期刊文献+

基于区块链的链上数据安全共享体系研究 被引量:24

Research on secure data sharing system based on blockchain
下载PDF
导出
摘要 针对人们在日益增长的数字化交互过程中越来越多地出现隐私直接或间接泄露的问题,主要研究基于区块链网络建立一套链上数据安全共享体系,基于密文策略的属性加密的访问控制算法以及同态加密算法实现链上数据的可靠共享,提出了一种链上数据共享架构,最后进行了仿真实验,并分析了实验结果。这项工作有效解决了恶意参与方利用区块链的交易透明性进行数据分析的问题,并保证了用户数据在共享流程中的隐私安全。 In view of the increasing number of people in the digital interaction process of direct or indirect disclosure of privacy issues,the establishment of a set of data security sharing system based on blockchain network,the access control algorithm based on ciphertext-policy attribute-based encryption and the homomorphic encryption algorithm provides reliable chain data sharing were mainly researched.Data sharing on chain architecture for data sharing on the chain was proposed.Finally,simulation experiments were carried out,and the results of experimental data were analyzed.The work effectively solves the problem of malicious parties using the transaction transparency of blockchain for data analysis and ensures the privacy security of user data in the sharing process.
作者 刘彦松 夏琦 李柱 夏虎 张小松 高建彬 LIU Yansong;XIA Qi;LI Zhu;XIA Hu;ZHANG Xiaosong;GAO Jianbin(School of Computer Science and Engineering,University of Electronic Science and Technology of China,Chengdu 611731,China;School of Resources and Environment,University of Electronic Science and Technology of China,Chengdu 611731,China)
出处 《大数据》 2020年第5期92-105,共14页 Big Data Research
基金 国家自然科学基金资助项目(No.61572115) 四川省科技厅国际合作资助项目(No.2017HH0028,No.2018HH0102,No.2019YFH0014,No.2020YFH0030) 四川省科技计划资助项目(No.2017CC0071,No.2020YFSY0061)。
关键词 数据共享 区块链 基于密文策略的属性加密 同态加密 隐私安全 data sharing blockchain ciphertext-policy attribute-based encryption homomorphic encryption privacy security
  • 相关文献

参考文献10

二级参考文献62

  • 1RIVEST R L, ADLEMAN L, DERTOUZOS M L. On data banks and privacy homomorphisms[A]. DeMillo RA Foundations of Secure Computation[C]. NY, USA: Academic Press, 1978.169-180.
  • 2PAILLIER P. Public-key cryptosystems based on composite degree residuosity classes[A]. Proc of the Advances in Cryptology (EUROCRYPT'99)[C]. Prague, Czech Republic, 1999.223-238.
  • 3GOLDWASSER S, MICALI S. Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984, 28(2): 270-299.
  • 4RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications oft.he ACM, 1978, 2l(2): 120-126.
  • 5ELGAMAL T. A public-key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985, 31(4): 469-472.
  • 6BONEH D, GOH E J, NISSIM K. Evaluating 2-DNF formulas on ciphertexts[A]. Second Theory of Cryptography Conference (TTC 2005)[C]. Cambridge, MA, USA, 2005.325-341.
  • 7GENTRY C. A Fully Homomorphic Encryption Scheme[D]. Califor- nia, USA: Stanford University, 2009.
  • 8GENTRY C. Fully homomorphic encryption using ideal lattices[A]. Proc of the 41st ACM Symposium on Theory of Computing(STOC' 09)[C]. Bethesda, Maryland, USA, 2009.169-178.
  • 9SMART P N, VERCAUTEREN F. Fully homomorphic encryption with relatively small key and ciphertext sizes[A]. Proc of the Public Key Cryptography (PKC 2010)[C]. Paris, France, 2010.420-443.
  • 10DIJK V M, GENTRY C, HALEVI S, et al. Fully homomorphic en- cryption over the integers[A]. Proc of the Advances in Cryptology (EUROCRYPT 2010)[C]. Riviera, France, 2010.24-43.

共引文献291

同被引文献255

引证文献24

二级引证文献197

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部