Privacy-Preserving PBFT Based on a New BFT Asynchronous Verifiable Secret Sharing

被引:0
|
作者
Mi, Bo [1 ]
Mao, Yongyi [1 ]
Huang, Darong [2 ]
Wen, Yuan [1 ]
Zou, Yongxing [1 ]
机构
[1] Chongqing Jiaotong Univ, Sch Informat Sci & Engn, Chongqing 400074, Peoples R China
[2] Anhui Univ, Sch Artificial Intelligence, Hefei 230039, Anhui, Peoples R China
来源
2023 IEEE 12TH DATA DRIVEN CONTROL AND LEARNING SYSTEMS CONFERENCE, DDCLS | 2023年
基金
中国国家自然科学基金;
关键词
privacy-preserving; consensus; PBFT; secret sharing; verifiable secret sharing;
D O I
10.1109/DDCLS58216.2023.10165942
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many types of research on PBFT in the past focused on improving the efficiency of the algorithm, but with the development of the times, people have higher requirements for data privacy, which poses new challenges to the design of the PBFT algorithm. Considering the issue of data privacy, a natural idea is to use the method of secret sharing to let each node only store the secret share locally, and use the binding between the secret share and the polynomial to ensure the consistency of the system. In this line, integrating VSS into the BFT algorithm is a common method, but we found that when the traditional VSS is integrated into the BFT algorithm, there is a problem that the misbehavior of the data writer cannot be identified. To solve this problem, we design a new BFT AVSS based on ZKIPCP. Our scheme itself is not excellent, but it is a good choice when integrated into the BFT algorithm, and it can solve the problem that traditional schemes cannot identify malicious data writers. We describe how to integrate our BFT AVSS scheme into the PBFT algorithm for data privacy protection. Finally, we implemented our privacy-preserving PBFT and proves through experiments that it can meet our original purpose, that is, privacy protection and malicious data writer identification.
引用
收藏
页码:167 / 171
页数:5
相关论文
共 50 条
  • [21] Privacy-Preserving Publicly Verifiable Databases
    Wang, Qiang
    Zhou, Fucai
    Zhou, Boyang
    Xu, Jian
    Chen, Chunyu
    Wang, Qi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1639 - 1654
  • [22] Privacy-Preserving and Verifiable Data Aggregation
    Tran, Hieu N.
    Deng, Robert H.
    Pang, HweeHwa
    PROCEEDINGS OF THE SINGAPORE CYBER-SECURITY CONFERENCE (SG-CRC) 2016: CYBER-SECURITY BY DESIGN, 2016, 14 : 115 - 122
  • [23] A Note on Verifiable Privacy-Preserving Tries
    Kissel, Zachary A.
    Wang, Jie
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 942 - 943
  • [24] Galaxy: A Scalable BFT and Privacy-Preserving Pub/Sub IoT Data Sharing Framework Based on Blockchain
    Zhang, Yuchao
    Wang, Xiaotian
    He, Xiaofeng
    Zhang, Ning
    Zheng, Zibin
    Xu, Ke
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (03) : 5222 - 5236
  • [25] Efficient Verifiable Secret Sharing with Share Recovery in BFT Protocols
    Basu, Soumya
    Tomescu, Alin
    Abraham, Ittai
    Malkhi, Dahlia
    Reiter, Michael K.
    Sirer, Emin Gun
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 2387 - 2402
  • [26] Verifiable, Fair and Privacy-Preserving Broadcast Authorization for Flexible Data Sharing in Clouds
    Sun, Jianfei
    Xu, Guowen
    Zhang, Tianwei
    Yang, Xuehuan
    Alazab, Mamoun
    Deng, Robert H.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 683 - 698
  • [27] Verifiable mobile online social network privacy-preserving location sharing scheme
    Tang, Chunming
    Cai, Cailing
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (24):
  • [28] A Secret-Sharing Based Privacy-Preserving Distributed Energy Resource Control Framework
    Huo, Xiang
    Liu, Mingxi
    2022 IEEE 31ST INTERNATIONAL SYMPOSIUM ON INDUSTRIAL ELECTRONICS (ISIE), 2022, : 963 - 966
  • [29] Practical Privacy-Preserving Gaussian Process Regression via Secret Sharing
    Luo, Jinglong
    Zhang, Yehong
    Zhang, Jiaqi
    Qin, Shuang
    Wang, Hui
    Yu, Yue
    Xu, Zenglin
    UNCERTAINTY IN ARTIFICIAL INTELLIGENCE, 2023, 216 : 1315 - 1325
  • [30] PrivGRU: Privacy-preserving GRU inference using additive secret sharing
    Hsiao, Shou-Ching
    Liu, Zi-Yuan
    Tso, Raylin
    Kao, Da-Yu
    Chen, Chien-Ming
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2020, 38 (05) : 5627 - 5638