Journal on Communications ›› 2022, Vol. 43 ›› Issue (8): 131-141.doi: 10.11959/j.issn.1000-436x.2022162
• Papers • Previous Articles Next Articles
Xuewang ZHANG1,2, Zhihong LI1, Jinzhao LIN3
Revised:
2022-08-05
Online:
2022-08-25
Published:
2022-08-01
Supported by:
CLC Number:
Xuewang ZHANG, Zhihong LI, Jinzhao LIN. Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain[J]. Journal on Communications, 2022, 43(8): 131-141.
"
文件大小/kbit | 消耗时长/ms | |||
文献[ | 文献[ | 文献[ | 本文方案 | |
5 | 19.161 | 37.132 | 6.723 | 5.173 |
10 | 37.718 | 75.923 | 12.684 | 10.002 |
15 | 55.892 | 109.851 | 14.015 | 13.746 |
20 | 62.902 | 129.55 | 18.762 | 16.714 |
25 | 87.91 | 166.82 | 22.516 | 23.619 |
30 | 95.725 | 189.345 | 26.271 | 25.272 |
35 | 111.94 | 219.876 | 31.151 | 29.485 |
40 | 125.856 | 253.451 | 36.417 | 33.167 |
45 | 140.121 | 277.623 | 39.438 | 36.931 |
50 | 150.85 | 303.67 | 43.787 | 39.043 |
"
文件大小/kbit | 消耗时长/ms | |||
文献[ | 文献[ | 文献[ | 本文方案 | |
5 | 2.218 | 21.055 | 6.702 | 1.065 |
10 | 4.093 | 36.302 | 12.661 | 1.606 |
15 | 6.315 | 47.413 | 13.937 | 2.438 |
20 | 7.957 | 60.399 | 18.758 | 2.979 |
25 | 10.126 | 69.764 | 22.488 | 3.732 |
30 | 13.093 | 82.301 | 26.250 | 4.643 |
35 | 15.411 | 95.621 | 31.083 | 5.413 |
40 | 16.258 | 115.632 | 36.389 | 5.965 |
45 | 18.539 | 128.456 | 39.217 | 6.534 |
50 | 21.145 | 137.031 | 42.856 | 7.586 |
[1] | GAI K K , WU Y L , ZHU L H ,et al. Privacy-preserving energy trading using consortium blockchain in smart grid[J]. IEEE Transactions on Industrial Informatics, 2019,15(6): 3548-3558. |
[2] | DU M X , CHEN Q J , XIAO J ,et al. Supply chain finance innovation using blockchain[J]. IEEE Transactions on Engineering Management, 2020,67(4): 1045-1058. |
[3] | 李娟娟, 袁勇, 王飞跃 . 基于区块链的数字货币发展现状与展望[J]. 自动化学报, 2021,47(4): 715-729. |
LI J J , YUAN Y , WANG F Y . Blockchain-based digital currency:the state of the art and future trends[J]. Acta Automatica Sinica, 2021,47(4): 715-729. | |
[4] | ZHANG X H , CHEN X F . Data security sharing and storage based on a consortium blockchain in a vehicular ad-hoc network[J]. IEEE Access, 2019,7: 58241-58254. |
[5] | SHE W , GU Z H , LYU X K ,et al. Homomorphic consortium blockchain for smart home system sensitive data privacy preserving[J]. IEEE Access, 2019,7: 62058-62070. |
[6] | 谭海波, 周桐, 赵赫 ,等. 基于区块链的档案数据保护与共享方法[J]. 软件学报, 2019,30(9): 2620-2635. |
TAN H B , ZHOU T , ZHAO H ,et al. Archival data protection and sharing method based on blockchain[J]. Journal of Software, 2019,30(9): 2620-2635. | |
[7] | ZHENG Z B , XIE S A , DAI H N ,et al. Blockchain challenges and opportunities:a survey[J]. International Journal of Web and Grid Services, 2018,14(4): 352. |
[8] | 朱立, 俞欢, 詹士潇 ,等. 高性能联盟区块链技术研究[J]. 软件学报, 2019,30(6): 1577-1593. |
ZHU L , YU H , ZHAN S X ,et al. Research on high-performance consortium blockchain technology[J]. Journal of Software, 2019,30(6): 1577-1593. | |
[9] | FENG Q , HE D B , ZEADALLY S ,et al. A survey on privacy protection in blockchain system[J]. Journal of Network and Computer Applications, 2019,126: 45-58. |
[10] | 王晨旭, 程加成, 桑新欣 ,等. 区块链数据隐私保护:研究现状与展望[J]. 计算机研究与发展, 2021,58(10): 2099-2119. |
WANG C X , CHENG J C , SANG X X ,et al. Data privacy-preserving for blockchain:state of the art and trends[J]. Journal of Computer Research and Development, 2021,58(10): 2099-2119. | |
[11] | CHAUM D , HEYST V E . Group signatures[C]// Proceedings of the 10th Annual International Conference on Theory and Application of Cryptographic Techniques (EUROCRYPT’91). Berlin:Springer, 1991: 257-265. |
[12] | KOMANO Y , OHTA K , SHIMBO A ,et al. Toward the fair anonymous signatures:deniable ring signatures[J]. IEICE Transactions on Fundamentals of Electronics,Communications and Computer Sciences, 2007,E90-A(1): 54-64. |
[13] | LINDELL Y , PINKAS B . Secure multiparty computation for privacy-preserving data mining[J]. Journal of Privacy and Confidentiality, 2012,25(2): 761-766. |
[14] | CHAUM D , . Blind signatures for untraceable payments[C]// Advances in Cryptology. Berlin:Springer, 1983: 199-203. |
[15] | ZHANG S J , LEE J H . A group signature and authentication scheme for blockchain-based mobile-edge computing[J]. IEEE Internet of Things Journal, 2020,7(5): 4557-4565. |
[16] | LI X F , MEI Y R , GONG J ,et al. A blockchain privacy protection scheme based on ring signature[J]. IEEE Access, 2020,8: 76765-76772. |
[17] | STADLER M , PIVETEAU J M , CANENISCH J . Fair blind signatures[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Berlin:Springer, 1995: 209-219. |
[18] | 李瑞琪, 贾春福, 王雅飞 . 基于NTRU的多密钥同态代理重加密方案及其应用[J]. 通信学报, 2021,42(3): 11-22. |
LI R Q , JIA C F , WANG Y F . Multi-key homomorphic proxy re-encryption scheme based on NTRU and its application[J]. Journal on Communications, 2021,42(3): 11-22. | |
[19] | 王后珍, 蔡鑫伟, 郭岩 ,等. 基于矩阵填充问题的五轮零知识身份认证方案[J]. 通信学报, 2021,42(11): 79-86. |
WANG H Z , CAI X W , GUO Y ,et al. 5-pass zero-knowledge identity authentication scheme based on matrix completion problem[J]. Journal on Communications, 2021,42(11): 79-86. | |
[20] | ZHANG R , XUE R , LIU L . Security and privacy on blockchain[J]. ACM Computing Surveys, 2020,52(3): 1-34. |
[21] | 李宇溪, 周福才, 徐紫枫 . 支持K-近邻搜索的移动社交网络隐私保护方案[J]. 计算机学报, 2021,44(7): 1481-1500. |
LI Y X , ZHOU F C , XU Z F . Privacy-preserving K-nearest-neighbor search over mobile social network[J]. Chinese Journal of Computers, 2021,44(7): 1481-1500. | |
[22] | DOWLIN N , GILAD-BACHRACH R ,, LAINE K ,et al. Manual for using homomorphic encryption for bioinformatics[J]. Proceedings of the IEEE, 2017,105(3): 552-567. |
[23] | GENTRY C , . A fully homomorphic encryption scheme using ideal lattices[C]// Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing. New York:ACM Press, 2009: 169-178. |
[24] | ACAR A , AKSU H , ULUAGAC A S ,et al. A survey on homomorphic encryption schemes:theory and implementation[J]. ACM Computing Surveys, 2018,51(4): 1-35. |
[25] | 于戈, 聂铁铮, 李晓华 ,等. 区块链系统中的分布式数据管理技术:挑战与展望[J]. 计算机学报, 2021,44(1): 28-54. |
YU G , NIE T Z , LI X H ,et al. The challenge and prospect of distributed data management techniques in blockchain systems[J]. Chinese Journal of Computers, 2021,44(1): 28-54. | |
[26] | CHRISTIAN C , . Architecture of the hyperledger blockchain fabric[C]// Proceedings of the Workshop on Distributed Cryptocurrencies and Consensus Ledgers. New York:ACM Press, 2016: 14-17. |
[27] | ANDROULAKI E , BARGER A , BORTNIKOV V ,et al. Hyperledger fabric:a distributed operating system for permissioned blockchains[C]// Proceedings of the Thirteenth EuroSys Conference. New York:ACM Press, 2018: 1-30. |
[28] | 徐文玉, 吴磊, 阎允雪 . 基于区块链和同态加密的电子健康记录隐私保护方案[J]. 计算机研究与发展, 2018,55(10): 2233-2243. |
XU W Y , WU L , YAN Y X . Privacy-preserving scheme of electronic health records based on blockchain and homomorphic encryption[J]. Journal of Computer Research and Development, 2018,55(10): 2233-2243. | |
[29] | PHONG L T , AONO Y , HAYASHI T ,et al. Privacy-preserving deep learning via additively homomorphic encryption[J]. IEEE Transactions on Information Forensics and Security, 2018,13(5): 1333-1345. |
[30] | PAILLIER P , . Public-key cryptosystems based on composite degree residuosity classes[C]// Proceedings of EUROCRYPT 1999. Berlin:Springer, 1999: 223-238. |
[31] | WANG Q , QIN B , HU J K ,et al. Preserving transaction privacy in bitcoin[J]. Future Generation Computer Systems, 2020,107: 793-804. |
[32] | GAUTAM P , ANSARI M D , SHARMA S K . Enhanced security for electronic health care information using obfuscation and RSA algorithm in cloud computing[J]. International Journal of Information Security and Privacy, 2019,13(1): 59-69. |
[1] | Xindi MA, Qinghua LI, Qi JIANG, Zhuo MA, Sheng GAO, Youliang TIAN, Jianfeng MA. Byzantine-robust federated learning over Non-IID data [J]. Journal on Communications, 2023, 44(6): 138-153. |
[2] | Tao FENG, Liqiu CHEN, Junli FANG, Jianming SHI. Blockchain data sharing scheme based on localized difference privacy and attribute-based searchable encryption [J]. Journal on Communications, 2023, 44(5): 224-233. |
[3] | Baiji HU, Xiaojuan ZHANG, Yuancheng LI, Rongxin LAI. Multi-function supported privacy protection data aggregation scheme for V2G network [J]. Journal on Communications, 2023, 44(4): 187-200. |
[4] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[5] | Shengxing YU, Zhong CHEN. Efficient secure federated learning aggregation framework based on homomorphic encryption [J]. Journal on Communications, 2023, 44(1): 14-28. |
[6] | Yatao YANG, Deli LIU, Peihe LIU, Ping ZENG, Song XIAO. BFV-Blockchainvoting: blockchain-based electronic voting systems with BFV full homomorphic encryption [J]. Journal on Communications, 2022, 43(9): 100-111. |
[7] | Xia FENG, Kaiping CUI, Qingqing XIE, Liangmin WANG. Distributed anonymous authentication scheme based on the blockchain in VANET [J]. Journal on Communications, 2022, 43(9): 134-147. |
[8] | Jifeng WANG, Guofeng WANG. Research on ciphertext search and sharing technology in edge computing mode [J]. Journal on Communications, 2022, 43(4): 227-238. |
[9] | Huamin FENG, Rui SHI, Feng YUAN, Yanjun LI, Yang YANG. Efficient strong privacy protection and transferable attribute-based ticket scheme [J]. Journal on Communications, 2022, 43(3): 63-75. |
[10] | Haining YU, Hongli ZHANG, Xiangzhan YU, Jiaxing QU, Mengmeng GE. Privacy-preserving trajectory similarity computation method [J]. Journal on Communications, 2022, 43(11): 1-13. |
[11] | Yan YAN, Yiming CONG, Mahmood Adnan, Quanzheng SHENG. Statistics release and privacy protection method of location big data based on deep learning [J]. Journal on Communications, 2022, 43(1): 203-216. |
[12] | Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG. Privacy protection of warning message publishing protocol in VANET [J]. Journal on Communications, 2021, 42(8): 120-129. |
[13] | Hongtao LI, Xiaoyu REN, Jie WANG, Jianfeng MA. Continuous location privacy protection mechanism based on differential privacy [J]. Journal on Communications, 2021, 42(8): 164-175. |
[14] | Wenbo ZHANG, Wenhua HUANG, Jingyu FENG. Secure communication mechanism for VSN based on certificateless signcryption [J]. Journal on Communications, 2021, 42(7): 128-136. |
[15] | Jie CUI, Xuefeng CHEN, Jing ZHANG, Lu WEI, Hong ZHONG. Bus cache-based location privacy protection scheme in the Internet of vehicles [J]. Journal on Communications, 2021, 42(7): 150-161. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|