Blockchain Data Availability Scheme with Strong Data Privacy Protection
نویسندگان
چکیده
Blockchain, with its characteristics of non-tamperability and decentralization, has had a profound impact on various fields society set off boom in the research application blockchain technology. However, technology faces problem data availability attacks during application, which greatly limits scope domain applications. One most advantageous researches to address this is scalable solution that integrates coding theory design into Merkle tree promise. Based scheme, paper combines zero-knowledge accumulator higher efficiency security local repair coding, proposes scheme strong dataset privacy protection. The first encodes block information ensure tamper-proof data, then uses store encoded information. Its main purpose use property protect accumulation stored from being leaked no other about revealed transmission. It fundamentally reduces possibility attackers generating fraudulent by imitating further resists attacks.
منابع مشابه
A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection
-Mambo, et al. [3] discussed the delegation of signature power to a proxy signer. Lee, et al. [5] constructed a strong non-designated proxy signature scheme in which the proxy signer had strong nonrepudiation. In this paper, we present an enhancement to their scheme such that the identity of the proxy signer is hidden behind an alias. The identity can be revealed only by the alias authority. We...
متن کاملAnalyzing Tools and Algorithms for Privacy Protection and Data Security in Social Networks
The purpose of this research, is to study factors influencing privacy concerns about data security and protection on social network sites and its’ influence on self-disclosure. 100 articles about privacy protection, data security, information disclosure and Information leakage on social networks were studied. Models and algorithms types and their repetition in articles have been distinguished a...
متن کاملPrivacy - DRM : Data Protection by Copy Protection ?
Protecting media contents and enforcing privacy policies seem to be related problems: mechanisms are needed to restrict data processing outside the copyright holder’s, respectively data subject’s, domain of control. A systematic analysis of requirements, properties, and experiences with digital rights management (DRM) reveals substantial differences between Content-DRM to protect media contents...
متن کاملData Anonymization for Privacy Protection
Social networks have become the universal consumer phenomena and have emerged with increasing popularity nowadays. The amount of network data grows enormously due to the increase of networking websites. The development of social networks has led to the increasing demand for the protection of privacy in publishing the social network data as the social network sites are accumulated with large amo...
متن کاملPrivacy Protection Data Access Control
For some purposes, such as benefits, requirement-fitted services and management, enterprises regularly ask customers, employees, and business partner to provide relevance data including sensitive personal information. However, transparent information bring the infringement of privacy and threats of living security to the data providers. Recently, enterprises have suffered from the loss of poten...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Information
سال: 2023
ISSN: ['2078-2489']
DOI: https://doi.org/10.3390/info14020088