咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Blockchain-based system for se... 收藏

Blockchain-based system for secure outsourcing of bilinear pairings

为双线性的配对的安全采购的基于 Blockchain 的系统

作     者:Lin, Chao He, Debiao Huang, Xinyi Xie, Xiang Choo, Kim-Kwang Raymond 

作者机构:Wuhan Univ Sch Cyber Sci & Engn Key Lab Aerosp Informat Secur & Trusted Comp Minist Educ Wuhan Peoples R China Nanjing Univ Posts & Telecommun Jiangsu Key Lab Big Data Secur & Intelligent Proc Nanjing Peoples R China Fujian Normal Univ Coll Math & Informat Fujian Prov Key Lab Network Secur & Cryptol Fuzhou Peoples R China Juzix Technol Co Ltd Shenzhen Peoples R China Univ Texas San Antonio Dept Informat Syst & Cyber Secur San Antonio TX USA Univ Texas San Antonio Dept Elect & Comp Engn San Antonio TX USA 

出 版 物:《INFORMATION SCIENCES》 (信息科学)

年 卷 期:2020年第527卷

页      面:590-601页

核心收录:

学科分类:12[管理学] 1201[管理学-管理科学与工程(可授管理学、工学学位)] 08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:National Key Research and Development Program of China [2017YFB0802500] National Natural Science Foundation of China [61572379, 61572370, 61772377, 61822202, 61872089] Jiangsu Key Laboratory of Big Data Security & Intelligent Processing [BDSIP1807] Natural Science Foundation of Hubei Province of China [2017CFA007] Cloud Technology Endowed Professorship 

主  题:Internet of Things Blockchain Smart contract Outsource-secure algorithms Bilinear pairings 

摘      要:Secure computation outsourcing in Internet of Things (IoT) system is an ongoing research challenge, partly due to the resource-constrained nature of most (inexpensive) IoT devices. In this paper, we focus on the secure outsourcing of bilinear pairings (SOBP) (the most computationally expensive operation in pairing-based cryptographic protocols / algorithms). First, we analyze the limitations in existing SOBP-based schemes, such as the one malicious model (Strong Assumption), a secure channel (Insufficiency), and a trusted server (Centralization). Then, we propose a novel blockchain-based system for SOBP based on a permissioned version (i.e., a blockchain ledger maintained by some permissioned nodes), designed to efficiently address the limitations. Finally, we prove the security of our proposed approach in the one untrusted program model and implement it on Ethereum (an open-source blockchain system) to show its utility. (C) 2018 Elsevier Inc. All rights reserved.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分