Blockchain Data Availability Scheme with Strong Data Privacy Protection

被引:1
作者
Liu, Xinyu [1 ]
Ji, Shan [2 ]
Wang, Xiaowan [3 ]
Liu, Liang [2 ]
Ren, Yongjun [1 ]
机构
[1] Nanjing Univ Informat Sci & Technol, Engn Res Ctr Digital Forens, Sch Comp Sci, Minist Educ, Nanjing 210044, Peoples R China
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
[3] Xian Univ Posts & Telecommun, Coll Digital Arts, Xian 710061, Peoples R China
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
blockchain; privacy protection; data availability; zero knowledge accumulator; STORAGE MECHANISM; MANAGEMENT;
D O I
10.3390/info14020088
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchain, with its characteristics of non-tamperability and decentralization, has had a profound impact on various fields of society and has set off a boom in the research and application of blockchain technology. However, blockchain technology faces the problem of data availability attacks during its application, which greatly limits the scope and domain of blockchain applications. One of the most advantageous researches to address this problem is the scalable data availability solution that integrates coding theory design into the Merkle tree promise. Based on this scheme, this paper combines a zero-knowledge accumulator with higher efficiency and security with local repair coding, and proposes a data availability scheme with strong dataset privacy protection. The scheme first encodes the data block information on the blockchain to ensure tamper-proof data, and then uses a zero-knowledge accumulator to store the encoded data block information. Its main purpose is to use zero-knowledge property to protect the accumulation set information stored in the accumulator from being leaked and to ensure that no other information about the accumulation set is revealed during the data transmission. It fundamentally reduces the possibility of attackers generating fraudulent information by imitating block data and further resists data availability attacks.
引用
收藏
页数:13
相关论文
共 37 条
[1]   Zero-Knowledge Proofs for Set Membership: Efficient, Succinct, Modular [J].
Benarroch, Daniel ;
Campanelli, Matteo ;
Fiore, Dario ;
Gurkan, Kobi ;
Kolonelos, Dimitris .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2021, PT I, 2021, 12674 :393-414
[2]   Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains [J].
Boneh, Dan ;
Bunz, Benedikt ;
Fisch, Ben .
ADVANCES IN CRYPTOLOGY - CRYPTO 2019, PT 1, 2019, 11692 :561-586
[3]   Asynchronous verifiable information dispersal [J].
Cachin, C ;
Tessaro, S .
24TH IEEE SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, 2005, :191-201
[4]  
Campanelli M., 2022, CRYPTOL EPRINT ARCH, V756, P1
[5]   Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage: Theory and Implementation [J].
Chen, Henry C. H. ;
Lee, Patrick P. C. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) :407-416
[6]   A Survey on Ethereum Systems Security: Vulnerabilities, Attacks, and Defenses [J].
Chen, Huashan ;
Pendleton, Marcus ;
Njilla, Laurent ;
Xu, Shouhuai .
ACM COMPUTING SURVEYS, 2020, 53 (03)
[7]  
Esha G., 2016, WORLD J EMERG SURG, V10032, P1
[8]  
Eyal I, 2016, 13TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION (NSDI '16), P45
[9]   A survey on privacy protection in blockchain system [J].
Feng, Qi ;
He, Debiao ;
Zeadally, Sherali ;
Khan, Muhammad Khurram ;
Kumar, Neeraj .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 126 :45-58
[10]   A data privacy protection scheme for Internet of things based on blockchain [J].
Gong, Jing ;
Mei, Yurong ;
Xiang, Feng ;
Hong, Hanshu ;
Sun, Yibo ;
Sun, Zhixin .
TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2021, 32 (05)