面向电子商务的秘密共享与可验证透明日志融合机制研究
A Study on an Integrated Mechanism of Secret Sharing and Verifiable Transparency Logs for E-Commerce
摘要: 电子商务平台在支付签名、订单隐私保护、履约存证、售后仲裁与监管取证等环节中长期处理高敏感数据与高价值密钥。首先,针对电子商务中平台集中持密带来的密钥滥用、内部越权与单点失效等问题,本文提出一种将秘密共享与可验证透明日志融合的关键数据保护机制,使高价值密钥材料以碎片形式分布式存储并以阈值方式协同使用,同时以不可篡改的审计证据链提升事后可追责性。其次,构建覆盖订单支付、退款仲裁、商家结算与合规取证的统一体系架构,给出密钥生成、碎片协同用密、证据追加写入与可验证审计的一体化协议,并以承诺一致性机制约束恶意节点或不一致分发。最后,在统一威胁模型下,从机密性、完整性、可用性与可审计性四类目标出发,补充安全性分析与性能评估方法,量化阈值、节点可用性与日志证明长度对业务时延与故障模式的影响,为电子商务构建“分布式信任与可验证治理”的安全基础设施提供有效路径。
Abstract: E-commerce platforms have long handled highly sensitive data and high-value cryptographic keys in processes such as payment signing, order privacy protection, fulfillment evidence preservation, after-sales arbitration, and regulatory forensics. First, to address risks arising from centralized key custody in e-commerce—such as key misuse, insider privilege abuse, and single points of failure—this paper proposes a critical data protection mechanism that integrates secret sharing with verifiable transparency logs. High-value key material is stored in a distributed manner as shares and used collaboratively under a threshold scheme, while a tamper-evident audit evidence chain enhances ex post accountability. Second, we build a unified architecture covering order payments, refund arbitration, merchant settlement, and compliance forensics, and present an integrated protocol suite for key generation, cooperative threshold key usage, append-only evidence logging, and verifiable auditing, together with a commitment-consistency mechanism to constrain malicious participants or inconsistent distribution. Finally, under a unified threat model, we supplement security and performance evaluation methods from four objectives—confidentiality, integrity, availability, and auditability—and quantify how the threshold, node availability, and log proof length affect service latency and failure modes, providing an effective path toward security infrastructure for “distributed trust and verifiable governance” in e-commerce.
参考文献
|
[1]
|
Shamir, A. (1979) How to Share a Secret. Communications of the ACM, 22, 612-613. [Google Scholar] [CrossRef]
|
|
[2]
|
Feldman, P. (1987) A practical Scheme for Non-Interactive Verifiable Secret Sharing. Proceedings of the 28th Annual Symposium on Foundations of Computer Science (FOCS). Los Alamitos, 12-14 October 1987, 427-438. [Google Scholar] [CrossRef]
|
|
[3]
|
Pedersen, T.P. (1991) Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing. In: Feigenbaum, J., Ed., Lecture Notes in Computer Science, Springer, 129-140. [Google Scholar] [CrossRef]
|
|
[4]
|
蔡晓晴, 王勇, 陈纯. 区块链原理及其核心技术[J]. 计算机学报, 2021, 44(1): 84-131.
|
|
[5]
|
于戈, 王帅, 赵宏宇. 区块链系统中的分布式数据管理技术——挑战与展望[J]. 计算机学报, 2021, 44(1): 28-54.
|
|
[6]
|
邵奇峰, 金澈清, 张召辉, 等. 企业级区块链技术综述[J]. 软件学报, 2019, 30(9): 2603-2625.
|
|
[7]
|
冯琦, 何德彪, 罗敏, 李莉. 移动互联网环境下轻量级SM2两方协同签名[J]. 计算机研究与发展, 2020, 57(10): 2136-2146.
|
|
[8]
|
孙泽雨, 吴敬征, 凌祥, 等. 软件供应链SBOM关键技术研究[J]. 软件学报, 2025, 36(6): 2604-2642.
|
|
[9]
|
(2024) Nowhere to Hide: Using Transparency Logs to Secure Your Supply Chain. ACM Digital Library.
|
|
[10]
|
中国互联网协会. 软件安全开发能力成熟度模型与评估方法[S]. 北京: 中国互联网协会, 2024. https://www.isc.org.cn/
|
|
[11]
|
国家市场监督管理总局, 国家标准化管理委员会. 信息安全技术网络安全等级保护基本要求: GB/T 22239-2019 [S]. 北京: 中国标准出版社, 2019.
|
|
[12]
|
国家市场监督管理总局, 国家标准化管理委员会. 信息技术安全技术信息安全管理体系要求: GB/T 22080-2016 [S]. 北京: 中国标准出版社, 2016.
|
|
[13]
|
Open Source Security Foundation (2023) Supply-Chain Levels for Software Artifacts (SLSA) Specification. https://slsa.dev/spec/
|