2022
DOI: 10.3390/en15072570
|View full text |Cite
|
Sign up to set email alerts
|

Proxy Re-Encryption-Based Traceability and Sharing Mechanism of the Power Material Data in Blockchain Environment

Abstract: The need to accelerate the innovation and application of the supply chain has been suggested by the State Council of China. To solve the problem of data isolation caused by privacy protection in the power material supply chain, a data traceability and sharing mechanism based on blockchain is designed in this paper. Firstly, the existing problems of the power material supply chain are introduced, and the applicability of blockchain in the power material supply chain in view of these problems is analyzed. Second… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 30 publications
0
1
0
Order By: Relevance
“…In the literature, many recent studies are focusing on the privacy concern of data storing and sharing. Some of them use a blockchain-assisted method together with a proxy re-encryption (PRE) [7], [8], [9]. The main drawback of these studies is that in many PRE schemes, the proxy can easily determine the participants of the communication from the reencryption key.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In the literature, many recent studies are focusing on the privacy concern of data storing and sharing. Some of them use a blockchain-assisted method together with a proxy re-encryption (PRE) [7], [8], [9]. The main drawback of these studies is that in many PRE schemes, the proxy can easily determine the participants of the communication from the reencryption key.…”
Section: Related Workmentioning
confidence: 99%
“…Recently, Song et al [8] adopted blockchainbased data traceability and sharing mechanism for the power material supply chain. They use proxy re-encryption to ensure security and privacy.…”
Section: Related Workmentioning
confidence: 99%
“…Fog computing can not only solve the problem of networked devices automation. More importantly, it requires less data transmission, which is conducive to improving local storage and computing capacity and eliminating the bottleneck of data storage and data transmission (Song et al, 2022).…”
Section: Introductionmentioning
confidence: 99%