Skip to main content
Top

2021 | OriginalPaper | Chapter

A Data Privacy Approach Using Shamir’s Secret Scheme in Permissioned Blockchain

Authors : K. Sunil Kumar, Kurunandan Jain, Narayanan Subramanian

Published in: Computer Networks and Inventive Communication Technologies

Publisher: Springer Nature Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Information sharing is the basic necessity for advancement in research works. Information sharing in the existing technology is relied on trusted third parties (TTP). There is a lack of trust for transparency, security, and immutability in these systems because of the participation of TTP. For these issues, the blockchain technology can be used to secure the information sharing in the decentralized network by maximizing the advantages of the decentralized file system (DFS). Blockchain faces serious issues with data privacy, which is an obstacle for the application of the blockchain. This paper introduces the usage of the Shamir’s secret sharing (SSS) system to the blockchain. The proposal resists passive and disguise attacks. The proposed systems with SSS have results with lesser computational time compared to the advanced encryption standard (AES) 128. In non-transactional scenarios, the proposed system is functional and effective.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
4.
go back to reference Riasanow T, Jäntgen L, Hermes S, Böhm M, Krcmar H: Core, intertwined, and ecosystem-specific clusters in platform ecosystems: analyzing similarities in the digital transformation of the automotive, blockchain, financial, insurance and IIoT industry. Electron Markets. https://doi.org/10.1007/s12525-020-00407-6 Riasanow T, Jäntgen L, Hermes S, Böhm M, Krcmar H: Core, intertwined, and ecosystem-specific clusters in platform ecosystems: analyzing similarities in the digital transformation of the automotive, blockchain, financial, insurance and IIoT industry. Electron Markets. https://​doi.​org/​10.​1007/​s12525-020-00407-6
5.
go back to reference Holland M, Nigischer C, Stjepandic J (2017) Copyright protection in additive manufacturing with blockchain approach. Transdiscip Eng: Paradigm Shift 5:914–921 Holland M, Nigischer C, Stjepandic J (2017) Copyright protection in additive manufacturing with blockchain approach. Transdiscip Eng: Paradigm Shift 5:914–921
6.
go back to reference Detwiler DD (2018) One nations move to increase food safety with blockchain. Blockchain pulse: IBM blockchain blog Detwiler DD (2018) One nations move to increase food safety with blockchain. Blockchain pulse: IBM blockchain blog
7.
go back to reference Shen N, Adam M et al (2016) Ring confidential transactions. Ledger 1:1–18CrossRef Shen N, Adam M et al (2016) Ring confidential transactions. Ledger 1:1–18CrossRef
8.
go back to reference Yu B, Liu JK, Sakzad A, Nepal S, Steinfeld R, Rimba P, Au MH (2018) Platform-independent secure blockchain-based voting system. In: International conference on information security. Springer, pp 369–386 Yu B, Liu JK, Sakzad A, Nepal S, Steinfeld R, Rimba P, Au MH (2018) Platform-independent secure blockchain-based voting system. In: International conference on information security. Springer, pp 369–386
9.
go back to reference Chiesa A, Tromer E, Virza M (2015) Cluster computing in zero knowledge. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 371–403 Chiesa A, Tromer E, Virza M (2015) Cluster computing in zero knowledge. In: Annual international conference on the theory and applications of cryptographic techniques. Springer, pp 371–403
11.
go back to reference Wang B, Sun J, He Y, Pang D, Lu N (2018) Large-scale election based on blockchain. Procedia Comput Sci 129:234–237CrossRef Wang B, Sun J, He Y, Pang D, Lu N (2018) Large-scale election based on blockchain. Procedia Comput Sci 129:234–237CrossRef
12.
go back to reference Zhang M, Wang S, Zhang P, He L, Li X, Zhou S (2019) Protecting data privacy for permissioned blockchains using identity-based encryption. In: 2019 IEEE 3rd information technology, networking, electronic and automation control conference (ITNEC). IEEE, pp 602–605 Zhang M, Wang S, Zhang P, He L, Li X, Zhou S (2019) Protecting data privacy for permissioned blockchains using identity-based encryption. In: 2019 IEEE 3rd information technology, networking, electronic and automation control conference (ITNEC). IEEE, pp 602–605
13.
go back to reference Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques. Springer, pp 47–53 Shamir A (1984) Identity-based cryptosystems and signature schemes. In: Workshop on the theory and application of cryptographic techniques. Springer, pp 47–53
14.
go back to reference Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. In: Annual international cryptology conference. Springer, pp 213–229 Boneh D, Franklin M (2001) Identity-based encryption from the Weil pairing. In: Annual international cryptology conference. Springer, pp 213–229
15.
go back to reference Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Y (2018) An id-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6:20632–20640CrossRef Lin Q, Yan H, Huang Z, Chen W, Shen J, Tang Y (2018) An id-based linearly homomorphic signature scheme and its application in blockchain. IEEE Access 6:20632–20640CrossRef
Metadata
Title
A Data Privacy Approach Using Shamir’s Secret Scheme in Permissioned Blockchain
Authors
K. Sunil Kumar
Kurunandan Jain
Narayanan Subramanian
Copyright Year
2021
Publisher
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-15-9647-6_68