An Anonymous and Supervisory Cross-Chain Privacy Protection Protocol for Zero-Trust IoT Application

نویسندگان

چکیده

Internet of things(IoT) development tends to reduce the reliance on centralized servers. The zero-trust distributed system combined with blockchain technology has become a hot topic in IoT research. However, distribution data storage services and different protocols make network interoperability cross-platform more complex. Relay chain is promising cross-chain that solves complexity compatibility issues associated transactions by utilizing relay blockchains as connectors. Yet, need collect asset information implement via two-way peg. Due release user transaction information, there issue privacy leakage. In this paper, we propose protection protocol based Groth16 zero-knowledge proof algorithm coin-mixing technology, which changes authentication mechanism uses combination generating functions map virtual external addresses transactions. It allows fast anonymous while hiding genuine user’s address. experiment shows that, context, our scheme can effectively protect accomplish controlled traceability operations, guarantee security.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous authentication for privacy-preserving IoT target-driven applications

The Internet of Things (IoT) will be formed by smart objects and services interacting autonomously and in real-time. Recently, Alcaide et al. proposed a fully decentralized anonymous authentication protocol for privacy-preserving IoT target-driven applications. Their system is set up by an ad-hoc community of decentralized founding nodes. Nodes can interact, being participants of cyberphysical ...

متن کامل

A view on privacy & trust in IoT

Internet of Things (IoT) technology is rapidly gaining popularity, not only in industrial and commercial environments, but also in our personal life by means of smart devices at home. Such devices often interconnect with cloud services that promise easy usage and global access. However, managing the balance between trust in the service provider and need for privacy of individuals becomes a majo...

متن کامل

An Anonymous Authenticated Protocol Based on Zero Knowledge Proof

With the rapid development of the Internet, anonymity and privacy protection in many applications of the scene is critical. The anonymous authentication means that the server can’t know the user’s identity when they are communicating with each other. In this paper, based on the Wang’s zero knowledge proof scheme of possessing a digital signature, we propose a new anonymous authentication scheme...

متن کامل

A lightweight and anonymous copyright-protection protocol

Gradually, copyright-protection protocols have attracted much attention in that they provide effective copyright protection mechanisms. Asymmetric copyright-protection protocols allow the buyer to know and possess the protected content yet the seller has no idea about it. Subsequently, if an illegal copy is found, the seller can identify the buyer by cooperating with a trusted third party. Most...

متن کامل

Privacy Protection in E-commerce: Identity-based Anonymous Privacy Agent

An identity-based anonymous agent privacy protection scheme is proposed to deal with the problems of privacy information disclosure. In this paper, some analysis about the status quo of the privacy protection research in China and some partitioning of privacy data in ecommerce are given. We further illuminate the whole process of privacy protection by an ecommerce privacy protection scheme base...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ACM Transactions on Sensor Networks

سال: 2023

ISSN: ['1550-4859', '1550-4867']

DOI: https://doi.org/10.1145/3583073