Skip to main content

Privacy-Preserving Blockchain Supervision with Responsibility Tracking

  • Conference paper
  • First Online:
Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2023)

Abstract

Blockchain technology is a strategic technology to support the development of digital economy, which helps to promote data sharing, improve the efficiency of communication and build a trusted system. With the continuous development of blockchain technology, security problems caused by lack of regulation are also frequent. Also, the supervision process needs to check the data information on the blockchain, which may lead to the disclosure of users’ privacy information. To solve the above problems, this paper proposes a privacy protection blockchain supervision scheme (PBS) that supports ciphertext supervision and malicious user tracking. The PBS supports the supervision of ciphertext data on the blockchain, meaning that regulators do not need to decrypt it and can perform supervision without plaintext. This ensures that the private data of users on the blockchain would not be compromised in the process of supervision. Moreover, the scheme supports the tracking of the sender of the offending information. Theoretical analysis and comparison show that the proposed PBS can effectively ensure the privacy of user data on blockchain, and experimental analysis demonstrates the practicability of the scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Bünz, B., Agrawal, S., Zamani, M., Boneh, D.: Zether: towards privacy in a smart contract world. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 423–443. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-51280-4_23

    Chapter  Google Scholar 

  2. Da, L., Liang, H., Ding, Y., Wang, Y., Yang, C., Wang, H.: Blockchain-based data acquisition with privacy protection in UAV cluster network. CMES-Comput. Model. Eng. Sci. 137(1), 879–902 (2023)

    Google Scholar 

  3. Gorkhali, A., Chowdhury, R.: Blockchain and the evolving financial market: a literature review. J. Ind. Integr. Manage. 7(01), 47–81 (2022)

    Article  Google Scholar 

  4. Huang, K., Tso, R., Chen, Y.C., Rahman, S.M.M., Almogren, A., Alamri, A.: PKE-AET: public key encryption with authorized equality test. Comput. J. 58(10), 2686–2697 (2015)

    Article  Google Scholar 

  5. Li, X., Wu, L., Zhao, R., Lu, W., Xue, F.: Two-layer adaptive blockchain-based supervision model for off-site modular housing production. Comput. Ind. 128, 103437 (2021)

    Article  Google Scholar 

  6. Liu, J., Zhang, H., Zhen, L.: Blockchain technology in maritime supply chains: applications, architecture and challenges. Int. J. Prod. Res. 61(11), 3547–3563 (2023)

    Article  Google Scholar 

  7. Ma, Y., Sun, Y., Lei, Y., Qin, N., Lu, J.: A survey of blockchain technology on security, privacy, and trust in crowdsourcing services. World Wide Web 23(1), 393–419 (2020)

    Article  Google Scholar 

  8. Marian, O.: A conceptual framework for the regulation of cryptocurrencies. U. Chi. L. Rev. Dialogue 82, 53 (2015)

    Google Scholar 

  9. Peng, S., et al.: An efficient double-layer blockchain method for vaccine production supervision. IEEE Trans. Nanobiosci. 19(3), 579–587 (2020)

    Article  Google Scholar 

  10. Rahulamathavan, Y., Phan, R.C.W., Rajarajan, M., Misra, S., Kondoz, A.: Privacy-preserving blockchain based IoT ecosystem using attribute-based encryption. In: 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS), pp. 1–6. IEEE (2017)

    Google Scholar 

  11. Tang, Q.: Public key encryption schemes supporting equality test with authorisation of different granularity. Int. J. Appl. Cryptogr. 2(4), 304–321 (2012)

    Article  MathSciNet  Google Scholar 

  12. Wang, J., et al.: Blockchain-based information supervision model for rice supply chains. Comput. Intell. Neurosci. 2022 (2022). Article ID 2914571

    Google Scholar 

  13. Wang, Y., Pang, H., Deng, R.H., Ding, Y., Wu, Q., Qin, B.: Securing messaging services through efficient signcryption with designated equality test. Inf. Sci. 490, 146–165 (2019)

    Article  Google Scholar 

  14. Wang, Y., et al.: Secure server-aided data sharing clique with attestation. Inf. Sci. 522, 80–98 (2020)

    Article  MathSciNet  Google Scholar 

  15. Wen, B., Wang, Y., Ding, Y., Zheng, H., Liang, H., Wang, H.: A privacy-preserving blockchain supervision framework in the multiparty setting. Wirel. Commun. Mob. Comput. 2021 (2021). Article ID 5236579

    Google Scholar 

  16. Wen, B., Wang, Y., Ding, Y., Zheng, H., Qin, B., Yang, C.: Security and privacy protection technologies in securing blockchain applications. Inf. Sci. 645, 119322 (2023)

    Article  Google Scholar 

  17. Xiao, X., Zhang, Y., Zhu, Y., Hu, P., Cao, X.: Fingerchain: copyrighted multi-owner media sharing by introducing asymmetric fingerprinting into blockchain. IEEE Trans. Netw. Serv. Manage. 20, 2869–2885 (2023)

    Article  Google Scholar 

  18. Xiong, H., Hou, Y., Huang, X., Zhao, Y., Chen, C.M.: Heterogeneous signcryption scheme from IBC to PKI with equality test for WBANs. IEEE Syst. J. 16(2), 2391–2400 (2021)

    Article  Google Scholar 

  19. Yang, G., Tan, C.H., Huang, Q., Wong, D.S.: Probabilistic public key encryption with equality test. In: Pieprzyk, J. (ed.) CT-RSA 2010. LNCS, vol. 5985, pp. 119–131. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-11925-5_9

    Chapter  Google Scholar 

  20. Yong, B., Shen, J., Liu, X., Li, F., Chen, H., Zhou, Q.: An intelligent blockchain-based system for safe vaccine supply and supervision. Int. J. Inf. Manage. 52, 102024 (2020)

    Article  Google Scholar 

  21. Zhang, F., Maram, D., Malvai, H., Goldfeder, S., Juels, A.: DECO: liberating web data using decentralized oracles for TLS. In: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pp. 1919–1938 (2020)

    Google Scholar 

  22. Zhao, M., Ding, Y., Tang, S., Liang, H., Wang, H.: Public key encryption with authorized equality test on outsourced ciphertexts for cloud-assisted IoT in dual server model. Wirel. Commun. Mob. Comput. 2022 (2022). Article ID 4462134

    Google Scholar 

Download references

Acknowledgments

This article is supported in part by the National Key R &D Program of China under project 2022YFB2702901, the Guangxi Natural Science Foundation under grant 2019GXNSFGA245004, the National Natural Science Foundation of China under projects 62162017 and 62172119, Zhejiang Provincial Natural Science Foundation of China under Grant No. LZ23F020012, the Guangdong Key R &D Program under project 2020B0101090002, the Swift Fund Fintech Funding, the special fund of the High-level Innovation Team and Outstanding Scholar Program for universities of Guangxi, and the Innovation Project of GUET Graduate Education 2022YCXS084.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yong Ding .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wen, B. et al. (2024). Privacy-Preserving Blockchain Supervision with Responsibility Tracking. In: Gao, H., Wang, X., Voros, N. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 561. Springer, Cham. https://doi.org/10.1007/978-3-031-54521-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-54521-4_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-54520-7

  • Online ISBN: 978-3-031-54521-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics