DESC: enabling secure data exchange based on smart contracts

  • Jiao Liang
  • Weili Han
  • Zeqing Guo
  • Yaoliang Chen
  • Chang Cao
  • Xiaoyang Sean Wang
  • Fenghua Li
Letter
  • 18 Downloads

Notes

Acknowledgements

This work was supported by National Natural Science Foundation of China (NSFC) (Grant No. 61572136), and Shanghai Innovation Action Project (Grant No. 16DZ1100200).

References

  1. 1.
    Ma Z F. Digital rights management: model, technology and application. China Commun, 2017, 14: 156–167CrossRefGoogle Scholar
  2. 2.
    Zhu L H, Chen M X, Zhang Z J, et al. A privacypreserving video subscription scheme with the limitation of expire date. Sci China Inf Sci, 2017, 60: 098101CrossRefGoogle Scholar
  3. 3.
    Han W L, Xu M, Zhao W D, et al. A trusted decentralized access control framework for the client/server architecture. J Netw Comput Appl, 2010, 33: 76–83CrossRefGoogle Scholar
  4. 4.
    Hu V C, Kuhn D R, Ferraiolo D F. Attribute-based access control. Computer, 2015, 48: 85–88CrossRefGoogle Scholar
  5. 5.
    Kosba A, Miller A, Shi E, et al. Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: Proceedings of IEEE Symposium on Security and Privacy (SP), San Jose, 2016. 839–858CrossRefGoogle Scholar
  6. 6.
    Buterin V. Ethereum: a next-generation smart contract and decentralized application platform. 2017. https: //github.com/ethereum/wiki/wiki/White-PaperGoogle Scholar
  7. 7.
    Androulaki E, Cachin C, Christidis K, et al. Hyperledger fabric proposals: next consensus architecture proposal. 2017. http://github.com/hyperledger/fabric/ blob/master/proposals/r1/Next-Consensus-Architect ure-Proposal.mdGoogle Scholar
  8. 8.
    Kent A D, Liebrock L M. Secure communication via shared knowledge and a salted hash in ad-hoc environments. In: Proceedings of Computer Software and Applications Conference Workshops, Munich, 2011. 122–127Google Scholar
  9. 9.
    Boldyreva A, Chenette N, O’Neill A. Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Proceedings of the 31st Annual Conference on Advances in Cryptology, Santa Barbara, 2011. 578–595Google Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  • Jiao Liang
    • 1
  • Weili Han
    • 1
  • Zeqing Guo
    • 1
  • Yaoliang Chen
    • 1
  • Chang Cao
    • 1
  • Xiaoyang Sean Wang
    • 1
  • Fenghua Li
    • 2
  1. 1.Software SchoolFudan UniversityShanghaiChina
  2. 2.Institute of Information EngineeringChinese Academy of SciencesBeijingChina

Personalised recommendations