In order to solve the problem of low efficiency and high energy consumption of the Proof-of-Work (PoW) consensus protocol in blockchain within a peer-to-peer network, some new protocols based on Verifiable Random Function (VRF) have emerged recently. However, these VRF-based consensus protocols do not actually give a concrete and efficient VRF construction. In view of this, we present three simple and practical VRF constructions from the RSA hardness assumption, the Decisional Diffie-Hellman (DDH) assumption and the Leftover Hash Lemma (LHL) respectively, the output size of which is continuously reduced for the design of efficient consensus protocol in blockchain. We also give a complete security analysis of our VRF constructions. Furthermore, we show a specific application of our VRF constructions in the famous Algorand consensus protocol. We illustrate a general approach to integrate our VRF constructions with block structure in blockchain. Comparing with PoW-based mining, we demonstrate the detailed process of VRF-based consensus protocol. Meanwhile, three new opcodes are designed for the scripting system in blockchain to develop a script pair, scriptProof and scriptHash, which provides secure and efficient block verification. Finally, we evaluate the performance of our VRF constructions in terms of storage and computational overheads, and the experimental evaluation results show our VRF constructions can significantly reduce the computing power of consensus protocol in blockchain.
With the wide use of online social networks (OSNs), the problem of data privacy has attracted a lot of attention from not only the research community but also the general public. To meet the privacy needs of OSNs, we present a new framework for protecting information published through online social network websites through encryption by taking into account special features of OSNs. In this framework, autonomous private communities, called as zones, are set up by one or a set of mutually-trusted users collaboratively without any third party intervention. Sensitive information (i.e., posts, photos, etc.) within a zone can only be accessed by authorized members of the zone. A user joins a zone by obtaining a permission from an authorized zone member and uses it along with her private key to access contents inside the zone. One striking feature about our design of permission is that it is not secret information and thus can be left in the user's account in the OSN. Compared with prior work, this design of public permission greatly reduces user-side overhead on secret key management as a user only needs to maintain one secret key and use as many public permissions as she wants to access contents in different zones. Furthermore, our framework allows efficient access permission delegation and revocation. We develop a prototype to evaluate its computation performance in an acceptable level. Meanwhile, we prove that our construction is semantically secure against chosen plaintext attack, existential forgery attack and key forgery attack.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.