Abstract
In order to integrate the use of blockchain technologies into the daily routines of companies and institutions, it is essential to securely transmit the data stored and exchanged in these systems. Not only the security and reliability of the underlying system is important here, but also the encryption of the transferred information. Since there are usually more than two parties involved in transferring data over the blockchain in everyday applications, multi-party encryption is required. This paper introduces various encryption methods which can be used in the context of blockchain usage.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Andreeva, E., Mennink, B., Preneel, B.: Open problems in hash function security. Des. Codes Cryptogr., 611–631 (2015).https://doi.org/10.1007/s10623-015-0096-0
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
Chase, M.: Multi-authority attribute based encryption. In: Theory of Cryp-tography, pp. 515–534. Springer Berlin Heidelberg, https://doi.org/10.1007/978-3-540-70936-7_28
Elgamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31(4), 469–472 (1985). https://doi.org/10.1109/TIT.1985.1057074
Jansen, M., Hdhili, F., Gouiaa, R., Qasem, Z.: Do smart contract languages need to be turing complete? In: Prieto, J., Das, A.K., Ferretti, S., Pinto, A., Corchado, J.M. (eds.) BLOCKCHAIN 2019. AISC, vol. 1010, pp. 19–26. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-23813-1_3
Libert, B., Ţiţiu, R.: Multi-client functional encryption for linear functions in the standard model from LWE. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019. LNCS, vol. 11923, pp. 520–551. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-34618-8_18
López-Alt, A., Tromer, E., Vaikuntanathan, V.: On-the-fly multiparty computation on the cloud via multikey fully homomorphic encryption. In: Proceedings of the 44th Symposium on Theory of Computing—STOC’12. ACM Press (2012). 10.1145/2213977.2214086
Ordonez, A.J., Medina, R.P., Gerardo, B.D.: Modified el Gamal algorithm for multiple senders and single receiver encryption. In: 2018 IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE). IEEE, 2018. https://doi.org/10.1109/iscaie.2018.8405470
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978). https://doi.org/10.1145/359340.359342
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Carls, V., Schmidt, L., Jansen, M. (2023). Overview of Multiple User Encryption for Exchange of Private Data via Blockchains. In: Prieto, J., Benítez Martínez, F.L., Ferretti, S., Arroyo Guardeño, D., Tomás Nevado-Batalla, P. (eds) Blockchain and Applications, 4th International Congress . BLOCKCHAIN 2022. Lecture Notes in Networks and Systems, vol 595. Springer, Cham. https://doi.org/10.1007/978-3-031-21229-1_41
Download citation
DOI: https://doi.org/10.1007/978-3-031-21229-1_41
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-21228-4
Online ISBN: 978-3-031-21229-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)