A supervised privacy preservation transaction system for aviation business
被引:0
|
作者:
Zhou, Xingguang
论文数: 0引用数: 0
h-index: 0
机构:
Civil Aviat Management Inst China, Dept Big Data & Artificial Intelligence, CAAC Key Lab Civil Aviat Data Governance & Decis O, Beijing 100102, Peoples R ChinaCivil Aviat Management Inst China, Dept Big Data & Artificial Intelligence, CAAC Key Lab Civil Aviat Data Governance & Decis O, Beijing 100102, Peoples R China
Zhou, Xingguang
[1
]
Li, Weihan
论文数: 0引用数: 0
h-index: 0
机构:
Beihang Univ, Dept Cyber Sci & Technol, Beijing 100191, Peoples R ChinaCivil Aviat Management Inst China, Dept Big Data & Artificial Intelligence, CAAC Key Lab Civil Aviat Data Governance & Decis O, Beijing 100102, Peoples R China
Li, Weihan
[2
]
Zhong, Lin
论文数: 0引用数: 0
h-index: 0
机构:
New Huo Technol Holdings Ltd, Beijing 101100, Peoples R ChinaCivil Aviat Management Inst China, Dept Big Data & Artificial Intelligence, CAAC Key Lab Civil Aviat Data Governance & Decis O, Beijing 100102, Peoples R China
Zhong, Lin
[3
]
机构:
[1] Civil Aviat Management Inst China, Dept Big Data & Artificial Intelligence, CAAC Key Lab Civil Aviat Data Governance & Decis O, Beijing 100102, Peoples R China
[2] Beihang Univ, Dept Cyber Sci & Technol, Beijing 100191, Peoples R China
[3] New Huo Technol Holdings Ltd, Beijing 101100, Peoples R China
Data security is a crucial issue for aviation business transaction. In order to prevent privacy leakage for the business participants, it is essential to construct a credible transaction environment. For this purpose, we construct a strict cryptographic scheme based on consortium blockchain that addresses two key perspectives. Firstly, an identity-based homomorphic scheme is proposed, so that the encapsulated transaction result can be correctly calculated and verified for the flowing amount. Secondly, the supervised function is incorporated to the homomorphic scheme. One more public key is added into the encryption trapdoor, and this key is assigned to the supervisor. Consequently, both the airline and the supervisor who work as the two recipients can independently decrypt the ciphertext without time-consuming interaction. Experimental results show that the system achieves encryption time of 15 ms, and decryption time is 15 ms and 15.45 ms for both recipients. Compared to the popular cryptocurrency schemes, the system significantly achieves the supervised function without compromising efficiency. Finally, the application network architecture is put forward for the supervised privacy preservation transaction system.
机构:
Banaras Hindu Univ, Indian Inst Technol, Varanasi 221005, Uttar Pradesh, IndiaBanaras Hindu Univ, Indian Inst Technol, Varanasi 221005, Uttar Pradesh, India
机构:
Univ Helsinki, Dept Comp Sci, HIIT Basic Res Unit, SF-00510 Helsinki, FinlandUniv Helsinki, Dept Comp Sci, HIIT Basic Res Unit, SF-00510 Helsinki, Finland
机构:
Hong Kong Univ Sci & Technol, Dept Ind Engn & Decis Analyt, Hong Kong, Peoples R ChinaHong Kong Univ Sci & Technol, Dept Ind Engn & Decis Analyt, Hong Kong, Peoples R China