Proof of Data Distribution Based on Trusted Hardware

Batnyam Enkhtaivan, Pooja Dhomse
{"title":"Proof of Data Distribution Based on Trusted Hardware","authors":"Batnyam Enkhtaivan, Pooja Dhomse","doi":"10.1145/3409934.3409943","DOIUrl":null,"url":null,"abstract":"We consider a scenario in which two parties prove to a third party that communication between them occurred. This can be seen in advertisement in which the data are distributed to the user by a distributor on behalf of owner. Specifically, we propose a protocol and a modification of it to address the possibility of collusion between the distributor and user in which the owner is deceived to pay for false claim of distribution, and the possibility of the user not providing any data transfer confirmation as an acknowledgement after receiving data. In the original protocol, the distributor and user are both equipped with trusted hardware. The data are encrypted and decrypted by this trusted hardware, with a shared secret key. When decrypting the data, the user's hardware generates a proof and sends it to the distributor. This proof is used as the proof of distribution to show to the owner for payment. This prevents the collusion with the help of the trusted hardware. This protocol assumes that the user will not misbehave and always send the proof back to the distributor. To address this issue, the modified protocol uses blockchain as a public ledger for the user to publish acknowledgement of receiving encrypted data chunk, and for the distributor to publish the corresponding secret for decryption. In both the protocols, we use the blockchain technology as a method for the ID management and payment.","PeriodicalId":145384,"journal":{"name":"Proceedings of the 2nd International Electronics Communication Conference","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2nd International Electronics Communication Conference","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3409934.3409943","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

We consider a scenario in which two parties prove to a third party that communication between them occurred. This can be seen in advertisement in which the data are distributed to the user by a distributor on behalf of owner. Specifically, we propose a protocol and a modification of it to address the possibility of collusion between the distributor and user in which the owner is deceived to pay for false claim of distribution, and the possibility of the user not providing any data transfer confirmation as an acknowledgement after receiving data. In the original protocol, the distributor and user are both equipped with trusted hardware. The data are encrypted and decrypted by this trusted hardware, with a shared secret key. When decrypting the data, the user's hardware generates a proof and sends it to the distributor. This proof is used as the proof of distribution to show to the owner for payment. This prevents the collusion with the help of the trusted hardware. This protocol assumes that the user will not misbehave and always send the proof back to the distributor. To address this issue, the modified protocol uses blockchain as a public ledger for the user to publish acknowledgement of receiving encrypted data chunk, and for the distributor to publish the corresponding secret for decryption. In both the protocols, we use the blockchain technology as a method for the ID management and payment.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于可信硬件的数据分发证明
我们考虑一个场景,其中双方向第三方证明他们之间发生了通信。这可以在广告中看到,其中数据由代表所有者的发布者分发给用户。具体来说,我们提出了一个协议,并对其进行了修改,以解决分发方与用户勾结的可能性,即所有者被欺骗支付虚假的分发声明,以及用户在收到数据后不提供任何数据传输确认作为确认的可能性。在原始协议中,分发者和用户都配备了可信硬件。数据由这个受信任的硬件使用共享密钥进行加密和解密。在解密数据时,用户的硬件生成证明并将其发送给分发者。此证明用作分发证明,以向所有者显示付款。这可以防止与可信硬件的帮助相勾结。该协议假设用户不会有不当行为,并且总是将证明发送回分发者。为了解决这个问题,修改后的协议使用区块链作为公共分类账,供用户发布接收到加密数据块的确认,供分发方发布相应的秘密进行解密。在这两个协议中,我们都使用区块链技术作为ID管理和支付的方法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
High Performance Peer-to-peer Data Dissemination for Decentralized Wireless Sensor Networks Firmware Updating Traceability Blockchain Prototype for Regulated Manufacturing Industries A Group Authentication Scheme with Privacy-preserving for D2D Communications in 5G HetNets Responsible Self-Funding in Dash Governance System BC-Store: A Scalable Design for Blockchain Storage
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1