期刊文献+

基于联盟链和Asmuth-Bloom秘密共享算法的数据共享方案 被引量:3

Data Sharing Scheme Based on Consortium Blockchain and Asmuth-Bloom Secret Sharing Algorithm
下载PDF
导出
摘要 针对现有数据共享方案效率低及联盟链存储压力大的问题,文章提出一种基于联盟链和Asmuth-Bloom秘密共享算法的数据共享方案。该方案通过细粒度访问控制解决敏感数据泄露问题,并提高共享过程中的秘密重构效率;同时通过星际文件系统实现共享数据的安全存储,有效降低联盟链各节点的存储压力。安全性分析及实验结果表明,该方案具有正确性、安全性和高效性。 Aiming at the problems of low efficiency of data sharing scheme and high storage pressure on the consortium blockchain,an attribute-encrypted data-sharing scheme based on Asmuth-Bloom secret sharing algorithm is proposed.The scheme solves the leakage problem of sensitive data through fine-grained access control and improves the efficiency of secret reconstruction in the sharing process.At the same time,it realizes the secure storage of through interstellar file system and effectively reduces the storage pressure on the consortium blockchain network.Meanwhile,it realizes the secure storage of data through the inter planetary file system and effectively reduces the storage pressure of each node on the consortium blockchain network.The analysis and experimental results show that the scheme is correct,safe and efficient.
作者 张学旺 姚亚宁 黎志鸿 张豪 ZHANG Xuewang;YAO Yaning;LI Zhihong;ZHANG Hao(School of Software Engineering,Chongqing University of Posts and Telecommunications,Chongqing 400065,China;College of Microelectronic and Communication Engineering,Chongqing University,Chongqing 400004,China)
出处 《信息网络安全》 CSCD 北大核心 2022年第11期17-23,共7页 Netinfo Security
基金 重庆市自然科学基金重点项目(cstc2019jcyj-zdxm0008) 南充市科技计划项目(21YFZJ0033) 渝北区大数据智能化科技专项重点项目(2020-02)。
关键词 联盟链 Asmuth-Bloom 属性基加密 数据共享 consortium blockchain Asmuth-Bloom attribute-based encryption data sharing
  • 相关文献

参考文献14

二级参考文献100

  • 1张桂芳,孙星明,肖湘蓉,彭沛夫.基于中国剩余定理的数据库水印技术[J].计算机工程与应用,2006,42(7):135-136. 被引量:7
  • 2彭沛夫,林亚平,张桂芳,胡斌.基于有效位数的数据库数字水印[J].计算机工程与应用,2006,42(11):166-168. 被引量:9
  • 3沈静博,房鼎益,吴晓南,陈晓江.基于多常量编码的动态图软件水印保护技术[J].计算机工程,2006,32(20):160-162. 被引量:6
  • 4Collberg C, Thomborson C. Watermarking, Tamper-proofing and Obfuscation Tools for Software Protection[J]. IEEE Transactions on Software Engineering, 2002, 28(8): 735-746.
  • 5Tarski A.初等代数和几何的判定法[M].北京:科学出版社,1959.
  • 6王勇,杨义先.一种基于PPCT的软件水印库生成方案[C].北京:第三届全国信息安全会议,2003.
  • 7Agrawal R,Kiernan J.Watermarking relational databases[C]//Proceeding of the 28^th VLDB Conference,Hong Kong,China,2002:155-156.
  • 8Shamir A.How to Share a secret[J].Communications of the ACM,1979,24(11):612-613.
  • 9Blakley G R.Safeguarding cryptographic keys[C]//Proceedings of the National Computer Conference,1979,American Federation of Information Processing Societies,1979,48:313-317.
  • 10Asmuth C,Bloom J.A modular approach to key safeguarding[J].IEEE Transactions on Information Theory,1983,29(2):208-210.

共引文献383

同被引文献26

引证文献3

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部