Privacy-Preserving PBFT Based on a New BFT Asynchronous Verifiable Secret Sharing

被引:0
|
作者
Mi, Bo [1 ]
Mao, Yongyi [1 ]
Huang, Darong [2 ]
Wen, Yuan [1 ]
Zou, Yongxing [1 ]
机构
[1] Chongqing Jiaotong Univ, Sch Informat Sci & Engn, Chongqing 400074, Peoples R China
[2] Anhui Univ, Sch Artificial Intelligence, Hefei 230039, Anhui, Peoples R China
来源
2023 IEEE 12TH DATA DRIVEN CONTROL AND LEARNING SYSTEMS CONFERENCE, DDCLS | 2023年
基金
中国国家自然科学基金;
关键词
privacy-preserving; consensus; PBFT; secret sharing; verifiable secret sharing;
D O I
10.1109/DDCLS58216.2023.10165942
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many types of research on PBFT in the past focused on improving the efficiency of the algorithm, but with the development of the times, people have higher requirements for data privacy, which poses new challenges to the design of the PBFT algorithm. Considering the issue of data privacy, a natural idea is to use the method of secret sharing to let each node only store the secret share locally, and use the binding between the secret share and the polynomial to ensure the consistency of the system. In this line, integrating VSS into the BFT algorithm is a common method, but we found that when the traditional VSS is integrated into the BFT algorithm, there is a problem that the misbehavior of the data writer cannot be identified. To solve this problem, we design a new BFT AVSS based on ZKIPCP. Our scheme itself is not excellent, but it is a good choice when integrated into the BFT algorithm, and it can solve the problem that traditional schemes cannot identify malicious data writers. We describe how to integrate our BFT AVSS scheme into the PBFT algorithm for data privacy protection. Finally, we implemented our privacy-preserving PBFT and proves through experiments that it can meet our original purpose, that is, privacy protection and malicious data writer identification.
引用
收藏
页码:167 / 171
页数:5
相关论文
共 50 条
  • [1] Privacy-preserving and verifiable deep learning inference based on secret sharing
    Duan, Jia
    Zhou, Jiantao
    Li, Yuanman
    Huang, Caishi
    NEUROCOMPUTING, 2022, 483 : 221 - 234
  • [2] A Privacy-Preserving Asynchronous Averaging Algorithm based on Shamir's Secret Sharing
    Li, Qiongxiu
    Christensen, Mads Graesboll
    2019 27TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2019,
  • [3] Privacy-Preserving Authentication Based on Pseudonyms and Secret Sharing for VANET
    Xu, Ye
    Li, Fengying
    Cao, Bin
    2019 COMPUTING, COMMUNICATIONS AND IOT APPLICATIONS (COMCOMAP), 2019, : 157 - 162
  • [4] Privacy-Preserving distributed deep learning based on secret sharing
    Duan, Jia
    Zhou, Jiantao
    Li, Yuanman
    Information Sciences, 2020, 527 : 108 - 127
  • [5] Privacy-preserving logistic regression with secret sharing
    Ghavamipour, Ali Reza
    Turkmen, Fatih
    Jiang, Xiaoqian
    BMC MEDICAL INFORMATICS AND DECISION MAKING, 2022, 22 (01)
  • [6] Privacy-preserving image retrieval based on additive secret sharing
    Xia, Zhihua
    Gu, Qi
    Xiong, Lizhi
    Zhou, Wenhao
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2024, 17 (02) : 99 - 126
  • [7] Privacy-preserving logistic regression with secret sharing
    Ali Reza Ghavamipour
    Fatih Turkmen
    Xiaoqian Jiang
    BMC Medical Informatics and Decision Making, 22
  • [8] Privacy-Preserving distributed deep learning based on secret sharing
    Duan, Jia
    Zhou, Jiantao
    Li, Yuanman
    INFORMATION SCIENCES, 2020, 527 : 108 - 127
  • [9] Privacy-Preserving Distributed Machine Learning Based on Secret Sharing
    Dong, Ye
    Chen, Xiaojun
    Shen, Liyan
    Wang, Dakui
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019), 2020, 11999 : 684 - 702
  • [10] Privacy-Preserving Distributed Average Consensus based on Additive Secret Sharing
    Li, Qiongxiu
    Cascudo, Ignacio
    Christensen, Mads Graesboll
    2019 27TH EUROPEAN SIGNAL PROCESSING CONFERENCE (EUSIPCO), 2019,