1,889 results on '"Zero-knowledge proof"'
Search Results
2. ECAUT: ECC-infused efficient authentication for internet of things systems based on zero-knowledge proof.
- Author
-
Prakash, M. and Ramesh, K.
- Subjects
- *
ELLIPTIC curve cryptography , *INTERNET of things , *SECURITY systems , *LOGIC - Abstract
The Internet of Things (IoT) has seen significant growth, enabling connectivity and intelligence in various domains which use RFID communication most. However, this growth has also brought forth significant security challenges, particularly concerning replay attacks, which have troubled previous works. In our study, we introduce an innovative security solution that uses elliptic curve cryptography (ECC) with zero-knowledge proof (ZKP) specifically tailored for RFID-communicated applications. By leveraging ECC with ZKP, we not only improve the security of IoT systems but also reduce the persistent threat of replay attacks. Unlike traditional methods, our approach ensures that sensitive data is securely transmitted and authenticated without the risk of unauthorized duplication. We validated our approach using Scyther and BAN logic, well-known tools for assessing security protocols. These validations confirm the robustness of our solution in addressing security challenges and provide further assurance of its effectiveness in protecting IoT systems against various threats, including replay attacks. Our comprehensive analysis revealed that our approach outperforms existing solutions in terms of communication costs and computation costs. The improved efficiency in these key areas underscores the practicality and viability of our solution, further solidifying its position as a leading option for safeguarding IoT ecosystems against emerging threats. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
3. Zero-knowledge Proof Based Federated Learning with Blockchain for COVID-19 Classification.
- Author
-
Sheetakallu Krishnaiah, Parikshith Nayaka and Narayan, Dayanand Lal
- Subjects
CONVOLUTIONAL neural networks ,FEDERATED learning ,LONG-term memory ,DATA privacy ,COVID-19 - Abstract
The diversity and scarcity of the medical information makes it difficult to create precise global classification approach for the healthcare applications. The main motive is the privacy issue that restricts the data exchanging scope between healthcare institutions. On the contrary, an information from single source is not adequate for developing the worldwide diagnosis approach. The Federated Learning (FL) is a promising solution for privacy and data multiplicity issues, an appropriate aggregation model for multi class and dissimilar medical information is still challenging task in the recognition. Moreover, the FL approaches does not effectively analyzes the each participant execution in the local model and secures the user data. In order to overcome this issue, the Zero-Knowledge Proof (ZKP) based FL approach is developed over blockchain (BC) for performing the COVID-19 classification. The global model of FL uses the two layer Long Short Term Memory (2LLSTM) with federated proximal term (FedProx) namely 2LLSTMFP while the Convolutional Neural Network (CNN) is used in the local model. The integration ZKP and BS is used to improve the data confidentiality while the immutability of BC helps to prevent unauthorized variations for the ledger. The developed FLBC-ZKP is analyzed with two datasets such as COVID-19 Radiography, and CXR images pneumonia and COVID-19. The FLBC-ZKP is evaluated using accuracy, recall, precision, specificity, F1-score, False Negative Rate (FNR) and False Positive Rate (FPR). The existing researches such as WMT, MCCF, 3SFDL and TOTL are used to compare the FLBC-ZKP method. The FLBC-ZKP achieves improved accuracy of 98.34 % for COVID-19 Radiography dataset that is better than the MCCF and 3SFDL. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
4. A Secure and Efficient Authentication Scheme for Large-Scale IoT Devices Based on Zero-Knowledge Proof.
- Author
-
Su, Ziyi, Wang, Shiwei, Cai, Hongliu, Huang, Jiaxuan, Chen, Yourong, Zhang, Xudong, and Alam, Muhammad
- Subjects
ENERGY industries ,TRUST ,SECURITY systems ,INTERNET of things ,ANONYMITY ,PUBLIC key cryptography - Abstract
Current authentication schemes based on zero-knowledge proof (ZKP) still face issues such as high computation costs, low efficiency, and security assurance difficulty. Therefore, we propose a secure and efficient authentication scheme (SEAS) for large-scale IoT devices based on ZKP. In the initialization phase, the trusted authority creates prerequisites for device traceability and system security. Then, we propose a new registration method to ensure device anonymity. In the identity tracing and revocation phase, we revoke the real identity of abnormal devices by decrypting and updating group public keys, avoiding their access and reducing revocation costs. In the authentication phase, we check the arithmetic relationship between blind certificates, proofs, and other random data. We propose a new anonymous batch authentication method to effectively reduce computation costs, enhance authentication efficiency, and guarantee device authentication security. Security analysis and experimental results show that an SEAS can ensure security and effectively reduce verification time and energy costs. Its security and performance exceed existing schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
5. A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts.
- Author
-
Dai, Xingan, Zhou, Xinquan, Zhou, Dehua, Zhong, Jinhan, and Hong, Chao
- Subjects
- *
DISTRIBUTED algorithms , *BALLOTS , *VOTING , *PRIVACY , *ALGORITHMS - Abstract
In this paper, we propose a smart contract-based multi-candidate self-tallying voting scheme in order to guarantee the privacy of ballots in the case of multiple candidates. This scheme uses the ElGamal cryptosystem to ensure the security of the ballots, and combines it with a Distributed Encryption algorithm to make the voting scheme have self-tallying features, and guarantees the correctness of the intermediate data through zero-knowledge proofs. The experimental results show that the scheme improves the voting efficiency without compromising the security. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
6. Physical Zero-Knowledge Proof Protocols for Topswops and Botdrops.
- Author
-
Komano, Yuichi and Mizuki, Takaaki
- Subjects
- *
CARD games , *COMPUTATIONAL complexity , *SUFFIXES & prefixes (Grammar) , *INTEGERS , *CRYPTOGRAPHY - Abstract
Suppose that a sequence of n cards, numbered 1 to n , is placed face up in random order. Let k be the number on the first card in the sequence. Then take the first k cards from the sequence, rearrange that subsequence of k cards in reverse order, and return them to the original sequence. Repeat this prefix reversal until the number on the first card in the sequence becomes 1. This is a one-player card game called Topswops. The computational complexity of Topswops has not been thoroughly investigated. For example, letting f (n) denote the maximum number of prefix reversals for Topswops with n cards, values of f (n) for n ≥ 20 remain unknown. In general, there is no known efficient algorithm for finding an initial sequence of n cards that requires exactly ℓ prefix reversals for any integers n and ℓ . In this paper, using a deck of cards, we propose a physical zero-knowledge proof protocol that allows a prover to convince a verifier that the prover knows an initial sequence of n cards that requires ℓ prefix reversals without leaking knowledge of that sequence. We also deal with Botdrops, a variant of Topswops. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
7. Printing Protocol: Physical ZKPs for Decomposition Puzzles.
- Author
-
Ruangwises, Suthee and Iwamoto, Mitsugu
- Subjects
- *
PUZZLES , *CRYPTOGRAPHY , *LOGIC - Abstract
Decomposition puzzles are pencil-and-paper logic puzzles that involve partitioning a rectangular grid into several regions to satisfy certain rules. In this paper, we construct a generic card-based protocol called printing protocol, which can be used to physically verify solutions of decompositon puzzles. We apply the printing protocol to develop card-based zero-knowledge proof protocols for two such puzzles: Five Cells and Meadows. These protocols allow a prover to physically show that he/she knows solutions of the puzzles without revealing them. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
8. Enhancing Unmanned Aerial Vehicle Security: A Zero-Knowledge Proof Approach with Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge for Authentication and Location Proof.
- Author
-
Koulianos, Athanasios, Paraskevopoulos, Panagiotis, Litke, Antonios, and Papadakis, Nikolaos K.
- Subjects
- *
RASPBERRY Pi , *TRUST , *PRIVACY , *CONTRACTS , *REMIXES , *BLOCKCHAINS - Abstract
UAVs are increasingly being used in various domains, from personal and commercial applications to military operations. Ensuring the security and trustworthiness of UAV communications is crucial, and blockchain technology has been explored as a solution. However, privacy remains a challenge, especially in public blockchains. In this work, we propose a novel approach utilizing zero-knowledge proof techniques, specifically zk-SNARKs, which are non-interactive cryptographic proofs. This approach allows UAVs to prove their authenticity or location without disclosing sensitive information. We generated zk-SNARK proofs using the Zokrates tool on a Raspberry Pi, simulating a drone environment, and analyzed power consumption and CPU utilization. The results are promising, especially in the case of larger drones with higher battery capacities. Ethereum was chosen as the public blockchain platform, with smart contracts developed in Solidity and tested on the Sepolia testnet using Remix IDE. This novel proposed approach paves the way for a new path of research in the UAV area. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Bio-Rollup: a new privacy protection solution for biometrics based on two-layer scalability-focused blockchain.
- Author
-
Yun, Jian, Lu, Yusheng, Liu, Xinyang, and Guan, Jingdan
- Subjects
ARTIFICIAL neural networks ,ARTIFICIAL intelligence ,DATA security failures ,BLOCKCHAINS ,MACHINE learning - Abstract
The increased use of artificial intelligence generated content (AIGC) among vast user populations has heightened the risk of private data leaks. Effective auditing and regulation remain challenging, further compounding the risks associated with the leaks involving model parameters and user data. Blockchain technology, renowned for its decentralized consensus mechanism and tamper-resistant properties, is emerging as an ideal tool for documenting, auditing, and analyzing the behaviors of all stakeholders in machine learning as a service (MLaaS). This study centers on biometric recognition systems, addressing pressing privacy and security concerns through innovative endeavors. We conducted experiments to analyze six distinct deep neural networks, leveraging a dataset quality metric grounded in the query output space to quantify the value of the transfer datasets. This analysis revealed the impact of imbalanced datasets on training accuracy, thereby bolstering the system's capacity to detect model data thefts. Furthermore, we designed and implemented a novel Bio-Rollup scheme, seamlessly integrating technologies such as certificate authority, blockchain layer two scaling, and zero-knowledge proofs. This innovative scheme facilitates lightweight auditing through Merkle proofs, enhancing efficiency while minimizing blockchain storage requirements. Compared to the baseline approach, Bio-Rollup restores the integrity of the biometric system and simplifies deployment procedures. It effectively prevents unauthorized use through certificate authorization and zero-knowledge proofs, thus safeguarding user privacy and offering a passive defense against model stealing attacks. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. BAPS: a blockchain-assisted privacy-preserving and secure sharing scheme for PHRs in IoMT.
- Author
-
Li, Hongzhi, Zhu, Peng, Wang, Jiacun, and Fortino, Giancarlo
- Subjects
- *
DATA privacy , *HEALTH counseling , *INFORMATION sharing , *DATA protection , *RECORD stores - Abstract
Internet of Medical Things (IoMT) has gradually become the main solution for smart healthcare, and cloud-assisted IoMT is becoming a critical computing paradigm to achieve data collection, fine-grained data analysis, and sharing in healthcare domains. Since IoMT data can be frequently shared for accurate diagnosis, prognosis prediction, and health counseling, how to solve the contradiction between data sharing and privacy protection for IoMT data is a challenge problem. Besides, the cloud-assisted medical system is still at risk of a single point of failure and usually suffers from poor scalability and large response delay. Hence, we propose a blockchain-based privacy-preserving and secure sharing scheme for IoMT data, named BAPS. In BAPS, the Interplanetary File System (IPFS) is adopted to store encrypted records. Then, a non-interactive zero-knowledge proof protocol is employed to verify whether the stored data meets the specific request from data requesters without disclosing personal privacy. Moreover, we combine cryptographic primitives and decentralized smart contracts to achieve user anonymity. Finally, we leverage blockchain and proxy re-encryption to achieve fine-grained sharing of healthcare data. Security analysis indicates that this scheme meets the expected security requirements. The computational cost of BAPS is reduced by about 6% compared to state-of-the-art schemes, while the communication overhead is reduced by about 8%. Both theoretical analysis and experiment results show that this scheme can realize privacy-preserving and secure data sharing with acceptable computational and communication costs. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Selective disclosure in digital credentials: A review
- Author
-
Šeila Bećirović Ramić, Ehlimana Cogo, Irfan Prazina, Emir Cogo, Muhamed Turkanović, Razija Turčinhodžić Mulahasanović, and Saša Mrdović
- Subjects
Selective disclosure ,Anonymous credentials ,Verifiable credentials ,Zero-knowledge proof ,Information technology ,T58.5-58.64 - Abstract
Digital credentials represent digital versions of physical credentials. They are the cornerstone of digital identity on the Internet. In order to enhance privacy, different authors implement selective disclosure in digital credentials, allowing users to disclose only the claims or attributes they want. This paper gives an overview of the most influential articles for selective disclosure, a chronology of the evolution of the methods, and a list of strategies and approaches to the problem. We identify the categories of approaches and their advantages and disadvantages. In addition, we recognize research gaps and open challenges and provide potential future directions.
- Published
- 2024
- Full Text
- View/download PDF
12. Privacy-Protection Method for Blockchain Transactions Based on Lightweight Homomorphic Encryption.
- Author
-
Wang, Guiyou, Li, Chao, Dai, Bingrong, and Zhang, Shaohua
- Subjects
- *
DATA privacy , *COMPUTATIONAL complexity , *ALGORITHMS , *PRIVACY , *LEAKAGE - Abstract
This study proposes an privacy-protection method for blockchain transactions based on lightweight homomorphic encryption, aiming to ensure the security of transaction data and user privacy, and improve transaction efficiency. We have built a blockchain infrastructure and, based on its structural characteristics, adopted zero-knowledge proof technology to verify the legitimacy of data, ensuring the authenticity and accuracy of transactions from the application end to the smart-contract end. On this basis, the Paillier algorithm is used for key generation, encryption, and decryption, and intelligent protection of blockchain transaction privacy is achieved through a secondary encryption mechanism. The experimental results show that this method performs well in privacy and security protection, with a data leakage probability as low as 2.8%, and can effectively defend against replay attacks and forged-transaction attacks. The degree of confusion remains above 0.9, with small fluctuations and short running time under different key lengths and moderate CPU usage, achieving lightweight homomorphic encryption. This not only ensures the security and privacy of transaction data in blockchain networks, but also reduces computational complexity and resource consumption, better adapting to the high-concurrency and low-latency characteristics of blockchain networks, thereby ensuring the efficiency and real-time performance of transactions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
13. Privacy-preserving credential smart contracts using Zokrates.
- Author
-
Geunyoung Kim, Yunsik Ham, and Jaecheol Ryou
- Abstract
The need for secure user authentication in blockchain-based applications has been growing with the increased adoption of Decentralized Identity (DID) credentials in blockchain. Zokrates, a tool designed to protect user privacy within smart contracts, had a limitation in that it could not accept authenticated user information such as credentials, only allowing the use of manually inputted data. In this paper, we propose a smart contract system that securely validates DID credentials to overcome the limitations of traditional centralized authentication systems. This system ensures the safe identification of users within blockchain-based applications by authenticating their identities in a trusted manner within the blockchain. As the demand for user authentication in blockchain rises, this paper emphasizes the significance of a blockchain-based identity verification system that guarantees both privacy and security. Leveraging the Zero-Knowledge Proof method and utilizing the Zokrates tool, this innovative approach aims to provide solutions for the digital identity verification process, thereby expanding the scope of blockchain technology applications. Moreover, we also provide a CLI for each entity. We help anyone who wants to authenticate their identity using the tool to safely verify it on-chain. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Secure Processing and Distribution of Data Managed on Private InterPlanetary File System Using Zero-Knowledge Proofs.
- Author
-
Shibano, Kyohei, Ito, Kensuke, Han, Changhee, Chu, Tsz Tat, Ozaki, Wataru, and Mogi, Gento
- Subjects
DATA distribution ,ELECTRONIC data processing ,DATA security ,PIXELS ,STORAGE - Abstract
In this study, a new data-sharing method is proposed that uses a private InterPlanetary File System—a decentralized storage system operated within a closed network—to distribute data to external entities while making its authenticity verifiable. Among the two operational modes of IPFS, public and private, this study focuses on the method for using private IPFS. Private IPFS is not open to the general public; although it poses a risk of data tampering when distributing data to external parties, the proposed method ensures the authenticity of the received data. In particular, this method applies a type of zero-knowledge proof, namely, the Groth16 protocol of zk-SNARKs, to ensure that the data corresponds to the content identifier in a private IPFS. Moreover, the recipient's name is embedded into the distributed data to prevent unauthorized secondary distribution. Experiments confirmed the effectiveness of the proposed method for an image data size of up to 120 × 120 pixels. In future studies, the proposed method will be applied to larger and more diverse data types. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. A Zero-Knowledge-Proof-Based Anonymous and Revocable Scheme for Cross-Domain Authentication.
- Author
-
Zhao, Xinjian, Xia, Fei, Xia, Hanning, Mao, Yunlong, and Chen, Shi
- Subjects
TRUST ,INTERNET security ,ANONYMITY ,REVOCATION ,PRIVACY - Abstract
Authentication is a crucial security service on the Internet. In real-world applications, multiple independent trust domains often exist, with each recognizing only certain identities within their own systems. During cross-domain access, users cannot directly use their original certificates, which presents a cross-domain authentication problem. Traditional centralized schemes typically employ a trusted third party (TTP) to facilitate the transfer of identity trust across domains. These schemes inevitably inherit the vulnerabilities associated with single points of failure. In contrast, blockchain-based decentralized schemes effectively eliminate the potential threats posed by TTPs. However, the openness and transparency of the blockchain also bring new security issues, such as privacy leakage. In this paper, we propose a zk-SNARK-based anonymous scheme on the blockchain for cross-domain authentication. Specifically, our scheme adopts an authorization-then-proof structure, which strikes a delicate balance between anonymity and revocability. We provide theoretical proofs for the security of our scheme and explain how it achieves proactive revocability. Experimental evaluation results demonstrated that our scheme is both secure and efficient, and the revocation could be accomplished by introducing only 64 bytes of on-chain storage with one hash comparison. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. A Blockchain-Based Efficient Cross-Domain Authentication Scheme for Internet of Vehicles.
- Author
-
Zhao, Feng, Ding, Hongtao, Li, Chunhai, Su, Zhaoyu, Liang, Guoling, and Yang, Changsong
- Subjects
ROADSIDE improvement ,UPLOADING of data ,INTERNET ,TRAFFIC safety ,CONTRACTS ,TOPOLOGY ,BLOCKCHAINS - Abstract
The Internet of Vehicles (IoV) is extensively deployed in outdoor and open environments to effectively address traffic efficiency and safety issues by connecting vehicles to the network. However, due to the open and variable nature of its network topology, vehicles frequently engage in cross-domain interactions. During such processes, directly uploading sensitive information to roadside units for interaction may expose it to malicious tampering or interception by attackers, thus compromising the security of the cross-domain authentication process. Additionally, IoV imposes high real-time requirements, and existing cross-domain authentication schemes for IoV often encounter efficiency issues. To mitigate these challenges, we propose CAIoV, a blockchain-based efficient cross-domain authentication scheme for IoV. This scheme comprehensively integrates technologies such as zero-knowledge proofs, smart contracts, and Merkle hash tree structures. It divides the cross-domain process into anonymous cross-domain authentication and safe cross-domain authentication phases to ensure efficiency while maintaining a balance between efficiency and security. Finally, we evaluate the performance of CAIoV. Experimental results demonstrate that our proposed scheme reduces computational overhead by approximately 20%, communication overhead by around 10%, and storage overhead by nearly 30%. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. Efficient and Secure EMR Storage and Sharing Scheme Based on Hyperledger Fabric and IPFS.
- Author
-
Guo, Jinxi, Zhao, Kui, Liang, Zhiwei, and Min, Kai
- Subjects
ELECTRONIC health records ,BLOCKCHAINS ,DATA privacy ,DATA security ,STORE location ,DATA mining - Abstract
This study examines the issues of privacy protection, data security, and query efficiency in blockchain-based electronic medical record (EMR) sharing. It proposes a secure storage and sharing scheme for EMR based on Hyperledger Fabric and the InterPlanetary File System (IPFS). To mitigate the privacy risks of data mining that could reveal patient identities, we establish an attribution channel in Hyperledger Fabric to store EMR ownership information and a data channel to store the storage location, digest, and usage records of medical data. Encrypted medical data are stored in the IPFS. To improve query efficiency in the blockchain, we integrate queryable medical data attributes into a composite key for conditional queries, avoiding complex data filtering processes. Additionally, we use a zero-knowledge proof combined with smart contracts for decentralized identity verification, eliminating reliance on third-party centralized verification services and enhancing system security. We also integrate AES and proxy re-encryption techniques to ensure data security during sharing. This scheme provides a more secure, efficient, and privacy-preserving approach for EMR systems, with significant practical implications and broad application potential. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. Blockchain-as-a-Service for the Security Challenges and Solutions in the Internet of Things Environment.
- Author
-
Chen, Hongsong, Zhang, Yiying, Han, Xintong, Cao, Yongrui, and Zhang, Yongpeng
- Subjects
INTERNET of things ,BLOCKCHAINS ,EDGE computing - Abstract
The Internet of Things and blockchain, as important technology foundations to enable Web 3.0, have greatly impacted the living and production patterns of people. When they meet together, blockchain services can be used to solve some IoT challenges that traditional information technologies cannot solve. Therefore, how to use blockchain services in IoT environment, and what key security challenges in IoT environment can be addressed by blockchain services are two critical issues. In this article, we propose a novel hybrid IoT architecture based on blockchain services to solve the first issue. To solve the second issue, we analyze IoT security threats and challenges, and propose blockchain-based security solutions, which are illustrated with the application cases of edge computing and fog computing based on smart contracts. Then we design and implement blockchain-based IoT zero-knowledge proof authentication experiments using the web3.js library to demonstrate the lightweight blockchain services performance in IoT application scenarios. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. 可监管的工业物联网数据共享方案.
- Author
-
柯小辉 and 李冬梅
- Abstract
Copyright of Journal of Chongqing University of Posts & Telecommunications (Natural Science Edition) is the property of Chongqing University of Posts & Telecommunications and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
20. Bio-Rollup: a new privacy protection solution for biometrics based on two-layer scalability-focused blockchain
- Author
-
Jian Yun, Yusheng Lu, Xinyang Liu, and Jingdan Guan
- Subjects
Blockchain ,Layer 2 scalability ,Zero-knowledge proof ,Biometrics ,Privacy protection ,Bio-Rollup ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
The increased use of artificial intelligence generated content (AIGC) among vast user populations has heightened the risk of private data leaks. Effective auditing and regulation remain challenging, further compounding the risks associated with the leaks involving model parameters and user data. Blockchain technology, renowned for its decentralized consensus mechanism and tamper-resistant properties, is emerging as an ideal tool for documenting, auditing, and analyzing the behaviors of all stakeholders in machine learning as a service (MLaaS). This study centers on biometric recognition systems, addressing pressing privacy and security concerns through innovative endeavors. We conducted experiments to analyze six distinct deep neural networks, leveraging a dataset quality metric grounded in the query output space to quantify the value of the transfer datasets. This analysis revealed the impact of imbalanced datasets on training accuracy, thereby bolstering the system’s capacity to detect model data thefts. Furthermore, we designed and implemented a novel Bio-Rollup scheme, seamlessly integrating technologies such as certificate authority, blockchain layer two scaling, and zero-knowledge proofs. This innovative scheme facilitates lightweight auditing through Merkle proofs, enhancing efficiency while minimizing blockchain storage requirements. Compared to the baseline approach, Bio-Rollup restores the integrity of the biometric system and simplifies deployment procedures. It effectively prevents unauthorized use through certificate authorization and zero-knowledge proofs, thus safeguarding user privacy and offering a passive defense against model stealing attacks.
- Published
- 2024
- Full Text
- View/download PDF
21. Elastic MSM: A Fast, Elastic and Modular Preprocessing Technique for Multi-Scalar Multiplication Algorithm on GPUs
- Author
-
Xudong Zhu, Haoqi He, Zhengbang Yang, Yi Deng, Lutan Zhao, and Rui Hou
- Subjects
Zero-Knowledge Proof ,Multi-Scalar Multiplication (MSM) ,Parallel Algorithm ,Graphics Processing Unit (GPU) ,Computer engineering. Computer hardware ,TK7885-7895 ,Information technology ,T58.5-58.64 - Abstract
Zero-knowledge proof (ZKP) is a cryptographic primitive that enables a prover to convince a verifier that a statement is true, without revealing any other information beyond the correctness of the statement itself. Due to its powerful capabilities, its most practical type, called zero-knowledge Succinct Non-interactive ARgument of Knowledge (zkSNARK), has been widely deployed in various privacypreserving applications such as cryptocurrencies and verifiable computation. Although state-of-the-art zkSNARKs are highly efficient for the verifier, the computational overhead for the prover is still orders of magnitude too high to warrant use in many applications. This overhead arises from several time-consuming operations, including large-scale matrix-vector multiplication (MUL), number-theoretic transform (NTT), and especially the multi-scalar multiplication (MSM) which constitutes the largest proportion. Therefore, further efficiency improvements are needed. In this paper, we focus on comprehensive optimization of running time and storage space required by the MSM algorithm on GPUs. Specifically, we propose a novel, modular and adaptive parameter configuration technique—elastic MSM to enable us to adjust the scale of MSM according to our own wishes by performing a corresponding amount of preprocessing. This technique enables us to fully unleash the potential of various efficient parallel MSM algorithms. We have implemented and tested elastic MSM over three prevailing parallel Pippenger algorithms on GPUs. Across various preprocessing space limitations (across various MSM scales), our constructions achieve up to about 1.90×, 1.08× and 1.36× (2.58×, 1.39× and 1.91×) speedup versus three state-of-the-art parallel Pippenger algorithms on GPUs, respectively. From another perspective, elastic MSM could also be regarded as a preprocessing technique over the well-known Pippenger algorithm, which is modular and could be used to accelerate almost all the most advanced parallel Pippenger algorithms on GPUs. Meanwhile, elastic MSM provides an adaptive trade-off between the running time and the extra storage space needed by parallel Pippenger algorithms on GPUs. This is the first preprocessing technique to retain the improved MSM computation brought by preprocessing under varying storage space limitations. Specifically, across various preprocessing space limitations (across various MSM scales), our constructions achieve up to about 192× and 223× (159× and 174×) speedup versus two state-ofthe- art preprocessing parallel Pippenger algorithms on GPUs, respectively.
- Published
- 2024
- Full Text
- View/download PDF
22. Strengthening Industrial IoT Security with Integrated PUF Token
- Author
-
Jain, Saloni, Korenda, Ashwija Reddy, Bagri, Amisha, Cambou, Bertrand, Lucero, Chris D., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, and Arai, Kohei, editor
- Published
- 2024
- Full Text
- View/download PDF
23. Confidential and Verifiable Machine Learning Delegations on the Cloud
- Author
-
Wu, Wenxuan, Homsi, Soamar, Zhang, Yupeng, Goos, Gerhard, Series Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Garcia-Alfaro, Joaquin, editor, Kozik, Rafał, editor, Choraś, Michał, editor, and Katsikas, Sokratis, editor
- Published
- 2024
- Full Text
- View/download PDF
24. Zero-Knowledge-Proof-Based Protocol Connecting Traditional Finance to Decentralized Finance
- Author
-
Doan, Viet-Thang, Trinh, Tuan-Dat, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Nguyen, Thi Dieu Linh, editor, Dawson, Maurice, editor, Ngoc, Le Anh, editor, and Lam, Kwok Yan, editor
- Published
- 2024
- Full Text
- View/download PDF
25. Future of Customer-Centric Service-Based Supply Chains
- Author
-
Kang, Parminder Singh, Wang, Xiaojia, Son, Joong Y., Jat, Mohsin, Qiu, Robin, Series Editor, Benjaafar, Saif, Editorial Board Member, Dietrich, Brenda, Editorial Board Member, Hua, Zhongsheng, Editorial Board Member, Jiang, Zhibin, Editorial Board Member, Kim, Kwang-Jae, Editorial Board Member, Li, Lefei, Editorial Board Member, Lyons, Kelly, Editorial Board Member, Maglio, Paul, Editorial Board Member, Meierhofer, Jürg, Editorial Board Member, Messinger, Paul, Editorial Board Member, Nickel, Stefan, Editorial Board Member, Spohrer, James C., Editorial Board Member, Wirtz, Jochen, Editorial Board Member, Kang, Parminder Singh, Wang, Xiaojia, Son, Joong Y., and Jat, Mohsin
- Published
- 2024
- Full Text
- View/download PDF
26. CrossCert: A Privacy-Preserving Cross-Chain System for Educational Credential Verification Using Zero-Knowledge Proof
- Author
-
Tran, Tuan-Dung, Minh, Phong Khuu, Thuy, Trang Le Tran, Duy, Phan The, Cam, Nguyen Tan, Pham, Van-Hau, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin, Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Vo, Nguyen-Son, editor, Ha, Dac-Binh, editor, and Jung, Haejoon, editor
- Published
- 2024
- Full Text
- View/download PDF
27. Authentication System Based on Zero-Knowledge Proof Employing the Rabin Cryptosystem and a Secret Sharing Schema
- Author
-
Shlaka, Sajjad Mohammed, Wahab, Hala Bahjat Abdul, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Al-Bakry, Abbas M., editor, Sahib, Mouayad A., editor, Al-Mamory, Safaa O., editor, Aldhaibani, Jaafar A., editor, Al-Shuwaili, Ali N., editor, Hasan, Haitham S., editor, Hamid, Rula A., editor, and Idrees, Ali K., editor
- Published
- 2024
- Full Text
- View/download PDF
28. Zero-Knowledge Proofs in Blockchain-Enabled Supply Chain Management
- Author
-
Prasad, Sameeksha, Tiwari, Namita, Chawla, Meenu, Tomar, Deepak Singh, Hamdan, Allam, Editorial Board Member, Al Madhoun, Wesam, Editorial Board Member, Alareeni, Bahaaeddin, Editor-in-Chief, Baalousha, Mohammed, Editorial Board Member, Elgedawy, Islam, Editorial Board Member, Hussainey, Khaled, Editorial Board Member, Eleyan, Derar, Editorial Board Member, Hamdan, Reem, Editorial Board Member, Salem, Mohammed, Editorial Board Member, Jallouli, Rim, Editorial Board Member, Assaidi, Abdelouahid, Editorial Board Member, Nawi, Noorshella Binti Che, Editorial Board Member, AL-Kayid, Kholoud, Editorial Board Member, Wolf, Martin, Editorial Board Member, El Khoury, Rim, Editorial Board Member, Kumar, Adarsh, editor, Ahuja, Neelu Jyothi, editor, Kaushik, Keshav, editor, Tomar, Deepak Singh, editor, and Khan, Surbhi Bhatia, editor
- Published
- 2024
- Full Text
- View/download PDF
29. Ensuring User Data Security Through a Zero-Knowledge Proof Based Modern Decentralised Blockchain Data Storage System
- Author
-
Warman, Dylan, Tien, David, Kabir, A., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Ullah, Abrar, editor, Anwar, Sajid, editor, Calandra, Davide, editor, and Di Fuccio, Raffaele, editor
- Published
- 2024
- Full Text
- View/download PDF
30. PFE: Linear Active Security, Double-Shuffle Proofs, and Low-Complexity Communication
- Author
-
Jia, Hanyu, Li, Xiangxue, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, and Ge, Chunpeng, editor
- Published
- 2024
- Full Text
- View/download PDF
31. Privacy-Preserving Educational Credentials Management Based on Decentralized Identity and Zero-Knowledge Proof
- Author
-
Xiong, Tianmin, Zhang, Zhao, Jing, Cheqin, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Hong, Wenxing, editor, and Kanaparan, Geetha, editor
- Published
- 2024
- Full Text
- View/download PDF
32. Blockchain-Integrated Secure Framework for Enhanced E-Government Services
- Author
-
Talukder, Sajedul, Alam, Md Jahangir, Hossain, Ismail, Puppala, Sai, Celebi, Emre, Series Editor, Chen, Jingdong, Series Editor, Gopi, E. S., Series Editor, Neustein, Amy, Series Editor, Liotta, Antonio, Series Editor, Di Mauro, Mario, Series Editor, El Madhoun, Nour, editor, Dionysiou, Ioanna, editor, and Bertin, Emmanuel, editor
- Published
- 2024
- Full Text
- View/download PDF
33. Zero-Knowledge with Robust Learning: Mitigating Backdoor Attacks in Federated Learning for Enhanced Security and Privacy
- Author
-
Li, Linlin, Xu, Chungen, Zhang, Pan, Akan, Ozgur, Editorial Board Member, Bellavista, Paolo, Editorial Board Member, Cao, Jiannong, Editorial Board Member, Coulson, Geoffrey, Editorial Board Member, Dressler, Falko, Editorial Board Member, Ferrari, Domenico, Editorial Board Member, Gerla, Mario, Editorial Board Member, Kobayashi, Hisashi, Editorial Board Member, Palazzo, Sergio, Editorial Board Member, Sahni, Sartaj, Editorial Board Member, Shen, Xuemin, Editorial Board Member, Stan, Mircea, Editorial Board Member, Jia, Xiaohua, Editorial Board Member, Zomaya, Albert Y., Editorial Board Member, Liu, Jianghua, editor, Xu, Lei, editor, and Huang, Xinyi, editor
- Published
- 2024
- Full Text
- View/download PDF
34. ASEV: Anonymous and Scored-Based E-Voting Protocol on Blockchain
- Author
-
Li, Fang, Wang, Xiaofen, Chen, Tao, Li, Lin, Huang, Hao, Filipe, Joaquim, Editorial Board Member, Ghosh, Ashish, Editorial Board Member, Prates, Raquel Oliveira, Editorial Board Member, Zhou, Lizhu, Editorial Board Member, Yang, Haomiao, editor, and Lu, Rongxing, editor
- Published
- 2024
- Full Text
- View/download PDF
35. Block-Privacy: Privacy Preserving Smart Healthcare Framework: Leveraging Blockchain and Functional Encryption
- Author
-
Egala, Bhaskara Santhosh, Pradhan, Ashok Kumar, Gupta, Shubham, Rannenberg, Kai, Editor-in-Chief, Soares Barbosa, Luís, Editorial Board Member, Goedicke, Michael, Editorial Board Member, Tatnall, Arthur, Editorial Board Member, Neuhold, Erich J., Editorial Board Member, Stiller, Burkhard, Editorial Board Member, Stettner, Lukasz, Editorial Board Member, Pries-Heje, Jan, Editorial Board Member, Kreps, David, Editorial Board Member, Rettberg, Achim, Editorial Board Member, Furnell, Steven, Editorial Board Member, Mercier-Laurent, Eunika, Editorial Board Member, Winckler, Marco, Editorial Board Member, Malaka, Rainer, Editorial Board Member, Puthal, Deepak, editor, Mohanty, Saraju, editor, and Choi, Baek-Young, editor
- Published
- 2024
- Full Text
- View/download PDF
36. A secure and highly efficient blockchain PBFT consensus algorithm for microgrid power trading
- Author
-
Zhongyuan Yao, Yonghao Fang, Heng Pan, Xiangyang Wang, and Xueming Si
- Subjects
Blockchain ,Distributed energy trading ,Consensus algorithm ,Spectral clustering ,Zero-knowledge proof ,Medicine ,Science - Abstract
Abstract There are a series of challenges in microgrid transactions, and blockchain technology holds the promise of addressing these challenges. However, with the increasing number of users in microgrid transactions, existing blockchain systems may struggle to meet the growing demands for transactions. Therefore, this paper proposes an efficient and secure blockchain consensus algorithm designed to meet the demands of large-scale microgrid electricity transactions. The algorithm begins by utilizing a Spectral clustering algorithm to partition the blockchain network into different lower-level consensus set based on the transaction characteristics of nodes. Subsequently, a dual-layer consensus process is employed to enhance the efficiency of consensus. Additionally, we have designed a secure consensus set leader election strategy to promptly identify leaders with excellent performance. Finally, we have introduced an authentication method that combines zero-knowledge proofs and key sharing to further mitigate the risk of malicious nodes participating in the consensus. Theoretical analysis indicates that our proposed consensus algorithm, incorporating multiple layers of security measures, effectively withstands blockchain attacks such as denial of service. Simulation experiment results demonstrate that our algorithm outperforms similar blockchain algorithms significantly in terms of communication overhead, consensus latency, and throughput.
- Published
- 2024
- Full Text
- View/download PDF
37. A Blockchain-Based Privacy Preserving Intellectual Property Authentication Method.
- Author
-
Yuan, Shaoqi, Yang, Wenzhong, Tian, Xiaodan, and Tang, Wenjie
- Subjects
- *
INTELLECTUAL property , *INFORMATION technology , *DATA privacy , *DATA encryption , *ELLIPTIC curve cryptography , *BLOCKCHAINS - Abstract
With the continuous advancement of information technology, a growing number of works, including articles, paintings, and music, are being digitized. Digital content can be swiftly shared and disseminated via the Internet. However, it is also vulnerable to malicious plagiarism, which can seriously infringe upon the rights of creators and dampen their enthusiasm. To protect creators' rights and interests, a sophisticated method is necessary to authenticate digital intellectual property rights. Traditional authentication methods rely on centralized, trustworthy organizations that are susceptible to single points of failure. Additionally, these methods are prone to network attacks that can lead to data loss, tampering, or leakage. Moreover, the circulation of copyright information often lacks transparency and traceability in traditional systems, which leads to information asymmetry and prevents creators from controlling the use and protection of their personal information during the authentication process. Blockchain technology, with its decentralized, tamper-proof, and traceable attributes, addresses these issues perfectly. In blockchain technology, each node is a peer, ensuring the symmetry of information. However, the transparent feature of blockchains can lead to the leakage of user privacy data. Therefore, this study designs and implements an Ethereum blockchain-based intellectual property authentication scheme with privacy protection. Firstly, we propose a method that combines elliptic curve cryptography (ECC) encryption with digital signatures to achieve selective encryption of user personal information. Subsequently, an authentication algorithm based on Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (zk-SNARK) is adopted to complete the authentication of intellectual property ownership while encrypting personal privacy data. Finally, we adopt the InterPlanetary File System (IPFS) to store large files, solving the problem of blockchain storage space limitations. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Verifying the first nonzero term: physical ZKPs for ABC End View, Goishi Hiroi, and Toichika.
- Author
-
Ruangwises, Suthee
- Abstract
In this paper, we propose a physical protocol to verify the first nonzero term of a sequence using a deck of cards. The protocol lets a prover show the value of the first nonzero term of a given sequence to a verifier without revealing which term it is. Our protocol uses Θ (1) shuffles, which is asymptotically lower than that of an existing protocol of Fukusawa and Manabe which uses Θ (n) shuffles, where n is the length of the sequence. We also apply our protocol to construct zero-knowledge proof protocols for three well-known logic puzzles: ABC End View, Goishi Hiroi, and Toichika. These protocols enable a prover to physically show that he/she know solutions of the puzzles without revealing them. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. PDMSC: privacy-preserving decentralized multi-skill spatial crowdsourcing.
- Author
-
Meng, Zhaobin, Lu, Yueheng, and Duan, Hongyue
- Abstract
Purpose: The purpose of this paper is to study the following two issues regarding blockchain crowdsourcing. First, to design smart contracts with lower consumption to meet the needs of blockchain crowdsourcing services and also need to design better interaction modes to further reduce the cost of blockchain crowdsourcing services. Second, to design an effective privacy protection mechanism to protect user privacy while still providing high-quality crowdsourcing services for location-sensitive multiskilled mobile space crowdsourcing scenarios and blockchain exposure issues. Design/methodology/approach: This paper proposes a blockchain-based privacy-preserving crowdsourcing model for multiskill mobile spaces. The model in this paper uses the zero-knowledge proof method to make the requester believe that the user is within a certain location without the user providing specific location information, thereby protecting the user's location information and other privacy. In addition, through off-chain calculation and on-chain verification methods, gas consumption is also optimized. Findings: This study deployed the model on Ethereum for testing. This study found that the privacy protection is feasible and the gas optimization is obvious. Originality/value: This study designed a mobile space crowdsourcing based on a zero-knowledge proof privacy protection mechanism and optimized gas consumption. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. A secure and highly efficient blockchain PBFT consensus algorithm for microgrid power trading.
- Author
-
Yao, Zhongyuan, Fang, Yonghao, Pan, Heng, Wang, Xiangyang, and Si, Xueming
- Subjects
- *
MICROGRIDS , *BLOCKCHAINS , *DENIAL of service attacks , *CONSENSUS (Social sciences) , *ALGORITHMS , *DISTRIBUTED algorithms - Abstract
There are a series of challenges in microgrid transactions, and blockchain technology holds the promise of addressing these challenges. However, with the increasing number of users in microgrid transactions, existing blockchain systems may struggle to meet the growing demands for transactions. Therefore, this paper proposes an efficient and secure blockchain consensus algorithm designed to meet the demands of large-scale microgrid electricity transactions. The algorithm begins by utilizing a Spectral clustering algorithm to partition the blockchain network into different lower-level consensus set based on the transaction characteristics of nodes. Subsequently, a dual-layer consensus process is employed to enhance the efficiency of consensus. Additionally, we have designed a secure consensus set leader election strategy to promptly identify leaders with excellent performance. Finally, we have introduced an authentication method that combines zero-knowledge proofs and key sharing to further mitigate the risk of malicious nodes participating in the consensus. Theoretical analysis indicates that our proposed consensus algorithm, incorporating multiple layers of security measures, effectively withstands blockchain attacks such as denial of service. Simulation experiment results demonstrate that our algorithm outperforms similar blockchain algorithms significantly in terms of communication overhead, consensus latency, and throughput. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. A blockchain-based privacy-preserving anti-collusion data auction mechanism with an off-chain approach.
- Author
-
Emami, Ashkan, Keshavarz Kalhori, Ghazaleh, Mirzakhani, Sheyda, and Akhaee, Mohammad Ali
- Subjects
- *
BIG data , *BENEFIT auctions , *AUCTIONS , *BLOCKCHAINS , *VALUE (Economics) , *BUDGET , *FOOD chains - Abstract
Big data refers to sets of structured, semi-structured, and unstructured data collected by organizations and may be difficult to process using traditional processing methods. Big data pricing is challenging due to uncertainty about its value. Auctions are effective strategies for allocating goods to the bidder with the highest valuation and a mechanism for protecting the interests of both data sellers and market participants. However, most existing data auctions are centralized, making it difficult to establish trust and transparency among sellers, buyers, and auctioneers. Moreover, online environments suffer from the lack of transparency and verifiability, which can lead to collusion attacks in data auctions. To address these challenges, we leverage blockchain technology and propose an anti-collusion smart contract-based data auction system. Since blockchain data transparency often compromises privacy, we leverage cryptographic techniques to enhance privacy, integrity, fairness, correctness, and non-repudiation. To ensure that all participants benefit from the auction, an auction model that considers rationality and budget balance is developed. The Ethereum blockchain is used to demonstrate a proof-of-concept implementation. Analysis has shown that the approach could meet efficiency, security, and privacy requirements. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. Bandwidth-Efficient Zero-Knowledge Proofs For Threshold ECDSA.
- Author
-
Cui, Handong, Chan, Kwan Yin, Yuen, Tsz Hon, Kang, Xin, and Chu, Cheng-Kang
- Abstract
In most threshold Elliptic Curve Digital Signature Algorithm (ECDSA) signatures using additively homomorphic encryption, the zero-knowledge (ZK) proofs related to the ciphertext or the message space are the bottleneck in terms of bandwidth as well as computation time. In this paper, we propose a compact ZK proof for relations related to the Castagnos–Laguillaumie (CL) encryption, which is 33% shorter and 29% faster than the existing work in PKC 2021. We also give new ZK proofs for relations related to homomorphic operations over the CL ciphertext. These new ZK proofs are useful to construct a bandwidth-efficient universal composable-secure threshold ECDSA without compromising the proactive security and the non-interactivity. In particular, we lowered the communication and computation cost of the key refresh algorithm in the Paillier-based counterpart from |$O(n^3)$| to |$O(n^2)$|. Considering a 5-signer setting, the bandwidth is better than the Paillier-based counterpart for up to 99, 95 and 35% for key generation, key refreshment and pre-signing, respectively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
43. Advancing User Privacy in Virtual Power Plants: A Novel Zero-Knowledge Proof-Based Distributed Attribute Encryption Approach.
- Author
-
Yang, Ruxia, Gao, Hongchao, Si, Fangyuan, and Wang, Jun
- Subjects
DATA privacy ,PRIVACY ,DATA security failures ,DATA security ,DATA encryption ,INTERNET privacy - Abstract
In virtual power plants, diverse business scenarios involving user data, such as queries, transactions, and sharing, pose significant privacy risks. Traditional attribute-based encryption (ABE) methods, while supporting fine-grained access, fall short of fully protecting user privacy as they require attribute input, leading to potential data leaks. Addressing these limitations, our research introduces a novel privacy protection scheme using zero-knowledge proof and distributed attribute-based encryption (DABE). This method innovatively employs Merkel trees for aggregating user attributes and constructing commitments for zero-knowledge proof verification, ensuring that user attributes and access policies remain confidential. Our solution not only enhances privacy but also fortifies security against man-in-the-middle and replay attacks, offering attribute indistinguishability and tamper resistance. A comparative performance analysis demonstrates that our approach outperforms existing methods in efficiency, reducing time, cost, and space requirements. These advancements mark a significant step forward in ensuring robust user privacy and data security in virtual power plants. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. Secure Data Sharing over Vehicular Networks Based on Multi-sharding Blockchain.
- Author
-
Huang, Junqin, Kong, Linghe, Wang, Jingwei, Chen, Guihai, Gao, Jianhua, Huang, Gang, and Khan, Muhammad Khurram
- Subjects
INFORMATION sharing ,DATA privacy ,BLOCKCHAINS ,CITIES & towns ,TRUST - Abstract
Internet of Vehicles (IoV) has become an indispensable technology to bridge vehicles, persons, and infrastructures and is promising to make our cities smarter and more connected. It enables vehicles to exchange vehicular data (e.g., GPS, sensors, and brakes) with different entities nearby. However, sharing these vehicular data over the air raises concerns about identity privacy leakage. Besides, the centralized architecture adopted in existing IoV systems is fragile to single point-of-failure and malicious attacks. With the emergence of blockchain technology, there is the chance to solve these problems due to its features of being tamper-proof, traceability, and decentralization. In this article, we propose a privacy-preserving vehicular data sharing framework based on blockchain. In particular, we design an anonymous and auditable data sharing scheme using Zero-Knowledge Proof (ZKP) technology so as to protect the identity privacy of vehicles while preserving the vehicular data auditability for Trusted Authorities (TAs). In response to high mobility of vehicles, we design an efficient multi-sharding protocol to decrease blockchain communication costs without compromising the blockchain security. We implement a prototype of our framework and conduct extensive experiments and simulations on it. Evaluation and analysis results indicate that our framework can not only strengthen system security and data privacy but also reduce communication complexity by \(O(\frac{n\sqrt {m}}{m^2})\) times compared to existing sharding protocols. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. Zero-knowledge proofs in education: a pathway to disability inclusion and equitable learning opportunities
- Author
-
Xiao Xu
- Subjects
Blockchain ,Zero-knowledge proof ,Disability inclusion ,Special aspects of education ,LC8-6691 - Abstract
Abstract In the evolving landscape of global education, the significance of inclusivity and equity has never been more important. Emphasizing the United Nation Sustainable Development Goal 4, this paper explores the innovative application of blockchain-powered Zero-Knowledge Proofs (ZKPs) technology in education, with a particular focus on disability inclusion. This study introduces a novel disability management system powered by Zero-Knowledge Succinct Non-Interactive Argument of Knowledge (zk-SNARK). This advanced system enables educational institutions to verify the status of students with disabilities without compromising their personal information, thereby preserving their privacy and reinforcing their identity. This paper evaluates the potential operational efficiency of this prototype system against the existing costs incurred by higher education institutions in disability schemes. It also examines the system’s potential to enhance self-disclosure among students with disability, which is pivotal for their academic success. By advocating for privacy and inclusivity, this study highlights the transformative potential of ZKP in creating an educational environment where students with disabilities can comfortably disclose their needs. This approach not only protects their confidentiality but also empowers them academically, aligning with the global commitment to accessible and inclusive education.
- Published
- 2024
- Full Text
- View/download PDF
46. Blockchain-Enhanced Zero Knowledge Proof-Based Privacy-Preserving Mutual Authentication for IoT Networks
- Author
-
Aditya Pathak, Irfan Al-Anbagi, and Howard J. Hamilton
- Subjects
Authentication ,blockchain ,IoT networks ,privacy-preserving ,zero-knowledge proof ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Authentication in low-latency Internet of Things (IoT) networks must satisfy three requirements, namely, high security and privacy preservation, high scalability, and low authentication time. These requirements arise because devices in IoT networks must operate in a secure and scalable manner despite being limited in computational resources. Existing authentication mechanisms focus on the security and privacy of IoT networks but neglect the importance of scalability and authentication time. Therefore, existing authentication mechanisms are unscalable and unsuited to low-latency IoT networks. With a focus on increasing scalability and reducing the authentication time while providing high security and privacy preservation in low-latency IoT networks, we propose a mutual authentication mechanism called Zero-Knowledge Proof-based Privacy-Preserving Mutual Authentication (Z-PMA) for IoT networks. The Z-PMA mechanism utilizes a combination of a zero-knowledge proof, an incentive mechanism, and a permissioned blockchain to provide secure, privacy-preserving, scalable, low-latency authentication for IoT networks. We develop a new approach to address the trade-off between the three requirements for authentication mechanisms for low-latency IoT networks that has the potential to improve the overall performance of these networks. A permissioned blockchain is incorporated in the approach to provide secure and immutable data storage using its distributed and unforgeable ledger. Our experimental results show that the Z-PMA mechanism reduces authentication time than existing state-of-the-art authentication mechanisms, while providing high security and privacy preservation as well as high scalability.
- Published
- 2024
- Full Text
- View/download PDF
47. A Multi-Candidate Self-Tallying Voting Scheme Based on Smart Contracts
- Author
-
Xingan Dai, Xinquan Zhou, Dehua Zhou, Jinhan Zhong, and Chao Hong
- Subjects
distributed encryption algorithms ,smart contract ,zero-knowledge proof ,ElGamal ,self-tallying voting ,Technology - Abstract
In this paper, we propose a smart contract-based multi-candidate self-tallying voting scheme in order to guarantee the privacy of ballots in the case of multiple candidates. This scheme uses the ElGamal cryptosystem to ensure the security of the ballots, and combines it with a Distributed Encryption algorithm to make the voting scheme have self-tallying features, and guarantees the correctness of the intermediate data through zero-knowledge proofs. The experimental results show that the scheme improves the voting efficiency without compromising the security.
- Published
- 2024
- Full Text
- View/download PDF
48. Enhancing Unmanned Aerial Vehicle Security: A Zero-Knowledge Proof Approach with Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge for Authentication and Location Proof
- Author
-
Athanasios Koulianos, Panagiotis Paraskevopoulos, Antonios Litke, and Nikolaos K. Papadakis
- Subjects
UAV ,authentication ,privacy ,blockchain technology ,ethereum ,zero-knowledge proof ,Chemical technology ,TP1-1185 - Abstract
UAVs are increasingly being used in various domains, from personal and commercial applications to military operations. Ensuring the security and trustworthiness of UAV communications is crucial, and blockchain technology has been explored as a solution. However, privacy remains a challenge, especially in public blockchains. In this work, we propose a novel approach utilizing zero-knowledge proof techniques, specifically zk-SNARKs, which are non-interactive cryptographic proofs. This approach allows UAVs to prove their authenticity or location without disclosing sensitive information. We generated zk-SNARK proofs using the Zokrates tool on a Raspberry Pi, simulating a drone environment, and analyzed power consumption and CPU utilization. The results are promising, especially in the case of larger drones with higher battery capacities. Ethereum was chosen as the public blockchain platform, with smart contracts developed in Solidity and tested on the Sepolia testnet using Remix IDE. This novel proposed approach paves the way for a new path of research in the UAV area.
- Published
- 2024
- Full Text
- View/download PDF
49. Uni/multi variate polynomial embeddings for zkSNARKs
- Author
-
Gong, Guang
- Published
- 2024
- Full Text
- View/download PDF
50. Solving the Binary Puzzle with Genetic Algorithm.
- Author
-
Balagbis, Rachel Anne B. and Llantos, Orven E.
- Subjects
PUZZLES ,ARTIFICIAL intelligence ,GENETIC algorithms - Abstract
The increased internet usage after the pandemic led the UN Forum to improve cybersecurity measures, with zero-knowledge proofs (ZKP) being a viable solution for securing confidential information. ZKP protocols can be demonstrated through the binary puzzle, an NP-complete logic puzzle with four specific constraints. The key contribution of this paper is its successful implementation of the genetic algorithm as a new method to solve the binary puzzle. The optimized fitness function determined the solution at an average of 1.33-2.33 generations for populations ranging from 100 to 500. Its quadratic property calculated the solution faster than the ordinary linear fitness function. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.