DESC: enabling secure data exchange based on smart contracts

  • Jiao Liang
  • Weili Han
  • Zeqing Guo
  • Yaoliang Chen
  • Chang Cao
  • Xiaoyang Sean Wang
  • Fenghua Li
Letter
  • 127 Downloads

Notes

Acknowledgements

This work was supported by National Natural Science Foundation of China (NSFC) (Grant No. 61572136), and Shanghai Innovation Action Project (Grant No. 16DZ1100200).

References

  1. 1.
    Ma Z F. Digital rights management: model, technology and application. China Commun, 2017, 14: 156–167CrossRefGoogle Scholar
  2. 2.
    Zhu L H, Chen M X, Zhang Z J, et al. A privacypreserving video subscription scheme with the limitation of expire date. Sci China Inf Sci, 2017, 60: 098101CrossRefGoogle Scholar
  3. 3.
    Han W L, Xu M, Zhao W D, et al. A trusted decentralized access control framework for the client/server architecture. J Netw Comput Appl, 2010, 33: 76–83CrossRefGoogle Scholar
  4. 4.
    Hu V C, Kuhn D R, Ferraiolo D F. Attribute-based access control. Computer, 2015, 48: 85–88CrossRefGoogle Scholar
  5. 5.
    Kosba A, Miller A, Shi E, et al. Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: Proceedings of IEEE Symposium on Security and Privacy (SP), San Jose, 2016. 839–858CrossRefGoogle Scholar
  6. 6.
    Buterin V. Ethereum: a next-generation smart contract and decentralized application platform. 2017. https: //github.com/ethereum/wiki/wiki/White-PaperGoogle Scholar
  7. 7.
    Androulaki E, Cachin C, Christidis K, et al. Hyperledger fabric proposals: next consensus architecture proposal. 2017. http://github.com/hyperledger/fabric/ blob/master/proposals/r1/Next-Consensus-Architect ure-Proposal.mdGoogle Scholar
  8. 8.
    Kent A D, Liebrock L M. Secure communication via shared knowledge and a salted hash in ad-hoc environments. In: Proceedings of Computer Software and Applications Conference Workshops, Munich, 2011. 122–127Google Scholar
  9. 9.
    Boldyreva A, Chenette N, O’Neill A. Order-preserving encryption revisited: improved security analysis and alternative solutions. In: Proceedings of the 31st Annual Conference on Advances in Cryptology, Santa Barbara, 2011. 578–595Google Scholar

Copyright information

© Science China Press and Springer-Verlag GmbH Germany, part of Springer Nature 2018

Authors and Affiliations

  • Jiao Liang
    • 1
  • Weili Han
    • 1
  • Zeqing Guo
    • 1
  • Yaoliang Chen
    • 1
  • Chang Cao
    • 1
  • Xiaoyang Sean Wang
    • 1
  • Fenghua Li
    • 2
  1. 1.Software SchoolFudan UniversityShanghaiChina
  2. 2.Institute of Information EngineeringChinese Academy of SciencesBeijingChina

Personalised recommendations