Post-Quantum Privacy-Preserving Provable Data Possession Scheme Based on Smart Contracts

被引:0
|
作者
Li Z. [1 ]
Zhang T. [2 ]
Zhao D. [2 ]
Zha Y. [3 ]
Sun J. [4 ]
机构
[1] School of Cyberspace Security, Beijing University of Posts and Telecommunications
[2] School of Information Engineering, Beijing Institute of Graphic Communication
[3] Research and Development Center of Transport Industry of Network Security Technologies, China Communication Information Technology Group Co., Ltd
[4] China Industrial Control Systems Cyber Emergency Response Team
关键词
D O I
10.1155/2023/8772700
中图分类号
学科分类号
摘要
Provable data possession (PDP) is a crucial means of protecting the integrity of data in the domain of cloud storage. In the post-quantum era, the PDP scheme that uses lattices relies too heavily on the third-party auditor (TPA), which is not entirely trustworthy and is easily affected by a single point of failure. Moreover, the scheme often leads to the leakage of private user data while attempting to satisfy the demand for public verification. In response to the above problems, this paper designs a protocol for post-quantum privacy-preserving PDP and uses it to develop a scheme based on smart contracts. The proposed scheme has the characteristics of being post quantum and can satisfy the demand for public verification while preserving user privacy. The property of noninteraction of the protocol can reduce transaction fees incurred owing to the frequent operation of the blockchain, and the smart contract with a deposit mechanism can ensure fair payments to all parties. The results of a theoretical analysis and experiments show that the proposed scheme is highly secure and efficient. © 2023 Zhengwen Li et al.
引用
收藏
相关论文
共 50 条
  • [1] A Privacy-Preserving Data Feed Scheme for Smart Contracts
    Wang, Hao
    Liu, Zhe
    Ge, Chunpeng
    Sakurai, Kouichi
    Su, Chunhua
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2022, E105D (02) : 195 - 204
  • [2] Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage
    Ming, Yang
    Shi, Wenchang
    IEEE ACCESS, 2019, 7 : 122091 - 122105
  • [3] Privacy-preserving certificateless provable data possession scheme for big data storage on cloud
    He, Debiao
    Kumar, Neeraj
    Wang, Huaqun
    Wang, Lina
    Choo, Kim-Kwang Raymond
    APPLIED MATHEMATICS AND COMPUTATION, 2017, 314 : 31 - 43
  • [4] Privacy-preserving certificateless provable data possession scheme for big data storage on cloud, revisited
    Ji, Yanyan
    Shao, Bilin
    Chang, Jinyong
    Bian, Genqing
    APPLIED MATHEMATICS AND COMPUTATION, 2020, 386
  • [5] Improved Efficient Privacy-Preserving Certificateless Provable Data Possession Scheme for Cloud Storage
    Li, Xiuguang
    Li, Ruifeng
    Wang, Xu An
    Niu, Ke
    Li, Hui
    Yang, Xiaoyuan
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [6] A post-quantum provable data possession protocol in cloud
    Chen, Liang
    Han, Lansheng
    Jing, Jiandu
    Hu, Dongping
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (05) : 658 - 667
  • [7] Privacy-preserving computation in the post-quantum era
    Yu Yu
    Xiang Xie
    NationalScienceReview, 2021, 8 (09) : 10 - 12
  • [8] Privacy-preserving computation in the post-quantum era
    Yu, Yu
    Xie, Xiang
    NATIONAL SCIENCE REVIEW, 2021, 8 (09)
  • [9] Privacy-Preserving Post-quantum Credentials for Digital Payments
    Kazmi, Raza Ali
    Le, Duc-Phong
    Minwalla, Cyrus
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY. FC 2022 INTERNATIONAL WORKSHOPS, 2023, 13412 : 118 - 137
  • [10] Post-quantum Privacy-Preserving Aggregation in Federated Learning Based on Lattice
    Zuo, Ruozhou
    Tian, Haibo
    An, Zhiyuan
    Zhang, Fangguo
    CYBERSPACE SAFETY AND SECURITY, CSS 2022, 2022, 13547 : 314 - 326