Skip to main content
Erschienen in: Journal of Combinatorial Optimization 5/2023

01.07.2023

RETRACTED ARTICLE: Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain

verfasst von: Shiwei Xu, Ao Sun, Zhengwei Ren, Yizhi Zhao, Qiufen Ni, Yan Tong

Erschienen in: Journal of Combinatorial Optimization | Ausgabe 5/2023

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Consortium blockchains offer privacy for members while allowing supervision peers access to on-chain data under certain circumstances. However, current key escrow schemes rely on vulnerable traditional asymmetric encryption/decryption algorithms. To address this issue, we have designed and implemented an enhanced post-quantum key escrow system for consortium blockchains. Our system integrates NIST post-quantum public-key encryption/KEM algorithms and various post-quantum cryptographic tools to provide a fine-grained, single-point-of-dishonest-resistant, collusion-proof and privacy-preserving solution. We also offer chaincodes, related APIs, and invoking command lines for development. Finally, we perform detailed security analysis and performance evaluation, including the consumed time of chaincode execution and the needed on-chain storage space, and we also highlight the security and performance of related post-quantum KEM algorithms on consortium blockchain.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat An H, Chen J (2021) ElearnChain: a privacy-preserving consortium blockchain system for e-learning educational records. J Inf Secur Appl 63:103013 An H, Chen J (2021) ElearnChain: a privacy-preserving consortium blockchain system for e-learning educational records. J Inf Secur Appl 63:103013
Zurück zum Zitat Asgaonkar A, Krishnamachari B (2019) Solving the buyer and seller’s dilemma: a dual-deposit escrow smart contract for provably cheat-proof delivery and payment for a digital good without a trusted mediator. In: 2019 IEEE international conference on blockchain and cryptocurrency (ICBC), pp 262–267 Asgaonkar A, Krishnamachari B (2019) Solving the buyer and seller’s dilemma: a dual-deposit escrow smart contract for provably cheat-proof delivery and payment for a digital good without a trusted mediator. In: 2019 IEEE international conference on blockchain and cryptocurrency (ICBC), pp 262–267
Zurück zum Zitat Bellare M, Goldwasser S (1996) Encapsulated key escrow. Technical report Bellare M, Goldwasser S (1996) Encapsulated key escrow. Technical report
Zurück zum Zitat Bellare M, Goldwasser S (1997) Verifiable partial key escrow. In: Proceedings of the 4th ACM conference on computer and communications security (New York, NY, USA), CCS ’97. Association for Computing Machinery, pp 78–91 Bellare M, Goldwasser S (1997) Verifiable partial key escrow. In: Proceedings of the 4th ACM conference on computer and communications security (New York, NY, USA), CCS ’97. Association for Computing Machinery, pp 78–91
Zurück zum Zitat Blaze M (1994) Protocol failure in the escrowed encryption standard. In: Proceedings of the 2nd ACM conference on computer and communications security (New York, NY, USA, 1994), CCS ’94. Association for Computing Machinery, pp 59–67 Blaze M (1994) Protocol failure in the escrowed encryption standard. In: Proceedings of the 2nd ACM conference on computer and communications security (New York, NY, USA, 1994), CCS ’94. Association for Computing Machinery, pp 59–67
Zurück zum Zitat Blaze M (1996) Oblivious key escrow. In: Anderson R (ed) Information hiding. Springer, Berlin, pp 335–343CrossRef Blaze M (1996) Oblivious key escrow. In: Anderson R (ed) Information hiding. Springer, Berlin, pp 335–343CrossRef
Zurück zum Zitat Cai X, Cheng W, Zhang M, Qian C, Ren Z, Xu S, Zhou J (2022) Post-quantum key escrow for supervised secret data sharing on consortium blockchain. In: Meng W, Conti M (eds) Cyberspace safety and security. Springer, Cham, pp 164–181CrossRef Cai X, Cheng W, Zhang M, Qian C, Ren Z, Xu S, Zhou J (2022) Post-quantum key escrow for supervised secret data sharing on consortium blockchain. In: Meng W, Conti M (eds) Cyberspace safety and security. Springer, Cham, pp 164–181CrossRef
Zurück zum Zitat Campbell R (2019a) Transitioning to a hyperledger fabric quantum-resistant classical hybrid public key infrastructure. J Br Blockchain Assoc 7 Campbell R (2019a) Transitioning to a hyperledger fabric quantum-resistant classical hybrid public key infrastructure. J Br Blockchain Assoc 7
Zurück zum Zitat Campbell R Sr (2019b) Evaluation of post-quantum distributed ledger cryptography. J Br Blockchain Assoc 2(1):3 Campbell R Sr (2019b) Evaluation of post-quantum distributed ledger cryptography. J Br Blockchain Assoc 2(1):3
Zurück zum Zitat Cha S, Baek S, Kim S (2020) Blockchain based sensitive data management by using key escrow encryption system from the perspective of supply chain. IEEE Access 8:154269–154280CrossRef Cha S, Baek S, Kim S (2020) Blockchain based sensitive data management by using key escrow encryption system from the perspective of supply chain. IEEE Access 8:154269–154280CrossRef
Zurück zum Zitat Denning DE, Branstad DK (1996) A taxonomy for key escrow encryption systems. Commun ACM 39(3):34–40CrossRef Denning DE, Branstad DK (1996) A taxonomy for key escrow encryption systems. Commun ACM 39(3):34–40CrossRef
Zurück zum Zitat Duy PT, Hoang HD, Hien DTT, Nguyen AG-T, Pham V-H (2022) B-DAC: a decentralized access control framework on northbound interface for securing SDN using blockchain. J Inf Secur Appl 64:103080 Duy PT, Hoang HD, Hien DTT, Nguyen AG-T, Pham V-H (2022) B-DAC: a decentralized access control framework on northbound interface for securing SDN using blockchain. J Inf Secur Appl 64:103080
Zurück zum Zitat Feigenbaum J, Ford B (2017) Multiple objectives of lawful-surveillance protocols. In: Stajano F, Anderson J, Christianson B, Matyáš V (eds) Security protocols XXV. Springer, Cham, pp 1–8 Feigenbaum J, Ford B (2017) Multiple objectives of lawful-surveillance protocols. In: Stajano F, Anderson J, Christianson B, Matyáš V (eds) Security protocols XXV. Springer, Cham, pp 1–8
Zurück zum Zitat Fernández-Caramés TM, Fraga-Lamas P (2020) Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 8:21091–21116CrossRef Fernández-Caramés TM, Fraga-Lamas P (2020) Towards post-quantum blockchain: a review on blockchain cryptography resistant to quantum computing attacks. IEEE Access 8:21091–21116CrossRef
Zurück zum Zitat Goldfeder S, Bonneau J, Gennaro R, Narayanan A (2017) Escrow protocols for cryptocurrencies: how to buy physical goods using bitcoin. In: Kiayias A (ed) Financial cryptography and data security. Springer, Cham, pp 321–339CrossRef Goldfeder S, Bonneau J, Gennaro R, Narayanan A (2017) Escrow protocols for cryptocurrencies: how to buy physical goods using bitcoin. In: Kiayias A (ed) Financial cryptography and data security. Springer, Cham, pp 321–339CrossRef
Zurück zum Zitat Hofheinz D, Hovelmanns K, Kiltz E (2017) A modular analysis of the Fujisaki-Okamoto transformation. In: Kalai Y, Reyzin L (eds) Theory of cryptography. Springer, Cham, pp 341–371CrossRef Hofheinz D, Hovelmanns K, Kiltz E (2017) A modular analysis of the Fujisaki-Okamoto transformation. In: Kalai Y, Reyzin L (eds) Theory of cryptography. Springer, Cham, pp 341–371CrossRef
Zurück zum Zitat Lee J-S, Chew C-J, Liu J-Y, Chen Y-C, Tsai K-Y (2022) Medical blockchain: data sharing and privacy preserving of EHR based on smart contract. J Inf Secur Appl 65:103117 Lee J-S, Chew C-J, Liu J-Y, Chen Y-C, Tsai K-Y (2022) Medical blockchain: data sharing and privacy preserving of EHR based on smart contract. J Inf Secur Appl 65:103117
Zurück zum Zitat Li M, Chen Y, Lal C, Conti M, Alazab M, Hu D (2021a) Eunomia: anonymous and secure vehicular digital forensics based on blockchain. IEEE Trans Dependable Secure Comput 1 Li M, Chen Y, Lal C, Conti M, Alazab M, Hu D (2021a) Eunomia: anonymous and secure vehicular digital forensics based on blockchain. IEEE Trans Dependable Secure Comput 1
Zurück zum Zitat Li M, Weng J, Liu J-N, Lin X, Obimbo C (2021b) Towards vehicular digital forensics from decentralized trust: an accountable, privacy-preserving, and secure realization. IEEE Internet Things J 1 Li M, Weng J, Liu J-N, Lin X, Obimbo C (2021b) Towards vehicular digital forensics from decentralized trust: an accountable, privacy-preserving, and secure realization. IEEE Internet Things J 1
Zurück zum Zitat Lv W, Wu S, Jiang C, Cui Y, Qiu X, Zhang Y (2022) Towards large-scale and privacy-preserving contact tracing in COVID-19 pandemic: a blockchain perspective. IEEE Trans Netw Sci Eng 9(1):282–298CrossRef Lv W, Wu S, Jiang C, Cui Y, Qiu X, Zhang Y (2022) Towards large-scale and privacy-preserving contact tracing in COVID-19 pandemic: a blockchain perspective. IEEE Trans Netw Sci Eng 9(1):282–298CrossRef
Zurück zum Zitat Merkle RC (1988) A digital signature based on a conventional encryption function. In: Pomerance C (ed) Advances in cryptology—CRYPTO ’87. Springer, Berlin, pp 369–378CrossRef Merkle RC (1988) A digital signature based on a conventional encryption function. In: Pomerance C (ed) Advances in cryptology—CRYPTO ’87. Springer, Berlin, pp 369–378CrossRef
Zurück zum Zitat Micali S (1993) Fair public-key cryptosystems. In: Brickell EF (ed) Advances in cryptology—CRYPTO’ 92. Springer, New York, pp 113–138CrossRef Micali S (1993) Fair public-key cryptosystems. In: Brickell EF (ed) Advances in cryptology—CRYPTO’ 92. Springer, New York, pp 113–138CrossRef
Zurück zum Zitat Olukoya O (2021) Distilling blockchain requirements for digital investigation platforms. J Inf Secur Appl 62:102969 Olukoya O (2021) Distilling blockchain requirements for digital investigation platforms. J Inf Secur Appl 62:102969
Zurück zum Zitat Panwar G, Vishwanathan R, Misra S, Bos (2019) SAMPL: scalable auditability of monitoring processes using public ledgers. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security (New York, NY, USA), CCS ’19. Association for Computing Machinery, pp 2249–2266 Panwar G, Vishwanathan R, Misra S, Bos (2019) SAMPL: scalable auditability of monitoring processes using public ledgers. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security (New York, NY, USA), CCS ’19. Association for Computing Machinery, pp 2249–2266
Zurück zum Zitat Segal A, Ford B, Feigenbaum J (2014) Catching bandits and only bandits: privacy-preserving intersection warrants for lawful surveillance. In: 4th USENIX workshop on free and open communications on the internet FOCI 14 Segal A, Ford B, Feigenbaum J (2014) Catching bandits and only bandits: privacy-preserving intersection warrants for lawful surveillance. In: 4th USENIX workshop on free and open communications on the internet FOCI 14
Zurück zum Zitat Semmouni MC, Nitaj A, Belkasmi M (2019) Bitcoin security with post quantum cryptography. In: Atig MF, Schwarzmann AA (eds) Networked systems. Springer, Cham, pp 281–288CrossRef Semmouni MC, Nitaj A, Belkasmi M (2019) Bitcoin security with post quantum cryptography. In: Atig MF, Schwarzmann AA (eds) Networked systems. Springer, Cham, pp 281–288CrossRef
Zurück zum Zitat Shamir A (1995) Partial key escrow: a new approach to software key escrow. Private communication made at Crypto (01) Shamir A (1995) Partial key escrow: a new approach to software key escrow. Private communication made at Crypto (01)
Zurück zum Zitat Shen R, Xiang H, Zhang X, Cai B, Xiang T (2019) Application and implementation of multivariate public key cryptosystem in blockchain (short paper). In: Wang X, Gao H, Iqbal M, Min G (eds) Collaborative computing: networking, applications and worksharing. Springer, Cham, pp 419–428CrossRef Shen R, Xiang H, Zhang X, Cai B, Xiang T (2019) Application and implementation of multivariate public key cryptosystem in blockchain (short paper). In: Wang X, Gao H, Iqbal M, Min G (eds) Collaborative computing: networking, applications and worksharing. Springer, Cham, pp 419–428CrossRef
Zurück zum Zitat Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303–332MathSciNetCrossRef Shor PW (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev 41(2):303–332MathSciNetCrossRef
Zurück zum Zitat Tyagi N, Mughees MH, Ristenpart T, Miers I (2018) BurnBox: self-revocable encryption in a world of compelled access. In: 27th USENIX security symposium (USENIX security 18) (Baltimore, MD, Aug). USENIX Association, pp 445–461 Tyagi N, Mughees MH, Ristenpart T, Miers I (2018) BurnBox: self-revocable encryption in a world of compelled access. In: 27th USENIX security symposium (USENIX security 18) (Baltimore, MD, Aug). USENIX Association, pp 445–461
Zurück zum Zitat Vargas L, Hazarika G, Culpepper R, Butler KR, Shrimpton T, Szajda D, Traynor P (2018) Mitigating risk while complying with data retention laws. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security (New York, NY, USA, 2018), CCS ’18. Association for Computing Machinery, pp 2011–2027 Vargas L, Hazarika G, Culpepper R, Butler KR, Shrimpton T, Szajda D, Traynor P (2018) Mitigating risk while complying with data retention laws. In: Proceedings of the 2018 ACM SIGSAC conference on computer and communications security (New York, NY, USA, 2018), CCS ’18. Association for Computing Machinery, pp 2011–2027
Zurück zum Zitat Verma A, Bhattacharya P, Saraswat D, Tanwar S (2021) NyaYa: blockchain-based electronic law record management scheme for judicial investigations. J Inf Secur Appl 63:103025 Verma A, Bhattacharya P, Saraswat D, Tanwar S (2021) NyaYa: blockchain-based electronic law record management scheme for judicial investigations. J Inf Secur Appl 63:103025
Zurück zum Zitat Xu S, Sun A, Cai X, Ren Z, Zhao Y, Zhou J (2021) Post-quantum user authentication and key exchange based on consortium blockchain. In: 2021 IEEE 27th international conference on parallel and distributed systems (ICPADS), pp 667–674 Xu S, Sun A, Cai X, Ren Z, Zhao Y, Zhou J (2021) Post-quantum user authentication and key exchange based on consortium blockchain. In: 2021 IEEE 27th international conference on parallel and distributed systems (ICPADS), pp 667–674
Zurück zum Zitat Xu Z, Chen L (2021) Div: resolving the dynamic issues of zero-knowledge set membership proof in the blockchain. In: Proceedings of the 2021 international conference on management of data, pp 2036–2048 Xu Z, Chen L (2021) Div: resolving the dynamic issues of zero-knowledge set membership proof in the blockchain. In: Proceedings of the 2021 international conference on management of data, pp 2036–2048
Zurück zum Zitat Yang X, Lau WF, Ye Q, Au MH, Liu JK, Cheng J (2020) Practical escrow protocol for bitcoin. IEEE Trans Inf Forensics Secur 15:3023–3034CrossRef Yang X, Lau WF, Ye Q, Au MH, Liu JK, Cheng J (2020) Practical escrow protocol for bitcoin. IEEE Trans Inf Forensics Secur 15:3023–3034CrossRef
Metadaten
Titel
RETRACTED ARTICLE: Enhanced post-quantum key escrow system for supervised data conflict of interest based on consortium blockchain
verfasst von
Shiwei Xu
Ao Sun
Zhengwei Ren
Yizhi Zhao
Qiufen Ni
Yan Tong
Publikationsdatum
01.07.2023
Verlag
Springer US
Erschienen in
Journal of Combinatorial Optimization / Ausgabe 5/2023
Print ISSN: 1382-6905
Elektronische ISSN: 1573-2886
DOI
https://doi.org/10.1007/s10878-023-01047-0

Weitere Artikel der Ausgabe 5/2023

Journal of Combinatorial Optimization 5/2023 Zur Ausgabe

Premium Partner