基于区块链和去中心化可问责属性认证的众包方案
DOI:
作者:
作者单位:

1.复旦大学;2.海南大学

作者简介:

通讯作者:

中图分类号:

基金项目:

国家重点研发计划 (2019YFB2101703); 国家自然科学基金 (62272107, U19A2066, 62302129); 上海市科技创新行动计划 (21511102200); 广东省重点研发计划(2020B0101090001);海南省重点研发项目(ZDYF2024GXJS030)


A crowdsourcing scheme based on blockchain and decentralized accountable attribute-based authentication
Author:
Affiliation:

Fund Project:

National Key R & D Program of China (2019YFB2101703);National Natural Science Foundation of China (62272107, U19A2066, 62302129) ;the Innovation Action Plan of Shanghai Science and Technology (21511102200);the Key R & D Program of Guangdong Province (2020B0101090001)

  • 摘要
  • |
  • 图/表
  • |
  • 访问统计
  • |
  • 参考文献
  • |
  • 相似文献
  • |
  • 引证文献
  • |
  • 资源附件
  • |
  • 文章评论
    摘要:

    众包是一种分布式解决问题的方式,可以降低成本并有效利用资源.区块链技术的引入解决了传统众包平台集中化程度过高的问题,但它的透明性却带来了隐私泄露的风险.传统的匿名认证虽然可以隐藏用户身份,但存在匿名滥用的问题,同时还增加了对工作者筛选的难度.本文提出了一种去中心化可问责属性认证方案,并将其与区块链结合设计了一种新型众包方案.该方案利用去中心化属性加密与非交互式零知识证明技术,在保护用户身份隐私的同时实现了可链接性和可追踪性,并且请求者可以制定访问策略来筛选工作者.此外,该方案通过门限秘密分享技术实现了属性授权机构和追踪组,提高了系统的安全性.本文通过实验仿真和分析证明了该方案在时间和存储开销上符合实际应用需求.

    Abstract:

    Crowdsourcing is a distributed approach to problem solving that reduces costs and efficiently utilizes resources. The introduction of blockchain technology solves the problem of over-centralization in traditional crowdsourcing platforms, but its transparency brings the risk of privacy leakage. The traditional anonymous authentication can hide the user""s identity, but there is the problem of anonymity abuse, and it also increases the difficulty of selecting workers. In this paper, we propose a decentralized accountable attribute-based authentication scheme and combine it with blockchain to design a novel crowdsourcing scheme. The scheme utilizes decentralized attribute-based encryption with non-interactive zero-knowledge proof to achieve linkability and traceability while protecting the privacy of users"" identities, and the requester can devise access policies to select workers. In addition, the scheme improves the security of the system by implementing attribute authorization authority and tracking groups through the threshold secret sharing technique. In this paper, we demonstrate through experimental simulation and analysis that the scheme meets the requirements of practical applications in terms of time and storage overhead.

    参考文献
    相似文献
    引证文献
引用本文
分享
文章指标
  • 点击次数:
  • 下载次数:
  • HTML阅读次数:
  • 引用次数:
历史
  • 收稿日期:2023-11-07
  • 最后修改日期:2024-02-19
  • 录用日期:2024-04-15
  • 在线发布日期:
  • 出版日期:
您是第位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号