为解决现有的双线性对外包支付协议依赖可信第三方,没有实现参与双方的公平性等问题,提出基于区块链系统的协议以实现去中心化,通过对原始数据进行盲化处理实现数据隐私,对恶意参与方实施扣除押金惩罚来保证公平支付。当用户质疑外包结果的正确性时,区块链利用用户提供的随机数据和随机向量即可快速验证,从而提高了支付效率。在以太坊中进行模拟实验,结果表明用户计算量大幅减少,用户能有效验证外包结果的正确性且实现支付公平性。与已有协议相比,用户和服务器在支付阶段效率都是最高的。
In order to solve the problem that existing bilinear outsourcing payment protocols rely heavilyon a trusted third party and lacks of the fairness of participating parties, in this paper, we propose a protocol based on blockchain system to achieve decentralization, realize data privacy by blindly processing the original data, and ensure fair payment by imposing the penalties of deducting the deposits of malicious participants. When users question the correctness of outsourcing results, the blockchain will quickly verify the results using random data and random vectors provided by users, thereby improving payment efficiency. A simulation experiment is conducted in Ethereum, and its results show that the amount of user calculations is greatly reduced, and users can effectively verify the correctness of outsourcing results and achieve payment fairness. Compared with existing protocols, both users and servers have the highest efficiency in payment phase.
[1] 熊金波,张媛媛,田有亮,等.基于角色对称加密的云数据安全去重[JI.通信学报, 2018, 39(5):63-77. Xiong J B, Zhang Y Y, Tian Y L, et al. Cloud data security deduplication based on role symmetric encryption[J]. Journal on Communications, 2018, 39(5):63-77. (in Chinese)
[2] Xia P. Data security risk and preventive measures of virtual cloud server based on cloud computing[M].[S.l.]:Springer, 2020.
[3] Mohamed K S. Cloud, fog, and edge computing[M]. Cham:Springer, 2020.
[4] Yang Y, Huang X, Liu X M, et al. A comprehensive survey on secure outsourced computation and its applications[J]. IEEE Access, 2019, 7:159426-159465.
[5] Li Z D, Li W M, Jin Z P, et al. An efficient ABE scheme with verifiable outsourced encryption and decryption[J]. IEEE Access, 2019, 7:29023-29037.
[6] Tong L, Yu J, Zhang H L. Secure outsourcing algorithm for bilinear pairings without precomputation[C]//2019 IEEE Conference on Dependable and Secure Computing, 2019:1-7.
[7] Chen X F, Susilo W, Li J, et al. Efficient algorithms for secure outsourcing of bilinear pairings[J]. Theoretical Computer Science, 2015(562):112-121.
[8] Tian H B, Zhang F G, Ren K. Secure bilinear pairing outsourcing made more efficient and flexible[C]//Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. New York:ACM, 2015, 417-426.
[9] Ren Y L, Ding N, Wang T Y, et al. New algorithms for verifiable outsourcing of bilinear pairings[J]. Science China Information Sciences, 2016, 59(9):1-3.
[10] Dong M, Ren Y L. Efficient and secure outsourcing of bilinear pairings with single server[J]. Science China Information Sciences, 2018, 61(3):1-3.
[11] Huang H, Chen X F, Wu Q H, et al. Bitcoin-based fair payments for outsourcing computations of fog devices[J]. Future Generation Computer Systems, 2016, 78(2):850-858.
[12] Ateniese G, Goodrich M T, Lekakis V, et al. Accountable storage[C]//International Conference on Applied Cryptography and Network Security. Cham:Springer, 2017:623-644.
[13] Boneh D, Franklin M. Identity-based encryption from the weil pairing[C]//Annual International Cryptology Conference. Berlin:Springer, 2001, 2139:213-229
[14] Boneh D, Lynn B, Shacham H. Short signatures from the weil pairing[C]//International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2001, 2248:514-532
[15] Galbraith S, Paterson K, Smart N. Pairings for cryptographers[J]. Discrete Applied Mathematics, 2008, 156(16):3113-3121.
[16] 任艳丽,徐丹婷,张新鹏,等.基于门限环签名的可删除区块链[J].通信学报, 2019, 40(4):71-82. Ren Y L, Xu D T, Zhang X P, et al. Deletable blockchain based on threshold ring signature[J]. Journal on Communications, 2019, 40(4):71-82. (in Chinese)
[17] Huang D, Ma X, Zhang S. Performance analysis of the raft consensus algorithm for private blockchains[J]. IEEE Transaction on Systems Man & Cybernetics Systems, 2018, 50(1):172- 181.
[18] Aoki Y, Koshizuka N, Seike H. Fork rate-based analysis of the longest chain growth time interval of a PoW blockchain[C]//2019 IEEE International Conference on Blockchain, 2019:253-260.
[19] Thilagavathi M. Enhancing blockchain performance using parallel Merkle root and parallel proof of work[J]. Journal of Advanced Research in Dynamical and Control Systems, 2020, 12(1 Special Issue):609-620.
[20] Yalla S T, Nikhileenad P. An overview on blockchain technology and its applications[M]. Singapore:Springer, 2020.
[21] Ye J, Wang J. Secure outsourcing of modular exponentiation with single untrusted server[C]//IEEE 201518th International Conference on Network-Based Information Systems, 2015:643-645.
[22] 沈楠,李瑞琪,贾春福,等.基于密钥协商和身份匿名技术的社交发现隐私保护方案[J]. 四川大学学报(工程科学版), 2019, 51(6):168-174. Shen N, Li R Q, Jia C F, et al. Social discovery privacy protection scheme based on key agreement and identity anonymity technology[J]. Journal of Sichuan University (Engineering Science Edition), 2019, 51(6):168-174. (in Chinese)