Privacy-Preserving PBFT Based on a New BFT Asynchronous Verifiable Secret Sharing

被引:0
|
作者
Mi, Bo [1 ]
Mao, Yongyi [1 ]
Huang, Darong [2 ]
Wen, Yuan [1 ]
Zou, Yongxing [1 ]
机构
[1] Chongqing Jiaotong Univ, Sch Informat Sci & Engn, Chongqing 400074, Peoples R China
[2] Anhui Univ, Sch Artificial Intelligence, Hefei 230039, Anhui, Peoples R China
来源
2023 IEEE 12TH DATA DRIVEN CONTROL AND LEARNING SYSTEMS CONFERENCE, DDCLS | 2023年
基金
中国国家自然科学基金;
关键词
privacy-preserving; consensus; PBFT; secret sharing; verifiable secret sharing;
D O I
10.1109/DDCLS58216.2023.10165942
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many types of research on PBFT in the past focused on improving the efficiency of the algorithm, but with the development of the times, people have higher requirements for data privacy, which poses new challenges to the design of the PBFT algorithm. Considering the issue of data privacy, a natural idea is to use the method of secret sharing to let each node only store the secret share locally, and use the binding between the secret share and the polynomial to ensure the consistency of the system. In this line, integrating VSS into the BFT algorithm is a common method, but we found that when the traditional VSS is integrated into the BFT algorithm, there is a problem that the misbehavior of the data writer cannot be identified. To solve this problem, we design a new BFT AVSS based on ZKIPCP. Our scheme itself is not excellent, but it is a good choice when integrated into the BFT algorithm, and it can solve the problem that traditional schemes cannot identify malicious data writers. We describe how to integrate our BFT AVSS scheme into the PBFT algorithm for data privacy protection. Finally, we implemented our privacy-preserving PBFT and proves through experiments that it can meet our original purpose, that is, privacy protection and malicious data writer identification.
引用
收藏
页码:167 / 171
页数:5
相关论文
共 50 条
  • [41] Publicly Verifiable Privacy-Preserving Group Decryption
    Qin, Bo
    Wu, Qianhong
    Susilo, Willy
    Mu, Yi
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 72 - +
  • [42] Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
    Patra, Arpita
    Choudhury, Ashish
    Rangan, C. Pandu
    JOURNAL OF CRYPTOLOGY, 2015, 28 (01) : 49 - 109
  • [43] Efficient Asynchronous Verifiable Secret Sharing and Multiparty Computation
    Arpita Patra
    Ashish Choudhury
    C. Pandu Rangan
    Journal of Cryptology, 2015, 28 : 49 - 109
  • [44] Lightweight Asynchronous Verifiable Secret Sharing with Optimal Resilience
    Shoup, Victor
    Smart, Nigel P.
    JOURNAL OF CRYPTOLOGY, 2024, 37 (03)
  • [45] Efficient and Privacy-Preserving Collaborative Intrusion Detection Using Additive Secret Sharing and Differential Privacy
    Mokry, Laylon
    Slife, Paul
    Bishop, Patrick
    Quiroz, Jose
    Guzzi, Cooper
    Chen, Zhiyuan
    Crainiceanu, Adina
    Needham, Don
    2021 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2021, : 3324 - 3333
  • [46] Verifiable Privacy-Preserving Scheme Based on Vertical Federated Random Forest
    Hou, Jinpeng
    Su, Mang
    Fu, Anmin
    Yu, Yan
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22) : 22158 - 22172
  • [47] A verifiable and privacy-preserving blockchain-based federated learning approach
    Irshad Ullah
    Xiaoheng Deng
    Xinjun Pei
    Ping Jiang
    Husnain Mushtaq
    Peer-to-Peer Networking and Applications, 2023, 16 : 2256 - 2270
  • [48] A cloud-based framework for verifiable privacy-preserving spectrum auction
    Li, Ruinian
    Song, Tianyi
    Mei, Bo
    Hu, Chunqiang
    Li, Wei
    Larson, Maya
    Cheng, Xiuzhen
    Bie, Rongfang
    HIGH-CONFIDENCE COMPUTING, 2022, 2 (01):
  • [49] A verifiable and privacy-preserving blockchain-based federated learning approach
    Ullah, Irshad
    Deng, Xiaoheng
    Pei, Xinjun
    Jiang, Ping
    Mushtaq, Husnain
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2256 - 2270
  • [50] Privacy-preserving Verifiable Proximity Test for Location-based Services
    Zhuo, Gaoqiang
    Jia, Qi
    Guo, Linke
    Li, Ming
    Fang, Yuguang
    2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2015,