Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment

نویسندگان

چکیده

With the rapid advancement and wide application of blockchain technology, consensus protocols, which are core part systems, along with privacy issues, have drawn much attention from researchers. A key aspect in is sensitive content transactions permissionless blockchain. Meanwhile, some applications, such as cryptocurrencies, based on low-efficiency high-cost may not be practical feasible for other applications. In this paper, we propose an efficient privacy-preserving protocol, called Delegated Proof Secret Sharing (DPoSS), inspired by secure multiparty computation. Specifically, DPoSS first uses polynomial interpolation to select a dealer group many nodes maintain system, dealers take turns pack new block. addition, since sensitive, our proposed design utilizes verifiable secret sharing protect transmission defend against malicious attacks. Extensive experiments show that protocol achieves fairness during process reaching consensus.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Multiparty Computation and Secret Sharing

In a data-driven society, individuals and companies encounter numerous situations where private information is an important resource. How can parties handle confidential data if they do not trust everyone involved? This text is the first to present a comprehensive treatment of unconditionally secure techniques for multiparty computation (MPC) and secret sharing. In a secure MPC, each party poss...

متن کامل

Unconditionally Secure Multiparty Computation and Secret Sharing

We suggest protocols for secure computation of the sum, product, and some other functions of three or more elements of an arbitrary constructible ring, without using any one-way functions. A new input that we offer here is that, in contrast with other proposals, we conceal “intermediate results” of a computation, i.e., we do not let any party accumulate functions of other parties’ private numbe...

متن کامل

New privacy preserving clustering methods for secure multiparty computation

Many researches on privacy preserving data mining have been done. Privacy preserving data mining can be achieved in various ways by use of randomization techniques, cryptographic algorithms, anonymization methods, etc. Further, in order to increase the security of data mining, secure multiparty computation (SMC) has been introduced. Most of works in SMC are developed on applying the model of SM...

متن کامل

New Privacy Preserving Back Propagation Learning for Secure Multiparty Computation

Many studies have been done with the security of cloud computing. Data encryption is one of typical approaches. However, complex computing requirement for encrypted data needs a great deal of time and effort for the system in this case. Therefore, another studies on secure sharing and computing methods are made to avoid secure risks being abused or leaked and to reduce computing cost. The secur...

متن کامل

Privacy Preserving Fuzzy Modeling for Secure Multiparty Computation

Many studies on privacy preserving of machine learning and data mining have been done in various methods by use of randomization techniques, cryptographic algorithms, anonymization methods, etc. Data encryption is one of typical approaches. However, its system requires both encryption and decryption for requests of client or user, so its complexity of computation is very high. Therefore, studie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Network

سال: 2022

ISSN: ['2673-8732']

DOI: https://doi.org/10.3390/network2010005