【Author】 Zhaolu, Tianyu Wan, Zhiguo Wang, Huaqun
CCF-A
【影响因子】7.231
【主题类别】
区块链应用-实体经济-支付领域
【Abstract】Decentralized anonymous payment schemes may be exploited for illicit activities, such as money laundering, bribery and blackmail. To address this issue, several regulatory-friendly decentralized anonymous payment schemes have been proposed. However, most of these solutions lack restrictions on the regulator's authority, which could potentially result in power abuse and privacy breaches. In this paper, we present a decentralized anonymous payment scheme with collaborative regulation (DAPCR). Unlike existing solutions, DAPCR reduces the risk of power abuse by distributing regulatory authority to two entities: Filter and Supervisor, neither of which can decode transactions to access transaction privacy without the assistance of the other one. Our scheme enjoys three major advantages over others: 1) Universality, achieved by using zk-SNARK to extend privacy-preserving transactions for regulation. 2) Collaborative regulation, attained by adding the ring signature with controllable linkability to the transaction. 3) Efficient aggregation of payment amounts, achieved through amount tags. As a key technology for realizing collaborative regulation in DAPCR, the ring signature with controllable linkability (CLRS) is proposed, where a user needs to specify a linker and an opener to generate a signature. The linker can extract pseudonyms from signatures and link signatures submitted by the same signer based on pseudonyms, without leaking the signer's identity. The opener can recover the signer's identity from a given pseudonym. The experimental results reflect the efficiency of DAPCR. The time overhead for transaction generation is 1231.2ms, representing an increase of less than 50% compared to ZETH. Additionally, the time overhead for transaction verification is only 1.2ms.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Regulation; Filtering algorithms; Collaboration; Blockchains; Security; Regulators; Information filters; Ring signature; blockchain; cryptocurrency; regulation; decentralized finance
【发表时间】2024
【收录时间】2024-03-07
【文献类型】 实验仿真
【Author】 Wei, Zeming Fang, Jiawen Hong, Zhicheng Zhou, Yu Ma, Shansi Zhang, Junlang Liang, Chufeng Zhao, Gansen Tang, Hua
【影响因子】2.838
【主题类别】
区块链技术-协同技术-隐私保护
【Abstract】Blockchain is a distributed ledger technology that possesses characteristics such as decentralization, tamper resistance, and programmability. However, while blockchain ensures transaction openness and transparency, transaction privacy is also at risk of being exposed. Therefore, this paper proposes the blockchain transaction privacy protection method based on the stealth address and the note mechanism to address the privacy leakage risk in blockchain public environments. Firstly, the proposed method generates a random seed known only to the parties involved based on the Diffie-Hellman key exchange protocol, ensuring the privacy of transactions. Then, it utilizes the Note Commitments table to maintain the binding relationship between the stealth address and the corresponding note, enabling efficient transfer and verification of note ownership. The uniqueness of the stealth address is utilized as an invalidation identifier for notes in the Nullifier table, ensuring efficient verification of the correctness of note invalidation identifiers. Additionally, this method employs Pedersen commitment and Bulletproofs range proof to generate proof of the legality of transaction amounts, enabling the concealment of transaction amounts and facilitating private transactions between the parties involved. Finally, this paper presents a detailed performance analysis, implementation, and testing of the method. From the results, it can be concluded that the method proposed can effectively prevent fraudulent behavior by various transaction participants and ensure the security, privacy, and integrity of the transaction. Critical processes consume only milliseconds, and the related commitments and proofs are also minimal, which is crucial for controlling transaction costs. At the same time, this method achieves a completely decentralized privacy transaction solution.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; privacy protection; transaction
【发表时间】2024
【收录时间】2024-03-07
【文献类型】 实验仿真
【DOI】 10.3390/app14041642
【Author】 Luo, Haotian Mei, Niansong Du, Chong
【影响因子】2.303
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】The blockchain-based Electronic Medical Record (EMR) data storage system encounters challenges which are data leakage, insufficient access control, and low retrieval efficiency. In response to these issues, this paper proposes a lightweight searchable encryption and access control system for sharing EMR data securely. The lightweight searchable encryption scheme which is achieved by integrating the trapdoor verification phase with the keyword retrieval phase is constructed using BGG13 + and MP12. User access control is implemented through a Boolean circuit to replace arithmetic operations and thus improve arithmetic efficiency. Since logic operations can reduce the computation time, this paper uses Boolean circuits for user rights verification implementation. In addition, this paper adopts the Bloom filter as the system index to enhance the efficiency of block-chain data retrieval. According to the simulation results, there is a performance advantage of this system over similar systems.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】EMR; Block-chain; Attribute-based encryption; Searchable encryption
【发表时间】2024
【收录时间】2024-03-07
【文献类型】 实验仿真
【Author】 Liao, Peng Liu, Chaoge Yin, Jie Wang, Zhi Cui, Xiang
【影响因子】2.027
【主题类别】
区块链应用-虚拟经济-NFT
【Abstract】Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens (NFTs). To be specific, the total trading volume of digital assets reached an astounding $55.5 billion in 2022. Nevertheless, numerous security concerns have been raised by the rapid expansion of the NFT ecosystem. NFT holders are exposed to a plethora of scams and traps, putting their digital assets at risk of being lost. However, academic research on NFT security is scarce, and the security issues have aroused rare attention. In this study, the NFT ecological process is comprehensively explored. This process falls into five different stages encompassing the entire lifecycle of NFTs. Subsequently, the security issues regarding the respective stage are elaborated and analyzed in depth. A matrix model is proposed as a novel contribution to the categorization of NFT security issues. Diverse data are collected from social networks, the Ethereum blockchain, and NFT markets to substantiate our claims regarding the severity of security concerns in the NFT ecosystem. From this comprehensive dataset, nine key NFT security issues are identified from the matrix model and then subjected to qualitative and quantitative analysis. This study aims to shed light on the severity of NFT ecosystem security issues. The findings stress the need for increased attention and proactive measures to safeguard the NFT ecosystem.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Non-fungible token; blockchain; cyber security
【发表时间】2024
【收录时间】2024-03-07
【文献类型】 实证数据
【影响因子】1.831
【主题类别】
区块链应用-实体经济-航空航天
【Abstract】With the development of technology, data has become more accessible. The storage of critical and valuable information is getting harder and harder with the increase of cyber attacks and vulnerabilities of network and internet. The centralized storage of data causes security and privacy problems. As a remedy to these problems, blockchain has occurred. The reliability, transparency, integrity and confidentiality of the data have been increased with the blockchain technology. Blockchain maintains the immutability of the data with cryptographic hash algorithms. The data is kept in distributed structures with the consensus algorithms so that it is not lost. Projects and studies using blockchain technology have shown that data stored in centralized structures is not as reliable as data that is distributed and secured by cryptographic algorithms, smart contracts, and consensus. The data of flights, which is a critical data, has a great place in world transportation. The parameters inside the black boxes guide us on why the aircrafts have crashed: whether the responsibility belongs to the manufacturer, to the pilot, or to the aircraft technicians. In this way, the real reasons of the accident may be determined and measures can be taken for the accidents that may occur afterwards. In addition, the safe delivery of all black box data to the interested parties and its storage in a way that is immutable will not only benefit to the manufacturer's self-development by processing the data, but also help flight companies to find optimum flight data. Both the flight companies and the manufacturer will be able to read the black box data, thus the suspicion of data manipulation will be eliminated and the data will become more transparent. In this study, a system is proposed in which an aircraft's black box data can be saved safely and securely with the help of blockchain technology.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】black box; black box modeling; blockchain; hyperledger
【发表时间】2024
【收录时间】2024-03-07
【文献类型】 实验仿真
【DOI】 10.1002/cpe.8057
【Author】 Yang, XiaoHui Li, TianChang
CCF-C
【影响因子】0.000
【主题类别】
区块链技术-协同技术-联邦学习
【Abstract】Federated Learning (FL) has gained prominence as a machine learning framework incorporating privacy-preserving mechanisms. However, challenges such as poisoning attacks and free rider attacks underscore the need for advanced security measures. Therefore, this paper proposes a novel framework that integrates federated learning with blockchain technology to facilitate secure model aggregation and fair incentives in untrustworthy environments. The framework designs a reputation evaluation method using quality as an indicator, and a consensus method based on reputation feedback. The trustworthiness of nodes is dynamically assessed to achieve an efficient and trustworthy model aggregation process while avoiding reputation monopolisation. Furthermore, the paper defines a tailored contribution calculation process for nodes in different roles in an untrusted environment. A reward and punishment scheme based on the joint constraints of contribution and reputation is proposed to attract highly qualified workers to actively participate in federated learning tasks. Theoretical analysis and simulation experiments demonstrate the framework's ability to maintain efficient and secure aggregation under a certain degree of attack while achieving fair incentives for each role node with significantly reduced consensus consumption.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Federated learning; blockchain; reputation mechanism; consensus; poisoning attack
【发表时间】2024
【收录时间】2024-03-07
【文献类型】 实验仿真
【作者】 刘德渊; 张金全; 张鑫; 万武南; 张仕斌; 秦智
【作者单位】成都信息工程大学网络空间安全学院;先进密码技术与系统安全四川省重点实验室(成都信息工程大学);成都信息工程大学网络空间安全产业学院;
【文献来源】计算机应用
【复合影响因子】2.197
【综合影响因子】1.475
【主题类别】
区块链技术-核心技术-跨链与多链
【摘要】针对现有区块链跨链身份认证方案存在去中心化程度低、可扩展性较差、资源消耗较大的问题,提出了一种基于无证书签密的跨链身份认证方案(CIA-CLSC)。首先采用无证书签密(CLSC)实现生成各跨链实体密钥、通信加密以及身份认证,其次采用秘密共享实现分布式系统的密钥管理,最后采用去中心化身份实现各实体密钥与跨链身份的关联。在保障身份隐私和安全的前提下,实现不同区块链系统间的跨链交互身份认证。理论分析与实验结果表明,CIA-CLSC无需依赖中心化证书机构和第三方密钥管理机构,保证了去中心化特性;生成的数字身份符合万维网联盟(W3C)标准,保证了可扩展性;在保持去中心化的前提下实现跨链交互身份认证较ECC与AES的组合减少约34%的时间开销、比RSA与AES的组合减少约38%的时间开销。CIA-CLSC在实际应用当中能够有效提高跨链系统的去中心化特性、可扩展性以及交互效率。
【关键词】区块链;;跨链;;身份认证;;无证书签密;;去中心化;;数字身份
【文献类型】 实验仿真
【发表时间】2024-03-07
【作者】 郑清安; 董建成; 陈亮; 阮英清; 李锦松; 许林彬
【作者单位】福建警察学院计算机与信息安全管理系;北京邮电大学网络空间安全学院;福建省监狱管理局;福建省司法厅;中共福建省委政法委员会;
【文献来源】计算机工程
【复合影响因子】1.808
【综合影响因子】1.289
【主题类别】
区块链技术-协同技术-隐私保护
【摘要】相较于传统的分布式数据库系统,区块链技术在处理记账事务方面展现出更好的分布性、透明性和可信性,且传统中心化数据库系统存在严重的隐私泄露问题。针对传统中心化数据管理机制中存在的信任问题和隐私泄露问题,本文提出了一种支持隐私保护的分布式可信数据管理模型。模型采用分布式存储、数据隐私保护、访问控制和分布式身份等关键技术实现数据的可信管理和协同隐私保护。在数据隐私保护方面,基于同态加密和零知识证明算法协议保障用户的数据隐私。在数据访问控制方面,结合链上群组隔离机制和节点存储落盘加密技术实现数据访问控制,将隐私控制回归属主。在用户身份隐私保护方面,利用分布式身份技术,将物理身份和可验证凭证进行链下存储,将实体信息最小化或根据需要在受控范围内共享。本文搭建了系统原型并测试了系统区块链吞吐量,get请求达到了811.2 (TPS),set请求达到了225.5 (TPS),正确率为100%。系统测试结果表明,模型功能性、安全性和可行性符合预期,性能较优。
【关键词】区块链;;隐私保护;;可信数据;;访问控制;;分布式身份
【文献类型】 实验仿真
【发表时间】2024-03-07
【作者】 李军祥; 梁贤武; 屈德强; 王溪
【作者单位】上海理工大学管理学院;
【文献来源】电力系统保护与控制
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-实体经济-电力领域
【摘要】随着具有源荷二重属性的产消者占比日益提高,如何建立适合产消者的有效交易机制,激励其能源消纳是目前亟待解决的问题。针对该问题,提出区块链技术下的产消者与运营商的集群交易模型,将区块链技术量化到产消者的用电行为上。考虑到产消者集群内各主体独立,电价制定和电量调度存在先后次序,采取Stackelberg博弈理论寻求最优交互策略,并通过区块链更新求解过程中的交互信息。仿真结果表明:通过制定内部电价,能够提升集群内的光伏自消纳水平,同时在区块链技术下聚合优化集群内资源,可以有效提高产消者的用电效益与运营商的收益。进一步,结合光伏上网电价退坡政策,再次验证了所提模型的有效性。
【关键词】产消者;;集群;;区块链技术;;Stackelberg博弈;;电价退坡政策
【文献类型】 实证数据
【发表时间】2024-03-07