Netinfo Security ›› 2022, Vol. 22 ›› Issue (5): 54-63.doi: 10.3969/j.issn.1671-1122.2022.05.007
Previous Articles Next Articles
LIU Jiawei, MA Zhaofeng(), WANG Shushuang, LUO Shoushan
Received:
2022-01-20
Online:
2022-05-10
Published:
2022-06-02
Contact:
MA Zhaofeng
E-mail:mzf@bupt.edu.cn
CLC Number:
LIU Jiawei, MA Zhaofeng, WANG Shushuang, LUO Shoushan. Research on the Restricted Sharing Technology of Private Credit Data Based on Blockchain[J]. Netinfo Security, 2022, 22(5): 54-63.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2022.05.007
符号 | 符号定义 |
---|---|
| 信用系统(Credit System)公钥 |
| 信用系统主密钥 |
| 信用系统安全参数 |
| 素数域 |
| 权限撤销列表,记录用户权限是否被取消 |
| 用户唯一的素数 |
| 用户Gid,由CA提供,保证用户全局唯一性 |
| 用户的相应属性 |
| 用户的属性集 |
| 待加密的信用明文 |
| 系统用户访问策略的访问控制结构 |
| 基于CP-ABE属性的加密密文 |
| 信用系统用户密钥 |
| 信用数据拥有者 |
[1] |
YANG Jing, LUIS G, JIN Xiang, et al. Quality Credit Evaluation in the Internet Company: A System Based on the Analytic Hierarchy Process[J]. Journal of Business Economics and Management, 2020, 21(2): 344-372.
doi: 10.3846/jbem.2020.11409 URL |
[2] | ONAY C, ÖZTÜRK E. A Review of Credit Scoring Research in the Age of Big Data[J]. Financial Regul Compliance, 2018, 2(6): 382-405. |
[3] | QIAO Pengcheng. Research on the Nature of Return to Finance, Internet Financial Innovation and“e Rent Treasure”[J]. The Theory and Practice of Finance and Economics, 2018, 39(1): 19-26. |
[4] |
CAI Ning, STEVEN K. Econometrics with Privacy Preservation[J]. Operations Research, 2019, 67(4): 905-926.
doi: 10.1287/opre.2018.1834 |
[5] | NAKAMOTO S. Bitcoin: A Peer-to-Peer Electronic Cash System[EB/OL]. [2021-12-27]. https://courses.cs.washington.edu/courses/csep552/18wi/papers/nakamoto-bitcoin.pdf. |
[6] | KOLB J, ABDEL B M, KATZ R H, et al. Core Concepts, Challenges, and Future Directions in Blockchain: A Centralized Tutorial[J]. ACM Computing Surveys(CSUR), 2020, 53(1): 1-39. |
[7] | BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-Policy Attribute-Based Encryption[C]// IEEE. 2007 IEEE Symposium on Security and Privacy(SP'07). New York: IEEE, 2007: 321-334. |
[8] | QIAO Yucheng, MA Chaoqun, LAN Qiujun, et al. Inventory Financing Model Based on Blockchain Technology[EB/OL]. [2021-12-29]. https://www.researchgate.net/publication/337963786_Inventory_Financing_Model_Based_on_Blockchain_Technology. |
[9] | LIU Jianxing, FAN Kai, LI Hui, et al. A Blockchain-Based Privacy Preservation Scheme in Multimedia Network[J]. Multimedia Tools and Applications, 2021(2): 1-15. |
[10] |
HASSIJA V, BANSAL G, CHAMOLA V, et al. Secure Lending: Blockchain and Prospect Theory-Based Decentralized Credit Scoring Model[J]. IEEE Transactions on Network Science and Engineering, 2020, 7(4): 2566-2575.
doi: 10.1109/TNSE.2020.2982488 URL |
[11] |
LI Xiaoqi, JIANG Peng, CHEN Ting, et al. A Survey on the Security of Blockchain Systems-Science Direct[J]. Future Generation Computer Systems, 2020, 107: 841-853.
doi: 10.1016/j.future.2017.08.020 URL |
[12] | YANG Cheng, LIU Yue. The Application of Blockchain Technology in the Construction of Social Credit System[J]. China Xintong, 2020, 22(24): 102-103. |
杨程, 刘玥. 区块链技术在社会信用体系建设中的应用[J]. 中国新通, 2020, 22(24):102-103. | |
[13] | LIU Guogang. China's Personal Credit Industry Development Practice and Expectation under the Background Internet Finance[J]. Exploration of Financial Theory, 2018, 22(4): 99-101. |
[14] | ZHU Huaqiang. The Application Prospect of Financial Technology in the Field of Market-Oriented Personal Credit Reporting[J]. Finan Comput, 2018(12): 41-44. |
[15] | FRANKS P C. Implications of Blockchain Distributed Ledger Technology for Records Management and Information Governance Programs[EB/OL]. [2021-12-30]. https://www.emerald.com/insight/content/doi/10.1108/RMJ-08-2019-0047/full/html. |
[16] | LIANG Gang, SUDARSHAN S C. Privacy-Preserving Inter-Database Operations[EB/OL]. [2021-12-21]. https://link.springer.com/chapter/10.1007/978-3-540-25952-7_6. |
[17] | TA Lin, LI Menggang. An Analysis of the Prospects for Application of Blockchain Technology in Internet Financial Credit[J]. Journal of Northeastern University(Social Science), 2018, 20(4): 66-74. |
[18] | MAO Dianhui, WANG Fan, HAO Zhihao, et al. Credit Evaluation System Based on Blockchain for Multiple Stakeholders in the Food Supply Chain[J]. International Journal of Environmental Research& Public Health, 2018, 15(8): 16-27. |
[19] | WANG Rui, LIN Zhangxi, LUO Hang. Blockchain, Bank Credit and SME Financing[J]. Quality & Quantity: International Journal of Methodology, 2019, 53: 1127-1140. |
[20] |
ZHANG Jiansai, LYU Tingjie, LI Riyang. A Study on SMIE Credit Evaluation Model Based on Blockchain Technology[J]. Procedia CIRP, 2019, 83: 616-623.
doi: 10.1016/j.procir.2019.05.003 URL |
[1] | FENG Jingyu, ZHANG Qi, HUANG Wenhua, HAN Gang. A Cyber Threat Intelligence Sharing Scheme Based on Cross-Chain Interaction [J]. Netinfo Security, 2022, 22(5): 21-29. |
[2] | CUI Haoyu, MA Limin, WANG Jiahui, ZHANG Wei. Research on the Security Model of Multi-Authority for Attribute Encryption Based on Blockchain [J]. Netinfo Security, 2022, 22(5): 84-93. |
[3] | LYU Guohua, HU Xuexian, YANG Ming, XU Min. Ship AIS Trajectory Classification Algorithm Based on Federated Random Forest [J]. Netinfo Security, 2022, 22(4): 67-76. |
[4] | SHI Runhua, WANG Shuhao, LI Kunchang. A Lightweight Cross-domain Mutual Authentication Scheme in V2G Networks [J]. Netinfo Security, 2022, 23(3): 20-28. |
[5] | CHEN Binjie, WEI Fushan, GU Chunxiang. Blockchain Abnormal Transaction Detection with Privacy-preserving Based on KNN [J]. Netinfo Security, 2022, 23(3): 78-84. |
[6] | WANG Jian, ZHANG Yunjia, LIU Jiqiang, CHEN Zhihao. Blockchain-based Mechanism for Judicial Data Management and Electronic Evidence Storage [J]. Netinfo Security, 2022, 22(2): 21-31. |
[7] | LIU Feng, YANG Chengyi, YU Xincheng, QI Jiayin. Spectral Graph Convolutional Neural Network for Decentralized Dual Differential Privacy [J]. Netinfo Security, 2022, 22(2): 39-46. |
[8] | HOU Yutong, MA Zhaofeng, LUO Shoushan. Research and Implementation of Data Security Sharing and Controlled Distribution Technology Based on Blockchain [J]. Netinfo Security, 2022, 22(2): 55-63. |
[9] | LIU Xin, WANG Jiayin, YANG Haorui, ZHANG Ruisheng. An Internet of Vehicles Authentication Protocol Based on Blockchain and secGear Framework [J]. Netinfo Security, 2022, 22(1): 27-36. |
[10] | FENG Jingyu, WANG Tao, YU Tingting, ZHANG Wenbo. A Secure Medical Data Sharing Scheme Based on Multi-clouds and Multi-chains Collaboration [J]. Netinfo Security, 2022, 22(1): 9-18. |
[11] | SUN Li. Research and Application of Information Protection Mechanism for Online Education Resource Alliance [J]. Netinfo Security, 2021, 21(9): 32-39. |
[12] | CHEN Kaijie, XIONG Yan, HUANG Wenchao, WU Jianshuang. A Formal Analysis Method of PoS Consensus Protocol Based on Byzantine Fault Tolerance [J]. Netinfo Security, 2021, 21(8): 35-42. |
[13] | JIN Shuting, HE Jingsha, ZHU Nafei, PAN Shijia. Research on Privacy Protection Access Control Mechanism Based on Ontology Reasoning [J]. Netinfo Security, 2021, 21(8): 52-61. |
[14] | REN Tao, JIN Ruochen, LUO Yongmei. Network Intrusion Detection Algorithm Integrating Blockchain and Federated Learning [J]. Netinfo Security, 2021, 21(7): 27-34. |
[15] | SHEN Zhuowei, GAO Peng, XU Xinyu. Design of DDS Secure Communication Middleware Based on Security Negotiation [J]. Netinfo Security, 2021, 21(6): 19-25. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||