Title
Threshold Proxy Re-Encryption And Its Application In Blockchain
Abstract
Since the proxy re-encryption has the limitation of distributed applications and the security risk of collusion attacks in semi-trusted distributed environments (e.g. cloud computing), the novel definition of threshold proxy re-encryption is proposed based on secret sharing and proxy re-encryption. According to the definition, the threshold proxy re-encryption scheme can be flexibly created with the standard cryptographic prototype. An efficient, secure, and implementable unidirectional threshold proxy re-encryption scheme is constructed by the combination of Shamir's secret sharing, and is proved secure by using the intractability of discrete logarithms. This paper presents a consortium blockchain access permission scheme, which is built on the threshold proxy re-encryption scheme. When a new node joins a consortium blockchain, an access permission is achieved by the agreement on other existing nodes, instead of a centralized CA.
Year
DOI
Venue
2018
10.1007/978-3-030-00015-8_2
CLOUD COMPUTING AND SECURITY, PT IV
Keywords
Field
DocType
Proxy re-encryption, Threshold secret sharing, Blockchain
Proxy (climate),Permission,Joins,Secret sharing,Cryptography,Computer science,Computer network,Proxy re-encryption,Collusion,Distributed computing,Cloud computing
Conference
Volume
ISSN
Citations 
11066
0302-9743
0
PageRank 
References 
Authors
0.34
3
4
Name
Order
Citations
PageRank
Xi Chen171.47
Liu Yun228057.13
Yong Li393.60
Changlu Lin4102.22