Blocks are validated using a computational process of PoW to ensure authentication. To carry out PoW, blockchain technology needs two cryptographic functions, hash and digital signature, which are used for signing and verifying information. A hash is represented as a one-way function that makes blockchain more secure and information in the blockchain immutable. A hash algorithm generates a fixed-length string of the input, where the output string is called an input hash value. Its features ensure that the blockchain cannot be tampered with. Figure 2 shows the blockchain linking through PoW. Network nodes interact with the blockchain using a hash and asymmetric cryptography with private/public key pairs. Each node converts block information including the previous hash and transactions into a hash using a hash algorithm. In most blockchains, Secure Hash Algorithm-256 (SHA-256) is used for the hash algorithm. This hash is converted to a digital signature by signing it with a private key. After transmitting the block to nodes in a network, the previous block’s hash is verified with a public key. If the node succeeds in verification, a new block is chained to its previous block and become a permanent block, and its information is not tampered with. Thus, the blockchain structure has a chronological chain of blocks from the genesis block to the current block. Blockchain technology can form a decentralized database in a secure way, providing the characteristics of robustness, transparency, and anonymity. Its principal applications range from cryptocurrency to business contracts, ensuring a secure digital identity. A major weakness of blockchain is its huge energy consumption and privacy information leakage.
No information communication system can avoid the problem of information insecurity. A well-known problem in blockchain schemes is transactional information privacy. Despite the advantages of blockchain with immutable and secure data management, it has still shortcomings in information privacy and confidentiality. Most users in the network are concerned about the traceability of individual information because block transactions are stored as public transactions that are propagated over the network. If individual privacy information is not preserved, hackers can easily track the target node by analyzing the transmitted transactions. Thus, privacy information protection becomes more important for information exchange and sharing. Several public key cryptographic algorithms can be adopted to protect privacy information, but these algorithms rely on their implementation. This paper is motivated by this challenge. Blockchain is a secure distributed information technology that involves network nodes, ensuring high anti-tampering reliability. So, we propose a blockchain-based privacy information protection authentication scheme to integrate digital holography technology with blockchain technology using a carefully designed block structure. It is effective to apply PSDH to blockchain. Essentially, to implement a privacy information protection scheme, the conventional digital signature algorithm used in PoW of blockchain is modified to a realizable asymmetric key algorithm using PSDH. Figure 3 shows the proposed blockchain-based information network consisting of nodes with PSDH. Schematically, the network consists of several nodes, which are participants in the blockchain system. Each node has PSDH hardware that is assumed to be implemented optically. PSDH consists of an optical Mach-Zehnder type interferometer to encrypt information. However, nodes should verify all the blockchain blocks, known as PoW consensus. These nodes (called full nodes) connect the blocks with transactions to the blockchain, and determine whether the blocks are valid. In contrast to public blockchain networks, the proposed blockchain network can be applied to a permissioned blockchain network because only the node with PSDH can validate the blocks and access the network. This means that the proposed blockchain is a kind of private blockchain network. Figure 4 shows a carefully designed block structure for the proposed blockchain algorithm. The proposed block structure consists of a header and a body. The header consists of a time stamp, version, number of transactions, Merkle root, nonce, and previous hash, while the body consists of a new transaction, three public key ciphers, and two digital signatures. In principle, a previous hash, a new transaction, a public key cipher, and a digital signature have the same format of 2D binary array data in this paper.
Blockchain mainly uses digital signatures to achieve consensus, verifying the proper transaction block generator, and preventing tampering with the wrongful transaction of unjustifiable nodes. Digital signatures use asymmetric cryptographic algorithms, that is, each node requires private/public key pairs. Figure 5 shows the PoW procedure for a new block linkage. As shown in Fig. 5, the digital signature algorithm includes two processes. The first operation is signature generation by signing the hash of transactions and the second operation is signature verification. To propose privacy information protection by applying digital holography to blockchain, we use the method reported in a previous paper [12], a proposal for an analog signature scheme based on RSA digital signature algorithm and phase-shifting digital holography. In [12], the term analog signature was used instead of digital signature because the encrypted digital signature forms a noise-like analog pattern. According to [12], which describes a method to modify the conventional digital signature algorithm into an optically realizable digital signature algorithm, the proposed solution would generate optical digital signatures of a hash and find an optically reconstructed hash. The optical architecture to create a new hash optimized for optical processing was not considered due to the complexity of optical implementation. This difficulty leads to a hybrid scheme that composes digital processing to produce hashes.
The PoW procedure for a new block linkage is described as follows. A block structure has a header and a body, as shown in Fig. 4. In this paper, a new transaction, public key ciphers, digital signatures in the body and only the previous hash excluding the left part in the header shown in Fig. 4 are assumed to be used in PoW for convenience. Two random numbers of 2D binary array
To generate private/public key pairs
On the other hand, a present block transaction
where ⴲ denotes XOR logic operation. Next, the signature execution node converts the present transaction
Originally, the private key
These digital signatures have a noise-like analog pattern so that a third party cannot deduce the original present hash while transmitting data. Now, the node disseminates two digital signatures DS1 and DS2 and releases three public key ciphers PC1, PC2, and PC3 to every node in the network. Similarly, public key ciphers have a noise-like pattern, which makes it difficult for a third party to find the binary data of public key
In the digital signature verification process, the node to verify digital signatures retrieves the public key
Next, to decrypt the present hash
If the computed hash value
On the one hand, a generated present transaction of Block N at Node N is generally obtained by
which is a sequential XOR logic operation of the previous transactions and the previous hashes of each block. To extract transaction information corresponding to each block, the following processing is operated as
where this processing is only allowed for authorized nodes in the network. The total number of new transactions in the body of Node N is stored in the header section of the block as shown in Fig. 4, and is referenced to recall the corresponding transaction.
The performance of the PoW procedure for a new block linkage as shown in Fig. 5 is evaluated for the feasibility of the proposed scheme. In this paper, we assume a block structure as shown in Fig. 4. Binary data of size 256 × 256 pixels (8,192 bytes) are used for a component of the block header and body including a previous hash, a new transaction, public key ciphers, and digital signatures, while data of size 16 × 8 pixels (16 bytes) is enough to express year, month, day, hour, minute, and second as a group of time stamps, 16 × 2 pixels (4 bytes) for version, 16 × 2 pixels for number of transactions, 16 × 2 pixels for Merkle root, and 16 × 2 pixels for nonce, respectively. However, we exclude the left part of the header in Fig. 4 for evaluation convenience.
The blockchain architecture as shown in Fig. 3 must start from a special block (the genesis block), which contains the first transaction initiated by a network. However, only a single blockchain exists, that is, a single sequence of blocks including all the information from the first transactions to the present transactions. This consequent linkage happens by the PoW procedure shown in Fig. 5. Simply, it is assumed that each node in the network creates its own block to join in the blockchain. The block contains privacy information such as an ID for accessing the network by a log-in process. As shown in Fig. 5, let us suppose two nodes, Node 3 and Node 4, have the same blockchain from Block 0 to Block 3. Now, Node 4 (the truthful identity of David) wants to create a new block, Block 4, and connects it to the legal blockchain by PoW consensus. Figure 6 shows data of two random numbers, private/public key pairs and a secret key. Figures 6(a) and 6(b) show two random numbers of 2D binary array
Figure 7 shows the generation of a transaction in the body of Block 4. For example, Node 4 makes its individual privacy information that is needed to register the log-in identity with the network, which is then encoded to QR code transaction
As described above, three public key ciphers are obtained by Eq. (1) and two digital signatures are obtained by Eq. (5) performing the function PSDH{∙}. Figure 8 shows intensity patterns of three public key ciphers (PC4_1, PC4_2, PC4_3) and two digital signatures (DS4_1, DS4_2), which form noise-like patterns by digital holography encryption.
In the digital signature verification process, the public key
Next, to evaluate the resistance to forgery from the perspective of protecting privacy information, it is assumed that a blockchain linkage from Block 0 to Block 4 was established by truthfully authorized nodes including all the information transactions. Now, an attacker tries to impersonate an authorized node, Node 4, to change privacy information of Block 4. The malicious node (the forged identity of Eve) makes a forged transaction of Block 4 and asks for a validation check. Figure 10 shows the generation of a forged transaction in the body of Block 4. Figures 10(a) and 10(b) show forged information of Node 4 and its QR code denoting a forged transaction
In checking the validity of the digital signature, changed decrypted public key ciphers and the forged transaction
In this paper, we propose a decentralized blockchain-based authentication scheme providing very high security and anonymity by the method of encrypting the individual transaction information of each block. Therefore, the real identity of each node cannot be revealed through data transmission and the transaction of the true block cannot be forged by a malicious hacker. The proposed method can be applied to a field handling the privacy identity of the node such as secure sensor data in a ubiquitous sensor network (USN) and state data in robot network nodes.
One of the emerging applications in blockchain technology is Bitcoin. In the case of the Bitcoin blockchain, the header data size of the block consists of 80 bytes. The details are as follows: Time stamp (4 bytes), version number (4 bytes), nonce (4 bytes), difficulty target (4 bytes), Merkle root (32 bytes), and hash of previous block header (32 bytes). In principle, the hash of the block header in the Bitcoin blockchain results in a 32-byte output using the SHA-256 hash algorithm. Compared to this algorithm, the proposed method is assumed to have a hash value of 8,192 bytes due to the 2D data of size 256 × 256 pixels. This means that the proposed hash algorithm is 256 times larger than the SHA-256 algorithm, and it is much more difficult to find a hash of the block header verifying it. Also, the weakness of the current blockchain technology is the small storage size in the body of a block, that is, the limitation of transaction descriptions in the blockchain. In a view of storage volume, the proposed method uses the block structure shown in Fig. 4, which is much more sufficient than conventional blockchain technology, to describe information of the block. If we expand data of size 512 × 512 pixels or 1024 × 1024 pixels for example, the hash value becomes too complicated to be hacked and the blockchain can store many transactions. In addition to this storage capacity, a very effective way is introduced in the method. We use a tool to convert the original information to a QR code. The text information shown in Fig. 7(a) is encoded to the QR code transaction shown in in Fig. 7(b). To protect privacy information and reduce the information size of all the transaction descriptions, we adopt an XOR logic operation between the transactions and the previous hash as Eq. (3). Despite this concise transaction expression, the privacy information of Node N is extracted sequentially by Eqs. (8) and (9). Next, we focus on considerations for a practical optical implementation of the proposed scheme. The most important part in the network shown as in Fig. 3 is the optical PSDH hardware to be used for encryption. The optical architecture of PSDH consists of spatial light modulators (SLMs), which are key components to represent input data. In the proposed method, the data size for processing blockchain technology is dependent on the displaying capability of the SLM. The commercial SLM can display the proposed data of size 256 × 256 pixels easily, and can even display an expanded data array. The limiting problem is that a precise phase type of SLM used in PSDH is very expensive to manufacture. Optical experiment for the proposed scheme will be needed in future work. A Merkle root is small-sized data in a block header summarizing all transactions in the block and a nonce is used for mining the blockchain system. Advanced research to consider the Merkle root and nonce in the block header will follow.
In this paper, we apply digital holography to blockchain technology and propose a novel secure authentication scheme for privacy information protection in a network. The proposed scheme features immutability, identity information privacy, and authentication security. A PoW consensus algorithm in the blockchain is executed to prove genuine authentication through digital holography encryption technology, resulting in legal block linkage. With a novel 2D array data structure design of the block, the PSDH technology generates a hash that is a random number of 2D array data. The proposed method provides a hash value of 8,192 bytes due to data of size 256 × 256 pixels, which is 256 times larger than the conventional SHA-256 algorithm. This means that it is much more difficult to find a hash of the block header verifying it with the proposed method. Also, the designed block structure of the 2D array allows much more sufficient storage to represent a large amount of transaction information of the block than that of the conventional blockchain. In addition, an effective way converting original information to QR code is introduced, and a combinational XOR logic operation between the transactions and the previous hash is adopted to protect privacy information. The real identity of each node cannot be revealed by a hacker while transmitting data, because the privacy information of nodes is encrypted using digital holography and stored in the blockchain. Also, a tamper-proof person cannot falsify privacy information by a forged transaction. The feasibility of the proposed scheme is analyzed by its performance evaluation. The principal application is a secure anonymity system guaranteeing privacy information protection for handling large amounts of information.
The authors declare no conflicts of interest.
Data underlying the results presented in this paper are not publicly available at the time of publication, and may be obtained from the authors upon reasonable request.
This work was supported by an Incheon National University (International Cooperative) Research Grant in 2020.
Incheon National University (International Cooperative) Research Grant in 2020.