题名

具隱私強化之分散式資料加密交易平台

并列篇名

Decentralized data encryption trading platform with enhanced privacy

作者

李怡萱(Yi-Hsuan Li);左瑞麟(Raylin Tso)

关键词

資料交易平台 ; 環簽章 ; 隱身地址 ; 儲存證明 ; 代理人重加密 ; IPFS ; Data trading platform ; ring signature ; stealth address ; proof of storage ; proxy re-encryption ; IPFS

期刊名称

資訊安全通訊

卷期/出版年月

27卷3期(2021 / 08 / 01)

页次

21 - 37

内容语文

繁體中文

中文摘要

在網路發達的現代,資訊已經不限於以紙本形式存在,數位化的資訊也成為極其重要的資產,越來越多資訊分享和交易以數位形式出現在網路上,隨之而來的像是資料與交易安全性,使用者的隱私等多方面存在許多隱患,然而現有的資料交易平台並不完全可以信任,集中式儲存對使用者隱私和成本有負面影響,現行的去中心化存儲解決方案因為沒有可行的運作模式而缺乏節點的參與,資料的提供者也缺少對資料交易權的掌握。本研究提出使用區塊鏈和星際文件系統(IPFS)等多個技術結合的具隱私強化之分散式資料加密交易平台,資料部分利用代理人重加密技術進行保護並保存於IPFS中,結合儲存證明進行驗證,實現安全且可靠的存儲、交易過程結合環簽章與隱身地址保障交易雙方身分隱私,此外也有適當的獎勵來激勵節點的運作,後續在相關研究章節也對一些現行的系統進行評比,在這些技術的支持下為交易平台市場提供改進的參考。

英文摘要

In the modern era when the Internet is developed, information is no longer limited to the existence of paper, and digital information has become an extremely important asset. More and more information sharing and transactions appear on the Internet in digital form. There are many hidden dangers in many aspects such as data and transaction security, user privacy, etc. However, the existing data transaction platform is not completely trustworthy. Centralized storage has a negative impact on user privacy and cost. The current decentralized storage solutions do not have a good operating model and lack the participation of nodes, and the data provider does not have control over the right to data transactions. This research proposes a decentralized data encryption trading platform with enhanced privacy that uses a combination of multiple technologies such as blockchain and Inter Planetary File System (IPFS). The data part is protected by proxy re-encryption technology and stored in IPFS, combined with storage certificates for verification. Achieve safe and reliable storage, the transaction process combines ring signatures and stealth addresses to protect the identity and privacy of both parties in the transaction. In addition, there are appropriate rewards to incentivize the operation of the node. In the follow-up related research chapters, some current systems are also evaluated. In these technologies with the support of the trading platform, it provides an improved reference for the trading platform market.

主题分类 基礎與應用科學 > 資訊科學
参考文献
  1. IPFS DOC-Pin files using IPFS,https://docs.ipfs.io/how-to/pin-files/#three-kinds-of-pins。
  2. How the Catalan government uses IPFS to sidestep Spain's legal,http://la3.org/~kilburn/blog/catalan-government-bypass-ipfs/,2017.09.30.
  3. Aldanov, I.(2018).Aldanov,I., “CryptoNote.+ ”,pp.3-4, (2018).
  4. Adam Back, “Ring signature efficiency” https://bitcointalk.org/index.php?topic=972541.msg10619684, (2015.3.1)
  5. Bernstein, Daniel J.,Duif, Niels,Lange, Tanja,Schwabe, Peter,Yang, Bo-Yin(2012).High-speed high-security signatures.J. Cryptographic Engineering
  6. Blaze, M.,Bleumer, G.,Strauss, M.(1998).Divertible protocols and atomic proxy cryptography.International Conference on the Theory and Applications of Cryptographic Techniques
  7. ByteCoin,“Untraceable transactions which can contain a secure message are inevitable. ”,https://bitcointalk.org/index.php?topic=5965.0, (2011/4/17)
  8. filecoin.io,“Filecoin: A Cryptocurrency Operated File Storage Network, “,https://filecoin.io/filecoin-jul-2014.pdf, (2014) .
  9. Fujisaki, E.,Suzuki, K.(2007).Traceable Ring Signature.Public Key Cryptography–PKC 2007.PKC 2007
  10. Colin harper, “$4.6M in Filecoin Double Deposited on Binance;Exploit Open on Other Exchanges“,https://www.coindesk.com/filecoin-double-deposit-on-binance-exploitopen-other-exchanges, (2021/3/19)
  11. Liu, J.K.,Wei, V.K,Wong, D.S.(2004).Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups.Information Security and Privacy.ACISP 2004
  12. Ennio Y.Lu , “企業該選擇哪種鏈 ?-- 公有鏈 vs. 私有鏈 vs. 聯盟鏈”,https://www.blocktempo.com/which-blockchain-analysis/,2018/12/12
  13. Nick Mooney, “WHAT'S AN EDDSA? ”,https://duo.com/labs/tech-notes/whats-an-eddsa, (2020/5/14)
  14. Myers, S. A.,Shull, A.(2017).,未出版
  15. Protocol Labs, “Filecoin: A Decentralized Storage Network“,http://filecoin.io/filecoin.pdf, (2017)
  16. Duncan Riley, “Stolen credit card forum hacked and user details published online” (2021/3/28)
  17. Rivest, Ronald L.,Shamir, A.,Tauman, Y.(2001).How to leak a secret.ASIACRYPT 2001
  18. Taban, G.,Cárdenas, A. A.,Gligor, V. D.(2006).Towards a secure and interoperable DRM architecture.Proceedings of the ACM workshop on Digital rights management
  19. Van Saberhagen, N.(2013).,未出版
  20. N.Van Saberhagen., “Cryptonote v2.0. ”,https://cryptonote.org/whitepaper.pdf, (2013)
  21. Wilkinson, S.,Boshevski, T.,Brandoff, J.,Buterin, V.(2014).,未出版
  22. Yu, G.(2020).Blockchain Stealth Address Schemes.IACR Cryptol. ePrint Arch.,1-10.
  23. 陳恭(2017)。智能合約的發展與應用。財金資訊季刊,90,33-34。
  24. 陳曉莉,“研究:使用雲端儲存的行動程式中有 14%因開發者配置錯誤而曝露用戶資料或架構資訊“,https://www.ithome.com.tw/news/143070,2021/3/5
  25. 董天一,戴嘉樂,黃禹銘(2020).IPFS 原理與實戰.台北市:碁峰資訊.
被引用次数
  1. (2024)。應用區塊鏈發展地方文史資料典藏保護與策展應用平臺研究。華人宗教研究,24,201-218。