期刊文献+
共找到16篇文章
< 1 >
每页显示 20 50 100
基于IPFS和Merkle tree存储机制的冷冻面团溯源研究
1
作者 武玮 《信息技术与信息化》 2024年第5期149-152,共4页
随着现代生活节奏的加快,冷冻面团因其方便运输、方便存储、保质期长久而受到越来越多的买家认可,但是仍然存在冷冻面团的安全问题。为了应对这些挑战,提出了一种基于以太坊智能合约的冷冻面团追溯模型,设计了基于IPFS(星际文件系统)和M... 随着现代生活节奏的加快,冷冻面团因其方便运输、方便存储、保质期长久而受到越来越多的买家认可,但是仍然存在冷冻面团的安全问题。为了应对这些挑战,提出了一种基于以太坊智能合约的冷冻面团追溯模型,设计了基于IPFS(星际文件系统)和Merkle tree的存储机制。实验结果表明,所提出的模型能够实现对冷冻面团全流程的追溯,且在以太坊中的存储成本低于传统的直接存储方式,这无疑为其在实际应用中的推广提供了有力支持。综上所述,基于以太坊智能合约的追溯模型为冷冻面团的安全管理提供了新的解决思路,有助于提高消费者的信心和推动行业的健康发展。 展开更多
关键词 IPFS merkle tree 冷冻面团 数字签名 智能合约
下载PDF
Merkle Tree Digital Signature and Trusted Computing Platform 被引量:1
2
作者 WANG Xiaofei HONG Fan TANG Xueming CUI Guohua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1467-1472,共6页
Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signatu... Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signature scheme is constructed, and it is provably existentially unforgeable under adaptive chosen message attack. By decentralizing the initial key generation process of the original scheme within the signature process, a large Merkle tree with 6.87×10^10 possible signatures can be initialized in 590 milliseconds. Storing some small Merkle trees in hard disk and memory can speed up Merkle tree signature scheme. Mekle tree signature schemes are fit for trusted computing platform in most scenarios. 展开更多
关键词 digital signature one-time signature merkle tree trusted computing platform
下载PDF
Blockchain Merkle-Tree Ethereum Approach in Enterprise Multitenant Cloud Environment
3
作者 Pooja Dhiman Santosh Kumar Henge +3 位作者 Sartaj Singh Avinash Kaur Parminder Singh Mustapha Hadabou 《Computers, Materials & Continua》 SCIE EI 2023年第2期3297-3313,共17页
This research paper puts emphasis on using cloud computing with Blockchain(BC)to improve the security and privacy in a cloud.The security of data is not guaranteed as there is always a risk of leakage of users’data.B... This research paper puts emphasis on using cloud computing with Blockchain(BC)to improve the security and privacy in a cloud.The security of data is not guaranteed as there is always a risk of leakage of users’data.Blockchain can be used in a multi-tenant cloud environment(MTCE)to improve the security of data,as it is a decentralized approach.Data is saved in unaltered form.Also,Blockchain is not owned by a single organization.The encryption process can be done using a Homomorphic encryption(HE)algorithm along with hashing technique,hereby allowing computations on encrypted data without the need for decryption.This research paper is composed of four objectives:Analysis of cloud security using Blockchain technology;Exceptional scenario of Blockchain architecture in an enterprise-level MTCE;Implementation of cipher-text policy attribute-based encryption(CPABE)algorithm;Implementation of Merkle tree using Ethereum(MTuE)in a Multi-tenant system.Out of these four objectives,the main focus is on the implementation of CP-ABE algorithm.CP-ABE parameters are proposed for different levels of tenants.The levels include inner tenant,outer tenant,Inner-Outer-Tenant,Inner-Outer-External-Tenant,Outer-Inner-Tenant,External-Outer-Inner-Tenant and the parameters such as token,private key,public key,access tree,message,attribute set,node-level,cipher-text,salting which will help in providing better security using CP-ABE algorithm in a multitenant environment(MTE)where tenants can be provided with different levels of security and achieved 92 percentage of authenticity and access-control of the data. 展开更多
关键词 Blockchain(BC) merkle tree using ethereum(MTuE) multi-tenant environment(MTE) homomorphic encryption(HE) ciphertext policy attribute-based encryption(CP-ABE)
下载PDF
Cloud Data Encryption and Authentication Based on Enhanced Merkle Hash Tree Method
4
作者 J.Stanly Jayaprakash Kishore Balasubramanian +3 位作者 Rossilawati Sulaiman Mohammad Kamrul Hasan B.D.Parameshachari Celestine Iwendi 《Computers, Materials & Continua》 SCIE EI 2022年第7期519-534,共16页
Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integ... Many organizations apply cloud computing to store and effectively process data for various applications.The user uploads the data in the cloud has less security due to the unreliable verification process of data integrity.In this research,an enhanced Merkle hash tree method of effective authentication model is proposed in the multi-owner cloud to increase the security of the cloud data.Merkle Hash tree applies the leaf nodes with a hash tag and the non-leaf node contains the table of hash information of child to encrypt the large data.Merkle Hash tree provides the efficient mapping of data and easily identifies the changesmade in the data due to proper structure.The developed model supports privacy-preserving public auditing to provide a secure cloud storage system.The data owners upload the data in the cloud and edit the data using the private key.An enhanced Merkle hash tree method stores the data in the cloud server and splits it into batches.The data files requested by the data owner are audit by a third-party auditor and the multiowner authentication method is applied during the modification process to authenticate the user.The result shows that the proposed method reduces the encryption and decryption time for cloud data storage by 2–167 ms when compared to the existing Advanced Encryption Standard and Blowfish. 展开更多
关键词 Cloud computing cloud data storage cloud service provider merkle hash tree multi-owner authentication third-party auditor
下载PDF
A Novel High-Efficiency Transaction Verification Scheme for Blockchain Systems
5
作者 Jingyu Zhang Pian Zhou +3 位作者 Jin Wang Osama Alfarraj Saurabh Singh Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1613-1633,共21页
Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems... Blockchain can realize the reliable storage of a large amount of data that is chronologically related and verifiable within the system.This technology has been widely used and has developed rapidly in big data systems across various fields.An increasing number of users are participating in application systems that use blockchain as their underlying architecture.As the number of transactions and the capital involved in blockchain grow,ensuring information security becomes imperative.Addressing the verification of transactional information security and privacy has emerged as a critical challenge.Blockchain-based verification methods can effectively eliminate the need for centralized third-party organizations.However,the efficiency of nodes in storing and verifying blockchain data faces unprecedented challenges.To address this issue,this paper introduces an efficient verification scheme for transaction security.Initially,it presents a node evaluation module to estimate the activity level of user nodes participating in transactions,accompanied by a probabilistic analysis for all transactions.Subsequently,this paper optimizes the conventional transaction organization form,introduces a heterogeneous Merkle tree storage structure,and designs algorithms for constructing these heterogeneous trees.Theoretical analyses and simulation experiments conclusively demonstrate the superior performance of this scheme.When verifying the same number of transactions,the heterogeneous Merkle tree transmits less data and is more efficient than traditional methods.The findings indicate that the heterogeneous Merkle tree structure is suitable for various blockchain applications,including the Internet of Things.This scheme can markedly enhance the efficiency of information verification and bolster the security of distributed systems. 展开更多
关键词 Blockchain architecture transaction verification information security heterogeneous merkle tree distributed systems
下载PDF
一种面向联盟链的链下数据可验证查询方法 被引量:1
6
作者 孙一萌 范洪博 +2 位作者 彭慢煜 牛旭彤 庄金玉 《现代电子技术》 2023年第19期70-74,共5页
传统的区块链技术受到共识算法、区块在全网广播的速度等条件的限制,导致区块链的吞吐量性能无法和传统数据库性能相比。文中提出一种面向链下的数据可验证查询方法,将区块链上区块内数据存储在链下数据库中。采用Hyperledger Fabric作... 传统的区块链技术受到共识算法、区块在全网广播的速度等条件的限制,导致区块链的吞吐量性能无法和传统数据库性能相比。文中提出一种面向链下的数据可验证查询方法,将区块链上区块内数据存储在链下数据库中。采用Hyperledger Fabric作为区块链平台,使用Reids作为链下数据库存储区块数据,结合MPT树实现链下数据的查询可验证。通过实验验证了该方案可以实现区块链查询,性能接近数据库查询性能,并且保证了链下数据和链上数据的一致性,以及查询数据的可验证性。 展开更多
关键词 区块链 merkle Patricia tree 数据库 查询性能优化 吞吐量 数据可验证查询
下载PDF
基于联盟区块链的高效性能优化中间件研究 被引量:1
7
作者 刘应 范洪博 +1 位作者 马首群 高志伟 《数据通信》 2022年第1期6-8,24,共4页
区块链已成为现代甚至未来众多应用程序中最具吸引力的技术之一。目前Fabric是实现企业级区块链的开源联盟区块链,其性能的不足一直是区块链的瓶颈,其大规模数据运行的性能并不理想,本论文对区块链进行区块交易解析并设计了一种多链架构... 区块链已成为现代甚至未来众多应用程序中最具吸引力的技术之一。目前Fabric是实现企业级区块链的开源联盟区块链,其性能的不足一直是区块链的瓶颈,其大规模数据运行的性能并不理想,本论文对区块链进行区块交易解析并设计了一种多链架构,基于HASH取模算法和Merkle Tree从交易到查询研究设计了页面与区块链的一致性验证的中行间优化方法,可以实时验证页面数据和区块链数据的一致性,维护数据的真实性和不可篡改性,并使其查询性能达到相似于数据库的性能。 展开更多
关键词 区块链 HASH取模 merkle tree 一致性验证 性能优化
下载PDF
Distributed privacy protection strategy for MEC enhanced wireless body area networks 被引量:1
8
作者 Yan Zhen Hanyong Liu 《Digital Communications and Networks》 SCIE 2020年第2期229-237,共9页
With the rapid development and widespread application of Wireless Body Area Networks(WBANs),the traditional centralized system architecture cannot handle the massive data generated by the edge devices.Meanwhile,in ord... With the rapid development and widespread application of Wireless Body Area Networks(WBANs),the traditional centralized system architecture cannot handle the massive data generated by the edge devices.Meanwhile,in order to ensure the security of physiological privacy data and the identity privacy of patients,this paper presents a privacy protection strategy for Mobile Edge Computing(MEC)enhanced WBANs,which leverages the blockchain-based decentralized MEC paradigm to support efficient transmission of privacy information with low latency,high reliability within a high-demand data security scenario.On this basis,the Merkle tree optimization model is designed to authenticate nodes and to verify the source of physiological data.Furthermore,a hybrid signature algorithm is devised to guarantee the node anonymity with unforgeability,data integrity and reduced delay.The security performance analysis and simulation results show that our proposed strategy not only reduces the delay,but also secures the privacy and transmission of sensitive WBANs data. 展开更多
关键词 Wireless body area networks Blockchain Mobile edge computing Hybrid signature algorithm merkle tree optimization model
下载PDF
基于联盟区块链的航运物流数据管理的研究与应用
9
作者 刘应 范洪博 马首群 《中国水运》 2021年第3期53-55,共3页
随着国际贸易和全球化的发展,在以全球伙伴关系为特征的世界中,全球航运物流变得越来越重要。目前区块链已成为许多现代甚至未来应用程序中最具吸引力的技术之一,区块链扮演着特殊的角色,因为它有可能缓解航运中物流管理问题,提供了在... 随着国际贸易和全球化的发展,在以全球伙伴关系为特征的世界中,全球航运物流变得越来越重要。目前区块链已成为许多现代甚至未来应用程序中最具吸引力的技术之一,区块链扮演着特殊的角色,因为它有可能缓解航运中物流管理问题,提供了在全球范围内实现安全无摩擦交易的新方法。本文对区块链作用于航运物流进行研究,通过Fabric联盟区块链对航运物流业务场景设计了航运物流区块链系统结构,其区块链可提供准入机制进行航运物流部门参与者认证,并对其航运大量的数据影响区块链的性能进行了基于Merkle Tree查询物流数据的性能优化,对进一步区块链与航运业相结合提供借鉴和参考。 展开更多
关键词 Fabric区块链 航运物流 merkle tree 准入机制
下载PDF
An improved Merkle hash tree based secure scheme for bionic underwater acoustic communication
10
作者 Masoud KAVEH Abolfazl FALAHATI 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2021年第7期1010-1019,共10页
Recently,bionic signals have been used to achieve covert underwater acoustic communication(UWAC)with high signal-to-noise ratios(SNRs)over transmission systems.A high SNR allows the attackers to proceed with their mis... Recently,bionic signals have been used to achieve covert underwater acoustic communication(UWAC)with high signal-to-noise ratios(SNRs)over transmission systems.A high SNR allows the attackers to proceed with their mischievous goals and makes transmission systems vulnerable against malicious attacks.In this paper we propose an improved Merkle hash tree based secure scheme that can resist current underwater attacks,i.e.,replay attack,fabricated message attack,message-altering attack,and analyst attack.Security analysis is performed to prove that the proposed scheme can resist these types of attacks.Performance evaluations show that the proposed scheme can meet UWAC limitations due to its efficiency regarding energy consumption,communication overhead,and computation cost. 展开更多
关键词 Dolphin whistle Improved merkle hash tree Secure underwater acoustic communication(UWAC)
原文传递
基于联盟链的养老机构老年人的隐私保护方案 被引量:1
11
作者 周虎 党仁 孙羽 《网络安全技术与应用》 2024年第1期61-65,共5页
为了解决在我国养老机构中老年人的隐私泄漏,本文提出了一种基于联盟链的养老机构老年人的隐私保护方案,对老年人的隐私数据和每日身体健康数据分别加密存储,使用量子密码一次一密、真随机的优点对老年人的隐私数据进行存储,老年人的每... 为了解决在我国养老机构中老年人的隐私泄漏,本文提出了一种基于联盟链的养老机构老年人的隐私保护方案,对老年人的隐私数据和每日身体健康数据分别加密存储,使用量子密码一次一密、真随机的优点对老年人的隐私数据进行存储,老年人的每日身体健康数据使用属性基的方式进行加密存储,实现了老年人对身体健康数据的细粒度控制,隐私数据只有老年人用户自己能够解密。有效保护了老年人的隐私数据。实验表明我们的方案在吞吐量和时延方面都有不错的表现。 展开更多
关键词 区块链 隐私保护 量子密钥 merkle tree
原文传递
An efficient full dynamic group signature scheme over ring 被引量:1
12
作者 Yiru Sun Yanyan Liu Bo Wu 《Cybersecurity》 CSCD 2019年第1期365-379,共15页
The group signature scheme is an important primitive in cryptography,it allows members in a group to generate signatures anonymously on behalf of the whole group.In view of the practical application of such schemes,it... The group signature scheme is an important primitive in cryptography,it allows members in a group to generate signatures anonymously on behalf of the whole group.In view of the practical application of such schemes,it is necessary to allow users’registration and revocation when necessary,which makes the construction of dynamic group signature schemes become a significant direction.On the basis of(Ling et al.,Lattice-based group signatures:achieving full dynamicity with ease,2017),we present the first full dynamic group signature scheme over ring,and under the premise of ensuring security,the efficiency of the scheme is improved mainly from the following three aspects:the size of keys,the dynamic construction of a Merkle hash tree that used to record the information of registered users,and the reuse of the leaves in this tree.In addition,the public and secret keys of both group manager and trace manager are generated by a trusted third party,which prevents the situation that the two managers generate their respective public key and secret key maliciously.Compared with the counterpart of the scheme in(Ling et al.,Lattice-based group signatures:achieving full dynamicity with ease,2017)over ring,the expected space complexity of the Merkle tree used in our work down almost by half,and the computational complexity of its update has been reduced by a notch because of the dynamic construction of the hash tree. 展开更多
关键词 Group signature DYNAMIC merkle tree Ring-LWE
原文传递
区块链技术在电子数据云取证中的应用 被引量:3
13
作者 臧金明 《网络安全技术与应用》 2020年第6期151-152,共2页
当前社会,互联网已经成为我们生活不可分割的一部分,针对互联网的违法犯罪行为也越来越多。电子数据作为打击违法犯罪的最有力证据,在云计算的环境下,面临着很多难以解决的问题。本文借助区块链的特性,采用去中心化的算法设计、Merkle T... 当前社会,互联网已经成为我们生活不可分割的一部分,针对互联网的违法犯罪行为也越来越多。电子数据作为打击违法犯罪的最有力证据,在云计算的环境下,面临着很多难以解决的问题。本文借助区块链的特性,采用去中心化的算法设计、Merkle Tree的不可篡改特性,提出一种解决区块链云取证的全新思路。 展开更多
关键词 区块链 云取证 去中心化 merkle tree
原文传递
Algebraic Construction for Zero-Knowledge Sets
14
作者 薛锐 李宁辉 李江滔 《Journal of Computer Science & Technology》 SCIE EI CSCD 2008年第2期166-175,共10页
Zero knowledge sets is a new cryptographic primitive introduced by Micali, Rabin, and Kilian in FOCS 2003. It has been intensively studied recently. However all the existing ZKS schemes follow the basic structure by M... Zero knowledge sets is a new cryptographic primitive introduced by Micali, Rabin, and Kilian in FOCS 2003. It has been intensively studied recently. However all the existing ZKS schemes follow the basic structure by Micali et al. That is, the schemes employ the Merkle tree as a basic structure and mercurial commitments as the commitment units to nodes of the tree. The proof for any query consists of an authentication chain. We propose in this paper a new algebraic scheme that is completely different from all the existing schemes. Our new scheme is computationally secure under the standard strong RSA assumption. Neither mercurial commitments nor tree structure is used in the new construction. In fact, the prover in our construction commits the desired set without any trapdoor information, which is another key important difference from the previous approaches. 展开更多
关键词 zero knowledge set merkle tree accumulator strong RSA assumption random oracle
原文传递
An efficient full dynamic group signature scheme over ring
15
作者 Yiru Sun Yanyan Liu Bo Wu 《Cybersecurity》 2018年第1期617-631,共15页
The group signature scheme is an important primitive in cryptography,it allows members in a group to generate signatures anonymously on behalf of the whole group.In view of the practical application of such schemes,it... The group signature scheme is an important primitive in cryptography,it allows members in a group to generate signatures anonymously on behalf of the whole group.In view of the practical application of such schemes,it is necessary to allow users’registration and revocation when necessary,which makes the construction of dynamic group signature schemes become a significant direction.On the basis of(Ling et al.,Lattice-based group signatures:achieving full dynamicity with ease,2017),we present the first full dynamic group signature scheme over ring,and under the premise of ensuring security,the efficiency of the scheme is improved mainly from the following three aspects:the size of keys,the dynamic construction of a Merkle hash tree that used to record the information of registered users,and the reuse of the leaves in this tree.In addition,the public and secret keys of both group manager and trace manager are generated by a trusted third party,which prevents the situation that the two managers generate their respective public key and secret key maliciously.Compared with the counterpart of the scheme in(Ling et al.,Lattice-based group signatures:achieving full dynamicity with ease,2017)over ring,the expected space complexity of the Merkle tree used in our work down almost by half,and the computational complexity of its update has been reduced by a notch because of the dynamic construction of the hash tree. 展开更多
关键词 Group signature DYNAMIC merkle tree Ring-LWE
原文传递
SE-Chain:A Scalable Storage and Efficient Retrieval Model for Blockchain 被引量:3
16
作者 Da-Yu Jia Jun-Chang Xin +2 位作者 Zhi-Qiong Wang Han Lei Guo-Ren Wang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2021年第3期693-706,共14页
Massive data is written to blockchain systems for the destination of keeping safe. However, existing blockchain protocols still demand that each full node has to contain the entire chain. Most nodes quit because they ... Massive data is written to blockchain systems for the destination of keeping safe. However, existing blockchain protocols still demand that each full node has to contain the entire chain. Most nodes quit because they are unable to grow their storage space with the size of data. As the number of nodes decreases, the security of blockchains would significantly reduce. We present SE-Chain, a novel scale-out blockchain model that improves storage scalability under the premise of ensuring safety and achieves efficient retrieval. The SE-Chain consists of three parts:the data layer, the processing layer and the storage layer. In the data layer, each transaction is stored in the AB-M tree (Adaptive Balanced Merkle tree), which adaptively combines the advantages of balanced binary tree (quick retrieval) and Merkle tree (quick verification). In the processing layer, the full nodes store the part of the complete chain selected by the duplicate ratio regulation algorithm. Meanwhile, the node reliability verification method is used for increasing the stability of full nodes and reducing the risk of imperfect data recovering caused by the reduction of duplicate number in the storage layer. The experimental results on real datasets show that the query time of SE-Chain based on the AB-M tree is reduced by 17% when 16 nodes exist. Overall, SE-Chain improves the storage scalability extremely and implements efficient querying of transactions. 展开更多
关键词 SE-Chain AB-M(adaptive balanced merkle)tree efficient retrieval scale-out blockchain
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部