2021
DOI: 10.1007/s12083-021-01147-w
|View full text |Cite
|
Sign up to set email alerts
|

A certificateless encryption scheme based on blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 19 publications
(5 citation statements)
references
References 26 publications
0
5
0
Order By: Relevance
“…The voting tendency of nodes can also be considered by referring to the decision-making behaviors of human beings in real life. For example, vague set (Xu et al , 2020), Pythagorean fuzzy sets (PFSs) (Lin et al , 2021b) and probabilistic linguist term set (PLTS) (Liu et al , 2021b; Chen et al , 2021b; Xu et al , 2021a; Li et al , 2021b; Liang et al , 2020; Lin et al , 2018a, b, 2019a, b, 2020, 2021a) are introduced in the election of delegates in the DPoS consensus mechanism. Similarly, a node mutual evaluation strategy can be designed to rank and remove consensus nodes promptly, thus making voting more efficient.The improvement of the effectiveness of cross-sharding consensus.…”
Section: Consensus Developmentmentioning
confidence: 99%
See 1 more Smart Citation
“…The voting tendency of nodes can also be considered by referring to the decision-making behaviors of human beings in real life. For example, vague set (Xu et al , 2020), Pythagorean fuzzy sets (PFSs) (Lin et al , 2021b) and probabilistic linguist term set (PLTS) (Liu et al , 2021b; Chen et al , 2021b; Xu et al , 2021a; Li et al , 2021b; Liang et al , 2020; Lin et al , 2018a, b, 2019a, b, 2020, 2021a) are introduced in the election of delegates in the DPoS consensus mechanism. Similarly, a node mutual evaluation strategy can be designed to rank and remove consensus nodes promptly, thus making voting more efficient.The improvement of the effectiveness of cross-sharding consensus.…”
Section: Consensus Developmentmentioning
confidence: 99%
“…Blockchain is a revolutionary technology for distributed data storage, peer-to-peer transmission, consensus mechanism and encryption algorithm (Chen et al , 2021b; Xu et al , 2021a; Li et al , 2021b; Liang et al , 2020; Liu et al , 2022; Pu et al , 2020), etc. The blockchain architecture is divided into six layers as shown in Figure 2 (Li et al , 2021c; Lao et al , 2020).…”
Section: Introductionmentioning
confidence: 99%
“…In the study of certificate encryption, we have proposed a certificateless blockchain‐oriented cryptographic mechanism that not only improves the security of certificateless encryption but also reduces the storage overhead, but the computational overhead brought by the introduction of blockchain to the certificateless encryption mechanism needs to be further optimized 17 . In terms of ring signature, Li et al 18 applied permission management mechanisms and linkable‐for‐signature to blockchain voting modules, which can protect block data privacy during the voting phase, but the introduction of proxy nodes in this scheme increases the centralization of the system, and its resistance to attack needs to be improved.…”
Section: Related Workmentioning
confidence: 99%
“…In the study of certificate encryption, we have proposed a certificateless blockchain-oriented cryptographic mechanism that not only improves the security of certificateless encryption but also reduces the storage overhead, but the computational overhead brought by the introduction of blockchain to the certificateless encryption mechanism needs to be further optimized. 17 In terms of ring signature, Li et al 18 applied permission management mechanisms and linkablefor-signature to blockchain voting modules, which can protect block data privacy during the voting phase, but the introduction of proxy nodes in this scheme increases the centralization of the system, and its resistance to attack needs to be improved. In the study of zero-knowledge proof, Yang and Wenjie 19 proposed an identity management method based on zero-knowledge proof for blockchain, which used off-chain calculations and verification on the blockchain to separate user entity attributes from public ledger attributes and ensure that the user's identity cannot be linked, but the redundancy and long computation time of this scheme need further optimization.…”
Section: Information Encryption Mechanismmentioning
confidence: 99%
“…Blockchain is collectively maintained and stored by network nodes, constituting a shared distributed trusted database [8][9][10]. The great advantages of blockchain are anonymous, decentralized, traceable, and tamper-resistant [11][12][13][14][15][16][17][18].…”
Section: Introductionmentioning
confidence: 99%