{"title":"航空业务隐私保护交易监督系统","authors":"Xingguang Zhou, Weihan Li, Lin Zhong","doi":"10.1007/s12083-024-01647-5","DOIUrl":null,"url":null,"abstract":"<p>Data security is a crucial issue for aviation business transaction. In order to prevent privacy leakage for the business participants, it is essential to construct a credible transaction environment. For this purpose, we construct a strict cryptographic scheme based on consortium blockchain that addresses two key perspectives. Firstly, an identity-based homomorphic scheme is proposed, so that the encapsulated transaction result can be correctly calculated and verified for the flowing amount. Secondly, the supervised function is incorporated to the homomorphic scheme. One more public key is added into the encryption trapdoor, and this key is assigned to the supervisor. Consequently, both the airline and the supervisor who work as the two recipients can independently decrypt the ciphertext without time-consuming interaction. Experimental results show that the system achieves encryption time of 15 ms, and decryption time is 15 ms and 15.45 ms for both recipients. Compared to the popular cryptocurrency schemes, the system significantly achieves the supervised function without compromising efficiency. Finally, the application network architecture is put forward for the supervised privacy preservation transaction system.</p>","PeriodicalId":49313,"journal":{"name":"Peer-To-Peer Networking and Applications","volume":"214 1","pages":""},"PeriodicalIF":3.3000,"publicationDate":"2024-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A supervised privacy preservation transaction system for aviation business\",\"authors\":\"Xingguang Zhou, Weihan Li, Lin Zhong\",\"doi\":\"10.1007/s12083-024-01647-5\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>Data security is a crucial issue for aviation business transaction. In order to prevent privacy leakage for the business participants, it is essential to construct a credible transaction environment. For this purpose, we construct a strict cryptographic scheme based on consortium blockchain that addresses two key perspectives. Firstly, an identity-based homomorphic scheme is proposed, so that the encapsulated transaction result can be correctly calculated and verified for the flowing amount. Secondly, the supervised function is incorporated to the homomorphic scheme. One more public key is added into the encryption trapdoor, and this key is assigned to the supervisor. Consequently, both the airline and the supervisor who work as the two recipients can independently decrypt the ciphertext without time-consuming interaction. Experimental results show that the system achieves encryption time of 15 ms, and decryption time is 15 ms and 15.45 ms for both recipients. Compared to the popular cryptocurrency schemes, the system significantly achieves the supervised function without compromising efficiency. Finally, the application network architecture is put forward for the supervised privacy preservation transaction system.</p>\",\"PeriodicalId\":49313,\"journal\":{\"name\":\"Peer-To-Peer Networking and Applications\",\"volume\":\"214 1\",\"pages\":\"\"},\"PeriodicalIF\":3.3000,\"publicationDate\":\"2024-04-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Peer-To-Peer Networking and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s12083-024-01647-5\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Peer-To-Peer Networking and Applications","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s12083-024-01647-5","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
A supervised privacy preservation transaction system for aviation business
Data security is a crucial issue for aviation business transaction. In order to prevent privacy leakage for the business participants, it is essential to construct a credible transaction environment. For this purpose, we construct a strict cryptographic scheme based on consortium blockchain that addresses two key perspectives. Firstly, an identity-based homomorphic scheme is proposed, so that the encapsulated transaction result can be correctly calculated and verified for the flowing amount. Secondly, the supervised function is incorporated to the homomorphic scheme. One more public key is added into the encryption trapdoor, and this key is assigned to the supervisor. Consequently, both the airline and the supervisor who work as the two recipients can independently decrypt the ciphertext without time-consuming interaction. Experimental results show that the system achieves encryption time of 15 ms, and decryption time is 15 ms and 15.45 ms for both recipients. Compared to the popular cryptocurrency schemes, the system significantly achieves the supervised function without compromising efficiency. Finally, the application network architecture is put forward for the supervised privacy preservation transaction system.
期刊介绍:
The aim of the Peer-to-Peer Networking and Applications journal is to disseminate state-of-the-art research and development results in this rapidly growing research area, to facilitate the deployment of P2P networking and applications, and to bring together the academic and industry communities, with the goal of fostering interaction to promote further research interests and activities, thus enabling new P2P applications and services. The journal not only addresses research topics related to networking and communications theory, but also considers the standardization, economic, and engineering aspects of P2P technologies, and their impacts on software engineering, computer engineering, networked communication, and security.
The journal serves as a forum for tackling the technical problems arising from both file sharing and media streaming applications. It also includes state-of-the-art technologies in the P2P security domain.
Peer-to-Peer Networking and Applications publishes regular papers, tutorials and review papers, case studies, and correspondence from the research, development, and standardization communities. Papers addressing system, application, and service issues are encouraged.