Skip to main content

Advertisement

Log in

BB-CSP: An Efficient Blockchain-Based Collective Salary Payment Framework Using Weighted Functional Encryption

  • Original Research
  • Published:
SN Computer Science Aims and scope Submit manuscript

Abstract

Privacy is a primary consideration when connecting computer networks and utilizing Internet-based financial services. Large companies with a substantial workforce want to pay their employees fairly, efficiently, and securely via the Internet. Malicious users attempt to commit fraud to obtain sensitive information about businesses/users or steal their money. As the main contribution of this study, Weighted Functional Encryption (WFE) scheme as an advanced cryptographic tool is proposed. Initially, the paper introduces the central assumption and the security features that the random oracle (RO) model should support. As a practical example, the paper then defines a framework for efficient, reliable, and secure salary payment via blockchain technology, dubbed blockchain-based collective salary payment (BB-CSP). The BB-CSP framework is predicated on the presence of a practicable WFE scheme. The BB-CSP framework is then analyzed in light of the defined security features of the assumed WFE scheme. The analysis of the BB-CSP framework demonstrates that it ensures salary confidentiality, security, fairness, and efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

Data Availability Statement

The data that support the findings of this study are available from the corresponding author upon reasonable request.

References

  1. Rivest Ronald L. Chaffing and winnowing: confidentiality without encryption. CryptoBytes (RSA laboratories). 1998;4(1):12–7.

    Google Scholar 

  2. Goldwasser Shafi, Micali Silvio. Probabilistic encryption. J Comput Syst Sci. 1984;28(2):270–99. https://doi.org/10.1016/0022-0000(84)90070-9.

    Article  MathSciNet  MATH  Google Scholar 

  3. Diffie W, Hellman M. New directions in cryptography. IEEE Trans Inf Theory. 1976;22(6):644–54. https://doi.org/10.1109/TIT.1976.1055638.

    Article  MathSciNet  MATH  Google Scholar 

  4. Bellare M, Boldyreva A, Micali S. Public-Key Encryption in a Multi-user Setting: security proofs and improvements. In: Preneel B, editors. Advances in cryptology—EUROCRYPT 2000. EUROCRYPT 2000. Lecture Notes in Computer Science, vol 1807. Springer: Berlin; 2000. https://doi.org/10.1007/3-540-45539-6-18.

  5. Baek J, Safavi-Naini R, Susilo W. Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In: Vaudenay S, editors. Public key cryptography—PKC 2005. PKC 2005. Lecture Notes in Computer Science, vol 3386. Springer:Berlin; 2005.https://doi.org/10.1007/978-3-540-30580-4-26.

  6. Abdalla M, Bourse F, De Caro A, Pointcheval D. Simple functional encryption schemes for inner products. In: Katz J, editors. Public-key cryptography—PKC 2015. PKC 2015. Lecture Notes in Computer Science, vol 9020. Springer:Berlin; 2015.https://doi.org/10.1007/978-3-662-46447-2-33.

  7. Boneh D, Sahai A, Waters B. Functional encryption: definitions and challenges. In: Ishai Y, editors. Theory of cryptography. TCC 2011. Lecture Notes in Computer Science, vol 6597. Springer:Berlin; 2011. https://doi.org/10.1007/978-3-642-19571-6-16.

  8. Shafi G, Yael K, Raluca AP, Vinod V, Nickolai Z. Reusable garbled circuits and succinct functional encryption. In Proceedings of the forty-fifth annual ACM symposium on Theory of Computing (STOC ’13). Association for Computing Machinery, New York, NY, USA, 555-564. 2013. https://doi.org/10.1145/2488608.2488678.

  9. Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, editors. Advances in cryptology—EUROCRYPT 2005. EUROCRYPT 2005. Lecture Notes in Computer Science, vol 3494. Springer:Berlin; 2005. https://doi.org/10.1007/11426639-27.

  10. Gordon SD, Jonathan K, Feng-Hao L, Elaine S, Hong-Sheng Z. Multi-input functional encryption. IACR Cryptol. 2013; 2013: 774.

  11. Boneh D, Lewi K, Raykova M, Sahai A, Zhandry M, Zimmerman J. Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation. In: Oswald E, Fischlin M, editors Advances in cryptology—EUROCRYPT 2015. EUROCRYPT 2015. Lecture Notes in Computer Science, vol 9057. Springer: Berlin; 2015. https://doi.org/10.1007/978-3-662-46803-6-19

  12. Trickey C. Tax efficient salary packages. In Pract. 1992;14(5):270–4.

    Article  Google Scholar 

  13. Gosden T, Forland F, Kristiansen IS, Sutton M, Leese B, Giuffrida A, Sergison M, Pedersen L. Capitation, salary, fee-for-service and mixed systems of payment: effects on the behaviour of primary care physicians. Cochrane Database of Syst Rev. 2000. https://doi.org/10.1002/14651858.CD002215.

  14. Swallow B, Meinzen-Dick R. Payment for environmental services: interactions with property rights and collective action. In: Beckmann V, Padmanabhan M, editors. Institutions and sustainability. Springer:Dordrecht; 2009. https://doi.org/10.1007/978-1-4020-9690-7-12

  15. Beria L, Meine van N, Rudolf de G, Rik L. Fairly efficient, efficiently fair: Lessons from designing and testing payment schemes for ecosystem services in Asia. Ecosyst Serv 2015;12:16-28. https://doi.org/10.1016/j.ecoser.2014.12.012.

  16. Sagandykov M, Shafikova G. Salary administration as part of employee incentive system at industrial enterprises. In: SHS Web of Conferences. EDP Sci 2017;35:01024.

  17. Hikmah IN, Muqorobin M. Employee payroll information system on company web-based consultant engineering services. Int J Comput Inform Syst (IJCIS). 2020;1(2):27–30.

    Google Scholar 

  18. Xu A, Li M, Huang X, Xue N, Zhang J, Sheng Q. A blockchain based micro payment system for smart devices. Signature. 2016;256(4936):115.

    Google Scholar 

  19. Barber S, Boyen X, Shi E, Uzun E. Bitter to better—how to make bitcoin a better currency. In: Keromytis AD, editors. Financial cryptography and data security. FC 2012. Lecture Notes in Computer Science, vol 7397. Springer:Berlin; 2012. https://doi.org/10.1007/978-3-642-32946-3-29.

  20. Reid F, Harrigan M. An Analysis of anonymity in the bitcoin system. In: Altshuler Y, Elovici Y, Cremers A, Aharony N, Pentland A, editors. Security and privacy in social networks. Springer:New York; 2013.https://doi.org/10.1007/978-1-4614-4139-7-10

  21. Yoo S. Blockchain based financial case analysis and its implications. Asia Pac J Innov Entrepre. 2017. https://www.emerald.com/insight/content/doi/10.1108/APJIE-12-2017-036/full/html

  22. Hu J, Yang K, Wang K, Zhang K. A Blockchain-based reward mechanism for mobile crowdsensing. IEEE Trans Comput Soc Syst. 2020;7(1):178–91. https://doi.org/10.1109/TCSS.2019.2956629.

    Article  Google Scholar 

  23. Lin C, He D, Huang X, Khan MK, Choo KR. DCAP: a secure and efficient decentralized conditional anonymous payment system based on blockchain. IEEE Trans Inf Forensics Secur. 2020;15:2440–52. https://doi.org/10.1109/TIFS.2020.2969565.

    Article  Google Scholar 

  24. Zhang A, Zhong RY, Farooque M, Kang K, Venkatesh VG. Blockchain-based, life cycle assessment: an implementation framework and system architecture. Resour Conserv Recycl. 2020;152. https://doi.org/10.1016/j.resconrec.2019.104512.

  25. Cui H, Wan Z, Wei X, Nepal S, Yi X. Pay as you decrypt: decryption outsourcing for functional encryption using blockchain. IEEE Trans Inf Forensics Secur. 2020;15:3227–38. https://doi.org/10.1109/TIFS.2020.2973864.

    Article  Google Scholar 

  26. Goldwasser S, et al. Multi-input functional encryption. In: Nguyen PQ, Oswald E, editors. Advances in Cryptology—EUROCRYPT 2014. EUROCRYPT 2014. Lecture Notes in Computer Science, vol 8441. Springer:Berlin; 2014. https://doi.org/10.1007/978-3-642-55220-5-32

  27. Abdalla M, Benhamouda F, Gay R. From single-input to multi-client inner-product functional encryption. In: Galbraith S, Moriai S, editors. Advances in cryptology—ASIACRYPT 2019. ASIACRYPT 2019. Lecture Notes in Computer Science, vol 11923. Springer:Cham; 2019. https://doi.org/10.1007/978-3-030-34618-8-19

  28. Ananth P, Jain A, Naor M, Sahai A, Yogev E. Universal constructions and robust combiners for indistinguishability obfuscation and witness encryption. In: Robshaw M, Katz J, editors. Advances in cryptology—CRYPTO 2016. CRYPTO 2016. Lecture Notes in Computer Science, vol 9815. Springer:Berlin; 2016. https://doi.org/10.1007/978-3-662-53008-5-17

  29. Ananth P, Jain A, Sahai A. Robust transforming combiners from indistinguishability obfuscation to functional encryption. In: Coron JS, Nielsen J, editors. Advances in cryptology—EUROCRYPT 2017. EUROCRYPT 2017. Lecture Notes in Computer Science, vol 10210. Springer:Cham; 2017. https://doi.org/10.1007/978-3-319-56620-7-4

  30. Jain A, Manohar N, Sahai A. Combiners for functional encryption, unconditionally. In: Canteaut A, Ishai Y, editors. Advances in cryptology—EUROCRYPT 2020. EUROCRYPT 2020. Lecture Notes in Computer Science, vol 12105. Springer:Cham; 2020. https://doi.org/10.1007/978-3-030-45721-1-6

  31. Topical Issue on Privacy. Data protection, and digital identity. SN Comput Sci. 2020;1:250. https://doi.org/10.1007/s42979-020-00261-5.

    Article  Google Scholar 

  32. Jurcut Anca, Niculcea Tiberiu, Ranaweera Pasika, Le-Khac Nhien-An. Security considerations for internet of things: a survey. SN Comput Sci. 2020;1:1–19. https://doi.org/10.1007/s42979-020-00201-3.

    Article  Google Scholar 

  33. Nakamoto S. Bitcoin: a peer-to-peer electronic system (2008). (2008).

  34. Merkle RC. A digital signature based on a conventional encryption function. In: Pomerance C, editors. Advances in cryptology—CRYPTO ’87. CRYPTO 1987. Lecture Notes in Computer Science, vol 293. Springer:Berlin; 1988. https://doi.org/10.1007/3-540-48184-2-32

  35. Khettry AR, Patil KR, Basavaraju AC. A detailed review on blockchain and its applications. SN Comput Sci. 2021;2:30. https://doi.org/10.1007/s42979-020-00366-x.

    Article  Google Scholar 

  36. Lin Iuon-Chang, Liao Tzu-Chun. A survey of blockchain security issues and challenges. IJ Netw Secur. 2017;19(5):653–9.

    Google Scholar 

  37. Gamage HTM, Weerasinghe HD, Dias NGJ. A survey on blockchain technology concepts, applications, and issues. SN Comput Sci. 2020;1:114. https://doi.org/10.1007/s42979-020-00123-0.

    Article  Google Scholar 

  38. https://github.com/litecoin-project

  39. https://namecoin.com/white_papers

  40. https://github.com/peercoin

  41. Meier P, Beinke JH, Fitte C, et al. Generating design knowledge for blockchain-based access control to personal health records. Inf Syst E-Bus Manage. 2021;19:13–41. https://doi.org/10.1007/s10257-020-00476-2.

    Article  Google Scholar 

  42. Merlinda A, Valentin R, David F, Simone A, Dale G, David J, Peter M, Andrew P. Blockchain technology in the energy sector: a systematic review of challenges and opportunities. Renew Sustainab Energy Rev 2019;100:143-174. https://doi.org/10.1016/j.rser.2018.10.014.

  43. Notheisen B, Cholewa JB, Shanmugam AP. Trading real-World assets on blockchain. Bus Inf Syst Eng. 2017;59:425–40. https://doi.org/10.1007/s12599-017-0499-8.

    Article  Google Scholar 

  44. Rajnak V, Puschmann T. The impact of blockchain on business models in banking. Inf Syst E-Bus Manage. 2020. https://doi.org/10.1007/s10257-020-00468-2.

    Article  Google Scholar 

  45. Gatteschi Valentina, Lamberti Fabrizio, Demartini Claudio, Pranteda Chiara, Santamaría Víctor. Blockchain and smart contracts for insurance: is the technology mature enough? Future Internet. 2018;10(2):20.

    Article  Google Scholar 

  46. Vincent OR, Okediran TM, Abayomi-Alli AA, et al. an identity-based elliptic curve cryptography for mobile payment security. SN Comput Sci. 2020;1:112. https://doi.org/10.1007/s42979-020-00122-1.

    Article  Google Scholar 

  47. Ran C, Oded G, Shai H. The random oracle methodology, revisited. J ACM 2004;51:557-594. https://doi.org/10.1145/1008731.1008734

  48. Sadri MJ, Asaar MR. An anonymous two-factor authentication protocol for IoT-based applications. Comput Netw 2021;199:1389–1286. https://doi.org/10.1016/j.comnet.2021.108460.

  49. Mahdi F, Majid B, Ashok Kumar D, Hossein Abdi Nasib F, Morteza Pournaghi S, Doostari MA. A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Comput Netw 2020. https://doi.org/10.1016/j.comnet.2020.107333

Download references

Acknowledgements

We as authors appreciate anonymous reviewers for their valuable comments on this work.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Saeed Banaeian Far.

Ethics declarations

Conflict of Interest

Saeed Banaeian Far declares that he has no conflict of interest. Azadeh Imani Rad declares that she has no conflict of interest. Maryam Rajabzadeh Asaar declares that she has no conflict of interest.

Ethical Approval

This article does not contain any studies with human participants or animals performed by any of the authors.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Banaeian Far, S., Imani Rad, A. & Rajabzade Asaar, M. BB-CSP: An Efficient Blockchain-Based Collective Salary Payment Framework Using Weighted Functional Encryption. SN COMPUT. SCI. 3, 408 (2022). https://doi.org/10.1007/s42979-022-01330-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s42979-022-01330-7

Keywords