PDKSAP : Perfected Double-Key Stealth Address Protocol without Temporary Key Leakage in Blockchain

Author(s):  
Cong Feng ◽  
Liang Tan ◽  
Huan Xiao ◽  
Keping Yu ◽  
Xin Qi ◽  
...  
Keyword(s):  
2016 ◽  
Vol E99.D (12) ◽  
pp. 2956-2967
Author(s):  
Tatsuyuki MATSUSHITA ◽  
Shinji YAMANAKA ◽  
Fangming ZHAO

2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Ying Zou ◽  
Yanting Chai ◽  
Sha Shi ◽  
Lei Wang ◽  
Yunfeng Peng ◽  
...  

Due to the transparency of the wireless channel, users in multiple-key environment are vulnerable to eavesdropping during the process of uploading personal data and re-encryption keys. Besides, there is additional burden of key management arising from multiple keys of users. In addition, profile matching using inner product between vectors cannot effectively filter out users with ulterior motives. To tackle the above challenges, we first improve a homomorphic re-encryption system (HRES) to support a single homomorphic multiplication and arbitrarily many homomorphic additions. The public key negotiated by the clouds is used to encrypt the users’ data, thereby avoiding the issues of key leakage and key management, and the privacy of users’ data is also protected. Furthermore, our scheme utilizes the homomorphic multiplication property of the improved HRES algorithm to compute the cosine result between the normalized vectors as the standard for measuring the users’ proximity. Thus, we can effectively improve the social experience of users.


2013 ◽  
Vol 13 (4) ◽  
pp. 935-955 ◽  
Author(s):  
Chun Zhou ◽  
Wan-Su Bao ◽  
Hong-Wei Li ◽  
Yang Wang ◽  
Xiang-Qun Fu

2019 ◽  
Vol 30 (04) ◽  
pp. 665-681
Author(s):  
Yinghui Zhang ◽  
Menglei Yang ◽  
Dong Zheng ◽  
Tiantian Zhang ◽  
Rui Guo ◽  
...  

As a promising public key cryptographic primitive, hierarchical identity-based encryption (HIBE) introduces key delegation mechanisms into identity-based encryption. However, key leakage and recipient anonymity issues have not been adequately addressed in HIBE. Hence, direct applications of traditional HIBE schemes will violate data security and abuse users’ privacy in practice. In this paper, we propose an anonymous unbounded hierarchical identity-based encryption scheme, which achieves bounded leakage resilience and the hierarchy depth is not limited. Our security proofs based on the dual system encryption technique show that the proposed scheme is capable of resisting key leakage and it realizes recipient anonymity in the standard model. In addition, leakage resilience analysis indicates that our scheme allows the leakage rate of approximate 1/3 no matter the hierarchy depth of identities. Finally, performance comparisons show the practicability of our scheme. In particular, the secret key of our construction is of a fixed-length.


Sign in / Sign up

Export Citation Format

Share Document