Abstract
Privacy is a primary consideration when connecting computer networks and utilizing Internet-based financial services. Large companies with a substantial workforce want to pay their employees fairly, efficiently, and securely via the Internet. Malicious users attempt to commit fraud to obtain sensitive information about businesses/users or steal their money. As the main contribution of this study, Weighted Functional Encryption (WFE) scheme as an advanced cryptographic tool is proposed. Initially, the paper introduces the central assumption and the security features that the random oracle (RO) model should support. As a practical example, the paper then defines a framework for efficient, reliable, and secure salary payment via blockchain technology, dubbed blockchain-based collective salary payment (BB-CSP). The BB-CSP framework is predicated on the presence of a practicable WFE scheme. The BB-CSP framework is then analyzed in light of the defined security features of the assumed WFE scheme. The analysis of the BB-CSP framework demonstrates that it ensures salary confidentiality, security, fairness, and efficiency.




Similar content being viewed by others
Data Availability Statement
The data that support the findings of this study are available from the corresponding author upon reasonable request.
References
Rivest Ronald L. Chaffing and winnowing: confidentiality without encryption. CryptoBytes (RSA laboratories). 1998;4(1):12–7.
Goldwasser Shafi, Micali Silvio. Probabilistic encryption. J Comput Syst Sci. 1984;28(2):270–99. https://doi.org/10.1016/0022-0000(84)90070-9.
Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inf Theory. 1976;22(6):644–54. https://doi.org/10.1109/TIT.1976.1055638.
Bellare M, Boldyreva A, Micali S. Public-Key Encryption in a Multi-user Setting: security proofs and improvements. In: Preneel B, editors. Advances in cryptology—EUROCRYPT 2000. EUROCRYPT 2000. Lecture Notes in Computer Science, vol 1807. Springer: Berlin; 2000. https://doi.org/10.1007/3-540-45539-6-18.
Baek J, Safavi-Naini R, Susilo W. Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In: Vaudenay S, editors. Public key cryptography—PKC 2005. PKC 2005. Lecture Notes in Computer Science, vol 3386. Springer:Berlin; 2005.https://doi.org/10.1007/978-3-540-30580-4-26.
Abdalla M, Bourse F, De Caro A, Pointcheval D. Simple functional encryption schemes for inner products. In: Katz J, editors. Public-key cryptography—PKC 2015. PKC 2015. Lecture Notes in Computer Science, vol 9020. Springer:Berlin; 2015.https://doi.org/10.1007/978-3-662-46447-2-33.
Boneh D, Sahai A, Waters B. Functional encryption: definitions and challenges. In: Ishai Y, editors. Theory of cryptography. TCC 2011. Lecture Notes in Computer Science, vol 6597. Springer:Berlin; 2011. https://doi.org/10.1007/978-3-642-19571-6-16.
Shafi G, Yael K, Raluca AP, Vinod V, Nickolai Z. Reusable garbled circuits and succinct functional encryption. In Proceedings of the forty-fifth annual ACM symposium on Theory of Computing (STOC ’13). Association for Computing Machinery, New York, NY, USA, 555-564. 2013. https://doi.org/10.1145/2488608.2488678.
Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, editors. Advances in cryptology—EUROCRYPT 2005. EUROCRYPT 2005. Lecture Notes in Computer Science, vol 3494. Springer:Berlin; 2005. https://doi.org/10.1007/11426639-27.
Gordon SD, Jonathan K, Feng-Hao L, Elaine S, Hong-Sheng Z. Multi-input functional encryption. IACR Cryptol. 2013; 2013: 774.
Boneh D, Lewi K, Raykova M, Sahai A, Zhandry M, Zimmerman J. Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation. In: Oswald E, Fischlin M, editors Advances in cryptology—EUROCRYPT 2015. EUROCRYPT 2015. Lecture Notes in Computer Science, vol 9057. Springer: Berlin; 2015. https://doi.org/10.1007/978-3-662-46803-6-19
Trickey C. Tax efficient salary packages. In Pract. 1992;14(5):270–4.
Gosden T, Forland F, Kristiansen IS, Sutton M, Leese B, Giuffrida A, Sergison M, Pedersen L. Capitation, salary, fee-for-service and mixed systems of payment: effects on the behaviour of primary care physicians. Cochrane Database of Syst Rev. 2000. https://doi.org/10.1002/14651858.CD002215.
Swallow B, Meinzen-Dick R. Payment for environmental services: interactions with property rights and collective action. In: Beckmann V, Padmanabhan M, editors. Institutions and sustainability. Springer:Dordrecht; 2009. https://doi.org/10.1007/978-1-4020-9690-7-12
Beria L, Meine van N, Rudolf de G, Rik L. Fairly efficient, efficiently fair: Lessons from designing and testing payment schemes for ecosystem services in Asia. Ecosyst Serv 2015;12:16-28. https://doi.org/10.1016/j.ecoser.2014.12.012.
Sagandykov M, Shafikova G. Salary administration as part of employee incentive system at industrial enterprises. In: SHS Web of Conferences. EDP Sci 2017;35:01024.
Hikmah IN, Muqorobin M. Employee payroll information system on company web-based consultant engineering services. Int J Comput Inform Syst (IJCIS). 2020;1(2):27–30.
Xu A, Li M, Huang X, Xue N, Zhang J, Sheng Q. A blockchain based micro payment system for smart devices. Signature. 2016;256(4936):115.
Barber S, Boyen X, Shi E, Uzun E. Bitter to better—how to make bitcoin a better currency. In: Keromytis AD, editors. Financial cryptography and data security. FC 2012. Lecture Notes in Computer Science, vol 7397. Springer:Berlin; 2012. https://doi.org/10.1007/978-3-642-32946-3-29.
Reid F, Harrigan M. An Analysis of anonymity in the bitcoin system. In: Altshuler Y, Elovici Y, Cremers A, Aharony N, Pentland A, editors. Security and privacy in social networks. Springer:New York; 2013.https://doi.org/10.1007/978-1-4614-4139-7-10
Yoo S. Blockchain based financial case analysis and its implications. Asia Pac J Innov Entrepre. 2017. https://www.emerald.com/insight/content/doi/10.1108/APJIE-12-2017-036/full/html
Hu J, Yang K, Wang K, Zhang K. A Blockchain-based reward mechanism for mobile crowdsensing. IEEE Trans Comput Soc Syst. 2020;7(1):178–91. https://doi.org/10.1109/TCSS.2019.2956629.
Lin C, He D, Huang X, Khan MK, Choo KR. DCAP: a secure and efficient decentralized conditional anonymous payment system based on blockchain. IEEE Trans Inf Forensics Secur. 2020;15:2440–52. https://doi.org/10.1109/TIFS.2020.2969565.
Zhang A, Zhong RY, Farooque M, Kang K, Venkatesh VG. Blockchain-based, life cycle assessment: an implementation framework and system architecture. Resour Conserv Recycl. 2020;152. https://doi.org/10.1016/j.resconrec.2019.104512.
Cui H, Wan Z, Wei X, Nepal S, Yi X. Pay as you decrypt: decryption outsourcing for functional encryption using blockchain. IEEE Trans Inf Forensics Secur. 2020;15:3227–38. https://doi.org/10.1109/TIFS.2020.2973864.
Goldwasser S, et al. Multi-input functional encryption. In: Nguyen PQ, Oswald E, editors. Advances in Cryptology—EUROCRYPT 2014. EUROCRYPT 2014. Lecture Notes in Computer Science, vol 8441. Springer:Berlin; 2014. https://doi.org/10.1007/978-3-642-55220-5-32
Abdalla M, Benhamouda F, Gay R. From single-input to multi-client inner-product functional encryption. In: Galbraith S, Moriai S, editors. Advances in cryptology—ASIACRYPT 2019. ASIACRYPT 2019. Lecture Notes in Computer Science, vol 11923. Springer:Cham; 2019. https://doi.org/10.1007/978-3-030-34618-8-19
Ananth P, Jain A, Naor M, Sahai A, Yogev E. Universal constructions and robust combiners for indistinguishability obfuscation and witness encryption. In: Robshaw M, Katz J, editors. Advances in cryptology—CRYPTO 2016. CRYPTO 2016. Lecture Notes in Computer Science, vol 9815. Springer:Berlin; 2016. https://doi.org/10.1007/978-3-662-53008-5-17
Ananth P, Jain A, Sahai A. Robust transforming combiners from indistinguishability obfuscation to functional encryption. In: Coron JS, Nielsen J, editors. Advances in cryptology—EUROCRYPT 2017. EUROCRYPT 2017. Lecture Notes in Computer Science, vol 10210. Springer:Cham; 2017. https://doi.org/10.1007/978-3-319-56620-7-4
Jain A, Manohar N, Sahai A. Combiners for functional encryption, unconditionally. In: Canteaut A, Ishai Y, editors. Advances in cryptology—EUROCRYPT 2020. EUROCRYPT 2020. Lecture Notes in Computer Science, vol 12105. Springer:Cham; 2020. https://doi.org/10.1007/978-3-030-45721-1-6
Topical Issue on Privacy. Data protection, and digital identity. SN Comput Sci. 2020;1:250. https://doi.org/10.1007/s42979-020-00261-5.
Jurcut Anca, Niculcea Tiberiu, Ranaweera Pasika, Le-Khac Nhien-An. Security considerations for internet of things: a survey. SN Comput Sci. 2020;1:1–19. https://doi.org/10.1007/s42979-020-00201-3.
Nakamoto S. Bitcoin: a peer-to-peer electronic system (2008). (2008).
Merkle RC. A digital signature based on a conventional encryption function. In: Pomerance C, editors. Advances in cryptology—CRYPTO ’87. CRYPTO 1987. Lecture Notes in Computer Science, vol 293. Springer:Berlin; 1988. https://doi.org/10.1007/3-540-48184-2-32
Khettry AR, Patil KR, Basavaraju AC. A detailed review on blockchain and its applications. SN Comput Sci. 2021;2:30. https://doi.org/10.1007/s42979-020-00366-x.
Lin Iuon-Chang, Liao Tzu-Chun. A survey of blockchain security issues and challenges. IJ Netw Secur. 2017;19(5):653–9.
Gamage HTM, Weerasinghe HD, Dias NGJ. A survey on blockchain technology concepts, applications, and issues. SN Comput Sci. 2020;1:114. https://doi.org/10.1007/s42979-020-00123-0.
Meier P, Beinke JH, Fitte C, et al. Generating design knowledge for blockchain-based access control to personal health records. Inf Syst E-Bus Manage. 2021;19:13–41. https://doi.org/10.1007/s10257-020-00476-2.
Merlinda A, Valentin R, David F, Simone A, Dale G, David J, Peter M, Andrew P. Blockchain technology in the energy sector: a systematic review of challenges and opportunities. Renew Sustainab Energy Rev 2019;100:143-174. https://doi.org/10.1016/j.rser.2018.10.014.
Notheisen B, Cholewa JB, Shanmugam AP. Trading real-World assets on blockchain. Bus Inf Syst Eng. 2017;59:425–40. https://doi.org/10.1007/s12599-017-0499-8.
Rajnak V, Puschmann T. The impact of blockchain on business models in banking. Inf Syst E-Bus Manage. 2020. https://doi.org/10.1007/s10257-020-00468-2.
Gatteschi Valentina, Lamberti Fabrizio, Demartini Claudio, Pranteda Chiara, Santamaría Víctor. Blockchain and smart contracts for insurance: is the technology mature enough? Future Internet. 2018;10(2):20.
Vincent OR, Okediran TM, Abayomi-Alli AA, et al. an identity-based elliptic curve cryptography for mobile payment security. SN Comput Sci. 2020;1:112. https://doi.org/10.1007/s42979-020-00122-1.
Ran C, Oded G, Shai H. The random oracle methodology, revisited. J ACM 2004;51:557-594. https://doi.org/10.1145/1008731.1008734
Sadri MJ, Asaar MR. An anonymous two-factor authentication protocol for IoT-based applications. Comput Netw 2021;199:1389–1286. https://doi.org/10.1016/j.comnet.2021.108460.
Mahdi F, Majid B, Ashok Kumar D, Hossein Abdi Nasib F, Morteza Pournaghi S, Doostari MA. A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Comput Netw 2020. https://doi.org/10.1016/j.comnet.2020.107333
Acknowledgements
We as authors appreciate anonymous reviewers for their valuable comments on this work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest
Saeed Banaeian Far declares that he has no conflict of interest. Azadeh Imani Rad declares that she has no conflict of interest. Maryam Rajabzadeh Asaar declares that she has no conflict of interest.
Ethical Approval
This article does not contain any studies with human participants or animals performed by any of the authors.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Banaeian Far, S., Imani Rad, A. & Rajabzade Asaar, M. BB-CSP: An Efficient Blockchain-Based Collective Salary Payment Framework Using Weighted Functional Encryption. SN COMPUT. SCI. 3, 408 (2022). https://doi.org/10.1007/s42979-022-01330-7
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s42979-022-01330-7