Font Size: a A A

Research On Privacy Protection Of Blockchain And Edge Computing Based On Homomorphic Encryption

Posted on:2023-11-16Degree:MasterType:Thesis
Country:ChinaCandidate:H F WangFull Text:PDF
GTID:2558307175958749Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
Homomorphic encryption technology is a cryptography technology based on the computational complexity theory of mathematical problems.Homomorphic encryption is a special encryption function that performs operations on the ring and re-encrypts the plaintext,and the result is the same as the corresponding operation on the encrypted ciphertext.Due to this good nature,users can encrypt data and perform ciphertext calculations on the platform without revealing their private data.Blockchain technology is a brand new distributed architecture.In recent years,the virtual currency based on it has been sought after by many investors in the investment market,and blockchain technology has also entered the public eye.However,behind the rapid development of blockchain technology,there are also some issues that cannot be ignored,including how blockchain technology can implement effective auditing while protecting privacy.Edge computing is a highly virtualized platform that provides network services such as computing and storage between terminal devices and the cloud,serving as both a service provider and a service requester.With the rapid development of the Internet of Things,the edge computing platform has a large number of users’ private data,and how to ensure user privacy in edge computing has become an important research direction.This paper focuses on the privacy protection of blockchain and edge computing,and combines homomorphic encryption technology to conduct research.The main work is as follows:(1)In order to implement effective audit supervision while protecting private data in the blockchain,a privacy data protection scheme based on homomorphic encryption is proposed.The scheme adopts Pedersen promise to hide the transaction amount,and combines the zeroknowledge proof technology to realize the verification of the transaction amount.At the same time,an efficient range proof scheme based on polynomial commitment and vector inner product commitment is used to verify the legitimacy of the transaction amount and balance of both parties.Finally,the ciphertext ledger is updated using the homomorphism of Pedersen commitments.The use of these technologies ensures the tracking,accountability and nonrepudiation of transactions.The proposed blockchain privacy protection scheme in this paper can provide effective audit supervision support while effectively protecting the transaction privacy in the blockchain.The scheme is tested for efficiency,and the results show that the proposed scheme has higher efficiency compared with the existing schemes.(2)In order to protect the private data in the edge computing system and ensure that the encrypted data can be processed normally in the cloud,based on the blockchain technology and the GSW full homomorphic encryption scheme,an edge computing privacy protection protocol based on homomorphic encryption is proposed.By building a Merkle hash tree and saving the Merkle root node to the blockchain ledger,data integrity protection in edge computing devices is achieved.For the data with high computational complexity in the edge computing device,the GSW fully homomorphic encryption scheme is used to realize the processing of the encrypted private data of a single edge computing device by the central server;the Link Algo algorithm is used to encrypt the single encryption of the GSW fully homomorphic encryption scheme.The key ciphertext is extended to multi-key ciphertext,realizing the cooperative processing of encrypted private data of multiple edge computing devices by the central server.Compared with the existing edge computing privacy protection schemes,this protocol has higher security and better efficiency.
Keywords/Search Tags:Privacy Protection, Homomorphic Encryption, Blockchain, Edge computing
PDF Full Text Request
Related items