期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Achieving reliable and anti-collusive outsourcing computation and verification based on blockchain in 5G-enabled IoT
1
作者 Linjie Wang Youliang Tian Jinbo Xiong 《Digital Communications and Networks》 SCIE CSCD 2022年第5期644-653,共10页
Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things(IoT)cloud to improve transmission efficiency,which has created a novel paradigm for improving t... Widespread applications of 5G technology have prompted the outsourcing of computation dominated by the Internet of Things(IoT)cloud to improve transmission efficiency,which has created a novel paradigm for improving the speed of common connected objects in IoT.However,although it makes it easier for ubiquitous resource-constrained equipment that outsources computing tasks to achieve high-speed transmission services,security concerns,such as a lack of reliability and collusion attacks,still exist in the outsourcing computation.In this paper,we propose a reliable,anti-collusion outsourcing computation and verification protocol,which uses distributed storage solutions in response to the issue of centralized storage,leverages homomorphic encryption to deal with outsourcing computation and ensures data privacy.Moreover,we embed outsourcing computation results and a novel polynomial factorization algorithm into the smart contract of Ethereum,which not only enables the verification of the outsourcing result without a trusted third party but also resists collusion attacks.The results of the theoretical analysis and experimental performance evaluation demonstrate that the proposed protocol is secure,reliable,and more effective compared with state-of-the-art approaches. 展开更多
关键词 Outsourcing computation Ethereum Smart contract public verification Homomorphic encryption
下载PDF
A secure spectrum auction scheme without the trusted party based on the smart contract 被引量:2
2
作者 Jiaqi Wang Ning Lu +2 位作者 Qingfeng Cheng Lu Zhou Wenbo Shi 《Digital Communications and Networks》 SCIE CSCD 2021年第2期223-234,共12页
With the development of communication 5G networks and technologies,spectrum resources are increasingly scarce.The scarcity of the spectrum resource makes market-driven spectrum auction become an important means of spe... With the development of communication 5G networks and technologies,spectrum resources are increasingly scarce.The scarcity of the spectrum resource makes market-driven spectrum auction become an important means of spectrum allocation,and due to the complexity of the network environment,the security of spectrum auctions can not be ignored.Most existing secure spectrum auction schemes introduce a semi-honest agent to complete spectrum auction.However,the hypothetical semi-honest model does not guarantee the security of spectnim auction in the actual application scenario,which may lead to potential security threats:the agent may reveal the privacy of bidders,agent or auctioneer may collude with the bidder to manipulate the spectrum auction,and so on.In this paper,a secure spectrum auction scheme without a trusted party is proposed based on the smart contract technology,and the smart contract written into the blockchain replaces the traditional semi-honest agent to cooperate with the auctioneer server to complete the auction.In order to ensure the security of our scheme,a secure spectrum auction protocol is designed,in which the Software Guard Extensions(SGX)technology and Paillier cryptosystem are used to protect the privacy of bidders.Public verification is provided in our protocol by using extensive Pedersen commitment,which prevents the auctioneer server and the bidder from colluding with each other and verifies group bid sum values.Finally,the security analysis is given to propose several types of attacks that can be defended.Besides,theoretical analysis and simulation experiments of our protocol are also provided. 展开更多
关键词 5g Secure spectrum auction Bidders'bids'privacy Smart contract public verification
下载PDF
Broadcast group-oriented encryption secure against chosen ciphertext attack
3
作者 Ma Chunbo Ao Jun Li Jianhua 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2007年第4期811-817,共7页
A novel broadcast encryption scheme for group communication scenarios in distributed networks is presented. In the scheme, anyone is allowed to encrypt a message and distribute it to a designated group. Each member in... A novel broadcast encryption scheme for group communication scenarios in distributed networks is presented. In the scheme, anyone is allowed to encrypt a message and distribute it to a designated group. Each member in the designated group has the ability to independently decrypt a ciphertext. In contrast to traditional broadcast encryption, all the valid receivers in the proposed scheme compose the designated group. To take advantage of this property, a tab for the group is set and the matching private key for each member is generated. In addition, before decrypting a ciphertext, anyone in the scheme can verify the ciphertext, to ensure that the ciphertext is correct. This property is very important for large-scale group communication, as the gateway can filter incorrect ciphertext and alleviate the receiver's workload. Finally, a proof in the random oracle model is given, to show that the proposed scheme is secure against the adaptively chosen ciphertext attack. 展开更多
关键词 BROADCAST group-oriented encryption chosen ciphertext attack public verification
下载PDF
NaEPASC:a novel and efficient public auditing scheme for cloud data 被引量:2
4
作者 Shuang TAN Yan JIA 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2014年第9期794-804,共11页
Cloud computing is deemed the next-generation information technology(IT) platform, in which a data center is crucial for providing a large amount of computing and storage resources for various service applications wit... Cloud computing is deemed the next-generation information technology(IT) platform, in which a data center is crucial for providing a large amount of computing and storage resources for various service applications with high quality guaranteed. However, cloud users no longer possess their data in a local data storage infrastructure,which would result in auditing for the integrity of outsourced data being a challenging problem, especially for users with constrained computing resources. Therefore, how to help the users complete the verification of the integrity of the outsourced data has become a key issue. Public verification is a critical technique to solve this problem, from which the users can resort to a third-party auditor(TPA) to check the integrity of outsourced data. Moreover,an identity-based(ID-based) public key cryptosystem would be an efficient key management scheme for certificatebased public key setting. In this paper, we combine ID-based aggregate signature and public verification to construct the protocol of provable data integrity. With the proposed mechanism, the TPA not only verifies the integrity of outsourced data on behalf of cloud users, but also alleviates the burden of checking tasks with the help of users' identity. Compared to previous research, the proposed scheme greatly reduces the time of auditing a single task on the TPA side. Security analysis and performance evaluation results show the high efficiency and security of the proposed scheme. 展开更多
关键词 Cloud storage public verification Identity-based aggregate signature
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部