Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

An Authorized Scheme Service Privately Shared Data

View through CrossRef
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that leverages publicly verifiable proxy re-encryption to enable secure and controlled data sharing between users without exposing the underlying plaintext to unauthorized entities or intermediaries. The system is divided into three primary modules, each hosted on a separate server, to enhance security, scalability, and modularity. Server 1 is responsible for storing encrypted data and generating the corresponding private keys. It also performs the initial encryption and re-encryption processes to prepare data for secure sharing. Server 2 manages user file requests, verifies user permissions, and facilitates key distribution. Upon receiving a request, Server 2 checks whether the user has the right to access the file and provides the required key if the request is approved. Server 3 plays a crucial role in user registration, login, and access management. It supports multiple user requests, ensuring that each user’s identity and access rights are properly handled. The second part of the system focuses on user-level interactions. Users must register and log into the system before they can upload data, search for existing data, or request access to encrypted files. Once registered, users can view the encryption keys associated with their data and request re-encryption keys for sharing information securely with other users. At the core of this architecture lies the publicly verifiable proxy re-encryption scheme. This cryptographic approach includes several key algorithms: key generation (KeyGen), encryption (Enc), re-encryption key generation (RkGen), re-encryption (ReEnc), verification of re-encrypted ciphertext (VerRe), and decryption (Dec). The KeyGen algorithm generates public-private key pairs for each user. With Enc, data is encrypted using the public key, and RkGen allows the data owner to produce a re-encryption key that permits a proxy to convert the ciphertext for another authorized user without revealing the plaintext. The ReEnc function transforms the ciphertext using this re-encryption key, while VerRe ensures that the transformation was correctly performed. Finally, Dec allows the intended recipient to decrypt the data using their private key. This framework ensures that only authorized users can access sensitive data, and the re-encryption process does not compromise confidentiality. Moreover, by distributing roles across three servers and employing blockchain for record-keeping and trust verification, the system achieves a high degree of transparency, traceability, and tamper-resistance. Proxy re-encryption plays a pivotal role in enabling dynamic and secure data sharing.
Title: An Authorized Scheme Service Privately Shared Data
Description:
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge.
This paper proposes a blockchain-based architecture that leverages publicly verifiable proxy re-encryption to enable secure and controlled data sharing between users without exposing the underlying plaintext to unauthorized entities or intermediaries.
The system is divided into three primary modules, each hosted on a separate server, to enhance security, scalability, and modularity.
Server 1 is responsible for storing encrypted data and generating the corresponding private keys.
It also performs the initial encryption and re-encryption processes to prepare data for secure sharing.
Server 2 manages user file requests, verifies user permissions, and facilitates key distribution.
Upon receiving a request, Server 2 checks whether the user has the right to access the file and provides the required key if the request is approved.
Server 3 plays a crucial role in user registration, login, and access management.
It supports multiple user requests, ensuring that each user’s identity and access rights are properly handled.
The second part of the system focuses on user-level interactions.
Users must register and log into the system before they can upload data, search for existing data, or request access to encrypted files.
Once registered, users can view the encryption keys associated with their data and request re-encryption keys for sharing information securely with other users.
At the core of this architecture lies the publicly verifiable proxy re-encryption scheme.
This cryptographic approach includes several key algorithms: key generation (KeyGen), encryption (Enc), re-encryption key generation (RkGen), re-encryption (ReEnc), verification of re-encrypted ciphertext (VerRe), and decryption (Dec).
The KeyGen algorithm generates public-private key pairs for each user.
With Enc, data is encrypted using the public key, and RkGen allows the data owner to produce a re-encryption key that permits a proxy to convert the ciphertext for another authorized user without revealing the plaintext.
The ReEnc function transforms the ciphertext using this re-encryption key, while VerRe ensures that the transformation was correctly performed.
Finally, Dec allows the intended recipient to decrypt the data using their private key.
This framework ensures that only authorized users can access sensitive data, and the re-encryption process does not compromise confidentiality.
Moreover, by distributing roles across three servers and employing blockchain for record-keeping and trust verification, the system achieves a high degree of transparency, traceability, and tamper-resistance.
Proxy re-encryption plays a pivotal role in enabling dynamic and secure data sharing.

Related Results

A COMPARATIVE QUALITY STUDY OF SELECTED AUTHORIZED AND SMUGGLED MEDICINES IN ADEN, YEMEN
A COMPARATIVE QUALITY STUDY OF SELECTED AUTHORIZED AND SMUGGLED MEDICINES IN ADEN, YEMEN
In Yemen, most of the medicines are imported. Drugs that enter the country by legal means undergo some tests by Supreme Board for Drugs and Medical Appliances (SBDMA) to evaluate t...
Exploring relationships of shared service arrangements in local government
Exploring relationships of shared service arrangements in local government
PurposeScant research attention has been given to investigating shared service organizations and in particular their relationships. The aim of this research is to investigate the c...
Corporate Rights Of The Spouses: The Essence Of The Legal Regime
Corporate Rights Of The Spouses: The Essence Of The Legal Regime
The article is devoted to the question of legal regulation of corporate rights of spouses. The issues of the legal regime of marital property as well as the essence of the legal re...
Modelling of Unauthorized Land Use Sprawl using High Resolution Data and GIS Based-Cellular Automata
Modelling of Unauthorized Land Use Sprawl using High Resolution Data and GIS Based-Cellular Automata
This study uses Cellular Automata (CA) model, Geography Information System (GIS) and remote sensing data to produce trend and sprawl pattern simulation of un-authorized land use in...
Assessing the Equity and Redistributive Effects of Taxation Reforms in Nigeria
Assessing the Equity and Redistributive Effects of Taxation Reforms in Nigeria
Achieving the Sustainable Development Goals (SDGs) of poverty and inequality reduction through redistribution have indeed become critical concerns in many low- and middle-income co...
The Influence of Sociocultural Factors on Shared Reading in Jordan.
The Influence of Sociocultural Factors on Shared Reading in Jordan.
Abstract Background: Shared reading has many benefits to children’s language and literacy development. The practice of shared reading varies widely among different cultural...
Self­-service for public transport payments: A business case for conversational artificial intelligence
Self­-service for public transport payments: A business case for conversational artificial intelligence
<p>Although self-service (i.e. mobile top-ups) is at the heart of Snapper’s customer service offering, customers have a disjointed experience managing their public transport ...

Back to Top