Computer Science and Applications

Payment Protocol for Outsourcing of Bilinear Pairing Based on Blockchain

Expand
  • School of Communication&Information Engineering, Shanghai University, Shanghai 200444, China

Received date: 2021-06-04

  Online published: 2022-12-03

Abstract

In order to solve the problem that existing bilinear outsourcing payment protocols rely heavilyon a trusted third party and lacks of the fairness of participating parties, in this paper, we propose a protocol based on blockchain system to achieve decentralization, realize data privacy by blindly processing the original data, and ensure fair payment by imposing the penalties of deducting the deposits of malicious participants. When users question the correctness of outsourcing results, the blockchain will quickly verify the results using random data and random vectors provided by users, thereby improving payment efficiency. A simulation experiment is conducted in Ethereum, and its results show that the amount of user calculations is greatly reduced, and users can effectively verify the correctness of outsourcing results and achieve payment fairness. Compared with existing protocols, both users and servers have the highest efficiency in payment phase.

Cite this article

YANG Danling, REN Yanli . Payment Protocol for Outsourcing of Bilinear Pairing Based on Blockchain[J]. Journal of Applied Sciences, 2022 , 40(6) : 1019 -1033 . DOI: 10.3969/j.issn.0255-8297.2022.06.012

References

[1] 熊金波,张媛媛,田有亮,等.基于角色对称加密的云数据安全去重[JI.通信学报, 2018, 39(5):63-77. Xiong J B, Zhang Y Y, Tian Y L, et al. Cloud data security deduplication based on role symmetric encryption[J]. Journal on Communications, 2018, 39(5):63-77. (in Chinese)
[2] Xia P. Data security risk and preventive measures of virtual cloud server based on cloud computing[M].[S.l.]:Springer, 2020.
[3] Mohamed K S. Cloud, fog, and edge computing[M]. Cham:Springer, 2020.
[4] Yang Y, Huang X, Liu X M, et al. A comprehensive survey on secure outsourced computation and its applications[J]. IEEE Access, 2019, 7:159426-159465.
[5] Li Z D, Li W M, Jin Z P, et al. An efficient ABE scheme with verifiable outsourced encryption and decryption[J]. IEEE Access, 2019, 7:29023-29037.
[6] Tong L, Yu J, Zhang H L. Secure outsourcing algorithm for bilinear pairings without precomputation[C]//2019 IEEE Conference on Dependable and Secure Computing, 2019:1-7.
[7] Chen X F, Susilo W, Li J, et al. Efficient algorithms for secure outsourcing of bilinear pairings[J]. Theoretical Computer Science, 2015(562):112-121.
[8] Tian H B, Zhang F G, Ren K. Secure bilinear pairing outsourcing made more efficient and flexible[C]//Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security. New York:ACM, 2015, 417-426.
[9] Ren Y L, Ding N, Wang T Y, et al. New algorithms for verifiable outsourcing of bilinear pairings[J]. Science China Information Sciences, 2016, 59(9):1-3.
[10] Dong M, Ren Y L. Efficient and secure outsourcing of bilinear pairings with single server[J]. Science China Information Sciences, 2018, 61(3):1-3.
[11] Huang H, Chen X F, Wu Q H, et al. Bitcoin-based fair payments for outsourcing computations of fog devices[J]. Future Generation Computer Systems, 2016, 78(2):850-858.
[12] Ateniese G, Goodrich M T, Lekakis V, et al. Accountable storage[C]//International Conference on Applied Cryptography and Network Security. Cham:Springer, 2017:623-644.
[13] Boneh D, Franklin M. Identity-based encryption from the weil pairing[C]//Annual International Cryptology Conference. Berlin:Springer, 2001, 2139:213-229
[14] Boneh D, Lynn B, Shacham H. Short signatures from the weil pairing[C]//International Conference on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2001, 2248:514-532
[15] Galbraith S, Paterson K, Smart N. Pairings for cryptographers[J]. Discrete Applied Mathematics, 2008, 156(16):3113-3121.
[16] 任艳丽,徐丹婷,张新鹏,等.基于门限环签名的可删除区块链[J].通信学报, 2019, 40(4):71-82. Ren Y L, Xu D T, Zhang X P, et al. Deletable blockchain based on threshold ring signature[J]. Journal on Communications, 2019, 40(4):71-82. (in Chinese)
[17] Huang D, Ma X, Zhang S. Performance analysis of the raft consensus algorithm for private blockchains[J]. IEEE Transaction on Systems Man & Cybernetics Systems, 2018, 50(1):172- 181.
[18] Aoki Y, Koshizuka N, Seike H. Fork rate-based analysis of the longest chain growth time interval of a PoW blockchain[C]//2019 IEEE International Conference on Blockchain, 2019:253-260.
[19] Thilagavathi M. Enhancing blockchain performance using parallel Merkle root and parallel proof of work[J]. Journal of Advanced Research in Dynamical and Control Systems, 2020, 12(1 Special Issue):609-620.
[20] Yalla S T, Nikhileenad P. An overview on blockchain technology and its applications[M]. Singapore:Springer, 2020.
[21] Ye J, Wang J. Secure outsourcing of modular exponentiation with single untrusted server[C]//IEEE 201518th International Conference on Network-Based Information Systems, 2015:643-645.
[22] 沈楠,李瑞琪,贾春福,等.基于密钥协商和身份匿名技术的社交发现隐私保护方案[J]. 四川大学学报(工程科学版), 2019, 51(6):168-174. Shen N, Li R Q, Jia C F, et al. Social discovery privacy protection scheme based on key agreement and identity anonymity technology[J]. Journal of Sichuan University (Engineering Science Edition), 2019, 51(6):168-174. (in Chinese)
Outlines

/