跳到主要內容

臺灣博碩士論文加值系統

(18.97.9.168) 您好!臺灣時間:2025/01/16 17:53
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

我願授權國圖
: 
twitterline
研究生:郭仲頤
研究生(外文):GUO, ZHONG-YI
論文名稱:平行智能合約上之分散式資料庫隱蔽存取系統
論文名稱(外文):Oblivious Access System on Decentralized Database over Parallel Smart Contract Model
指導教授:陳昱圻
指導教授(外文):CHEN, YU-CHI
口試委員:左瑞麟張經略
口試委員(外文):TSO, RAY-LINCHANG, CHING-LUEH
口試日期:2020-07-16
學位類別:碩士
校院名稱:元智大學
系所名稱:資訊工程學系
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2020
畢業學年度:108
語文別:英文
論文頁數:44
中文關鍵詞:智能合約區塊鏈隱蔽存取混淆電路
外文關鍵詞:Smart contractBlockchainOblivious RAMGarbled circuits
相關次數:
  • 被引用被引用:0
  • 點閱點閱:212
  • 評分評分:
  • 下載下載:0
  • 收藏至我的研究室書目清單書目收藏:0
Abstract in Chinese . . . . . . . . . . . . . . . iii
Abstract in English . . . . . . . . . . . . . . . iv
Acknowledgements . . . . . . . . . . . . . . . . v
Table of Contents . . . . . . . . . . . . . . . . vi
List of Tables . . . . . . . . . . . . . . . . . .viii
List of Figures . . . . . . . . . . . . . . . . . ix
1 Introduction . . . . . . . . . . . . . . . . . .1
1.1 Background . . . . . . . . . . . . . . . . . .1
1.2 Contributions . . . . . . . . . . . . . . . . 2
1.3 Organization . . . . . . . . . . . . . . . . .4
2 Related Work . . . . . . . . . . . . . . . . . .5
2.1 Oblivious Random Access Machine(ORAM) . . . . 5
2.2 Blockchain and Smart Contract . . . . . . . . 6
3 Preliminaries . . . . . . . . . . . . . . . . . 10
3.1 Parallel Smart Contract Models . . . . . . . .10
3.2 Garbled Circuits . . . . . . . . . . . . . . .10
3.3 ORAM . . . . . . . . . . . . . . . . . . . . .11
4 System Framework . . . . . . . . . . . . . . . .13
4.1 Model . . . . . . . . . . . . . . . . . . . . 13
4.2 Security Definition . . . . . . . . . . . . . 15
5 The Proposed System . . . . . . . . . . . . . . 17
5.1 Building Blocks . . . . . . . . . . . . . . . 17
5.1.1 Data Block Format . . . . . . . . . . . . . 17
5.1.2 Service-side Storage Organization . . . . . 17
5.1.3 User-side Storage Organization . . . . . . .19
5.1.4 Service-side . . . . . . . . . . . . . . . .19
5.1.5 User-side . . . . . . . . . . . . . . . . . 21
5.2 Full Construction . . . . . . . . . . . . . . 22
5.3 Security Proof . . . . . . . . . . . . . . . .30
6 Implementations and Discussions . . . . . . . . 34
6.1 Garbled Circuit Implementations . . . . . . . 34
6.2 Smart Contract Implementations . . . . . . . 37
6.3 Discussions of the Proposed System . . . . . .38
7 Conclusions . . . . . . . . . . . . . . . . . . 40
References . . . . . . . . . . . . . . . . . . . .41
[1] A. Dorri, S. S. Kanhere, and R. Jurdak, “Towards an optimized blockchain for iot,” in 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI). IEEE, 2017, pp. 173–178.
[2] S. Nakamoto and A. Bitcoin, “A peer-to-peer electronic cash system,” Bitcoin.–URL: https://bitcoin. org/bitcoin. pdf, 2008.
[3] N. Szabo, “Formalizing and securing relationships on public networks,” First Monday, vol. 2, no. 9, 1997.
[4] O. Goldreich and R. Ostrovsky, “Software protection and simulation on oblivious rams,” Journal of the ACM (JACM), vol. 43, no. 3, pp. 431–473, 1996.
[5] E. Stefanov, M. Van Dijk, E. Shi, C. Fletcher, L. Ren, X. Yu, and S. Devadas,“Path oram: an extremely simple oblivious ram protocol,” in Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security. ACM, 2013, pp. 299–310.
[6] X. Wang, H. Chan, and E. Shi, “Circuit oram: On tightness of the goldreichostrovsky lower bound,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 2015, pp. 850–861.
[7] A. C. Yao, “Protocols for secure computations,” in 23rd annual symposium on foundations of computer science (sfcs 1982). IEEE, 1982, pp. 160–164.
[8] W. Yu, K. Luo, Y. Ding, G. You, and K. Hu, “A parallel smart contract model,” in Proceedings of the 2018 International Conference on Machine Learning and Machine Intelligence. ACM, 2018, pp. 72–77.
[9] N. S. Arora, R. D. Blumofe, and C. G. Plaxton, “Thread scheduling for multiprogrammed multiprocessors,” Theory of computing systems, vol. 34, no. 2, pp. 115–144, 2001.
[10] S. Devadas, M. van Dijk, C. W. Fletcher, L. Ren, E. Shi, and D. Wichs, “Onion oram: A constant bandwidth blowup oblivious ram,” in Theory of Cryptography Conference. Springer, 2016, pp. 145–174.
[11] T. Moataz, T. Mayberry, and E.-O. Blass, “Constant communication oram with small blocksize,” in Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, pp. 862–873.
[12] O. Goldreich, “Towards a theory of software protection and simulation by oblivious rams,” in Proceedings of the nineteenth annual ACM symposium on Theory of computing. ACM, 1987, pp. 182–194.
[13] R. Ostrovsky, “Efficient computation on oblivious rams,” in Proceedings of the twenty-second annual ACM symposium on Theory of computing. ACM, 1990, pp. 514–523.
[14] M. T. Goodrich and M. Mitzenmacher, “Privacy-preserving access of outsourced data via oblivious ram simulation,” in International Colloquium on Automata, Languages, and Programming. Springer, 2011, pp. 576–587.
[15] M. T. Goodrich, M. Mitzenmacher, O. Ohrimenko, and R. Tamassia, “Privacypreserving group data access via stateless oblivious ram simulation,” in Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete Algorithms. SIAM, 2012, pp. 157–167.
[16] E. Kushilevitz, S. Lu, and R. Ostrovsky, “On the (in) security of hash-based oblivious ram and a new balancing scheme,” in Proceedings of the twenty-third annual ACM-SIAM symposium on Discrete Algorithms. SIAM, 2012, pp. 143– 156.
[17] S. Lu and R. Ostrovsky, “Distributed oblivious ram for secure two-party computation,” in Theory of Cryptography Conference. Springer, 2013, pp. 377–396.
[18] E. Shi, T.-H. H. Chan, E. Stefanov, and M. Li, “Oblivious ram with o ((logn) 3) worst-case cost,” in International Conference on The Theory and Application of Cryptology and Information Security. Springer, 2011, pp. 197–214.
[19] E. Foundation, “Ethereum’s white paper,” https://ethereum.org/whitepaper/,2016.
[20] C. Lee, “litecoin’s white paper,” https://github.com/litecoin-project/litecoin,2011.
[21] T. Limited, “Tether’s white paper,” https://tether.to/wp-content/uploads/2016/06/TetherWhitePaper.pdf, 2012.
[22] A. Dubovitskaya, Z. Xu, S. Ryu, M. Schumacher, and F. Wang, “Secure and trustable electronic medical records sharing using blockchain,” in AMIA annual symposium proceedings, vol. 2017. American Medical Informatics Association, 2017, p. 650.
[23] M. Holland, C. Nigischer, and J. Stjepandic, “Copyright protection in additive manufacturing with blockchain approach,” Transdisciplinary Engineering: A Paradigm Shift, vol. 5, pp. 914–921, 2017.
[24] F. Tian, “An agri-food supply chain traceability system for china based on rfid & blockchain technology,” in 2016 13th international conference on service systems and service management (ICSSSM). IEEE, 2016, pp. 1–6.
[25] S. Raju, S. Boddepalli, S. Gampa, Q. Yan, and J. S. Deogun, “Identity management using blockchain for cognitive cellular networks,” in 2017 IEEE International Conference on Communications (ICC). IEEE, 2017, pp. 1–6.
[26] R. C. Merkle, “A digital signature based on a conventional encryption function,” in Conference on the theory and application of cryptographic techniques. Springer, 1987, pp. 369–378.
[27] U. W. Chohan, “The double spending problem and cryptocurrencies,” Available at SSRN 3090174, 2017.
[28] C. Dwork and M. Naor, “Pricing via processing or combatting junk mail,” in Annual International Cryptology Conference. Springer, 1992, pp. 139–147.
[29] M. Jakobsson and A. Juels, “Proofs of work and bread pudding protocols,” in Secure information networks. Springer, 1999, pp. 258–272.
[30] M. Castro, B. Liskov et al., “Practical byzantine fault tolerance,” in OSDI,vol. 99, no. 1999, 1999, pp. 173–186.
[31] S. King and S. Nadal, “Ppcoin: Peer-to-peer crypto-currency with proof-ofstake,”self-published paper, August, vol. 19, 2012.
[32] D. Larimer, “Delegated proof-of-stake (dpos),” Bitshare whitepaper, 2014.
[33] V. Buterin et al., “A next-generation smart contract and decentralized application platform,” white paper, vol. 3, no. 37, 2014.
[34] G. Wood et al., “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum project yellow paper, vol. 151, no. 2014, pp. 1–32, 2014.
[35] B. B. Daniel Larimer, “EOS.IO’s white paper,” https://github.com/EOSIO/Documentation/blob/master/TechnicalWhitePaper.md, 2017.
[36] C. Cachin et al., “Architecture of the hyperledger blockchain fabric,” in Workshop on distributed cryptocurrencies and consensus ledgers, vol. 310, 2016, p. 4.
[37] J. Kehrli, “Blockchain 2.0—-from bitcoin transactions to smart contract applications,” Niceideas, November. Available at: https://www. niceideas.ch/roller2/badtrash/entry/blockchain-2-0-frombitcoin (Accessed: 5 January 2018), 2016.
[38] E. Stefanov, E. Shi, and D. Song, “Towards practical oblivious ram,” arXiv preprint arXiv:1106.3652, 2011.
電子全文 電子全文(網際網路公開日期:20250730)
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top
無相關期刊