
Conference:SCIENCE CHINA Information Sciences
CCF level:CCF A
Categories:Cross/Integrated/Emerging
Year:2024
1
Title:
Scenarios analysis and performance assessment of blockchain integrated in 6G scenarios
区块链融入6G场景的场景分析与性能评估
Authors:****

Key words:
blockchain, distributed ledger technology (DLT), 6G, performance assessment, 6G scenarios analysis, transaction arrival rate
区块链、分布式账本技术(DLT)、6G、性能评估、6G场景分析、交易到达率
Abstract:****
Emerging applications such as smart city infrastructures and virtual reality landscapes are setting rigorous benchmarks for 6G mobile networks, requiring elevated levels of confidentiality, integrity, non-repudiation, authentication, and stringent access controls. Blockchain technology is heralded as a transformative enabler for meeting 6G standards, owing to its intrinsic attributes. However, a gap exists in the holistic investigation of blockchain's applicability in 6G realms, particularly addressing the "whether", "when", and "how" of its deployment. Present research trails in developing robust methodologies to gauge blockchain's efficacy within 6G use cases. Addressing this, our study introduces a novel confluence of blockchain with 6G networks, where data resides in distributed Hash tables (DHTs) while their hashes are secured in distributed ledger technology (DLT), harnessing blockchain's core strengths-immutability, traceability, and fortified security. We delineate seven specific 6G use cases poised for enhancement through blockchain integration, and scrutinize the rationale, nature, and timing of this convergence. Furthermore, we devise a comprehensive methodology for assessing blockchain's performance metrics and scalability in 6G environments. Our extensive experimental analyses evaluate the synergistic performance of this integration, revealing that the Quorum blockchain satisfactorily supports 80% of 6G scenarios. The findings suggest that, with appropriate configurations, consortium blockchains are well-equipped to fulfill the demanding performance and scalability requisites of 6G networks.
智慧城市基础设施和虚拟现实等新兴应用正在为6G移动网络设定严格的基准,要求更高水平的机密性、完整性、不可否认性、身份验证和严格的访问控制。区块链技术因其固有属性而被誉为满足6G标准的变革性推动者。然而,在区块链在6G领域的适用性整体研究方面存在差距,尤其是在解决其"是否"、"何时"和"如何"部署方面。目前的研究方向是开发稳健的方法来评估区块链在6G用例中的有效性。为了解决这个问题,我们的研究引入了区块链与6G网络的全新融合,其中数据驻留在分布式哈希表(DHT)中,而其哈希值由分布式账本技术(DLT)保护,从而充分利用区块链的核心优势------不变性、可追溯性和强化安全性。我们概述了七个有望通过区块链集成实现增强的具体 6G 用例,并仔细研究了这种融合的原理、性质和时机。此外,我们还设计了一种全面的方法来评估区块链在 6G 环境中的性能指标和可扩展性。我们广泛的实验分析评估了这种集成的协同性能,结果表明 Quorum 区块链能够令人满意地支持 80% 的 6G 场景。研究结果表明,只要配置得当,联盟链完全能够满足 6G 网络对性能和可扩展性的苛刻要求。

Pdf下载链接:
https://www.sciengine.com/SCIS/doi/10.1007/s11432-023-4054-5
2
Title:
Blockchain-based immunization against kleptographic attacks
基于区块链的防窃取攻击
Authors:****

Key words:
kleptographic attacks, subliminal channel, blockchain, immunization, randomized algorithm
盗窃攻击、潜意识通道、区块链、免疫、随机算法
Abstract:****
Adversarial implementations of cryptographic primitives called kleptographic attacks cause the leakage of secret information. Subliminal channel attacks are one of the kleptographic attacks. In such attacks, backdoors are embedded in implementations of randomized algorithms to elaborately control randomness generation, such that the secrets will be leaked from biased outputs. To thwart subliminal channel attacks, double-splitting is a feasible solution, which splits the randomness generator of a randomized algorithm into two independent generators. In this paper, we instantiate double-splitting to propose a secure randomness generation algorithm dubbed SRG using two physically independent generators: ordinary and public randomness generators. Based on public blockchains, we construct the public randomness generator, which can be verified publicly. Hashes of a sufficient number of consecutive blocks that are newly confirmed on a blockchain are used to produce public randomness. In SRG,outputs from the two generators are taken as inputs of an immunization function. SRG accomplishes immunization against subliminal channel attacks. Additionally, we discuss the application strategies of SRG for symmetric and public-key encryption.
对抗性密码原语的实现被称为窃取攻击,会导致秘密信息泄露。潜意识信道攻击是窃取攻击的一种。在此类攻击中,后门被嵌入到随机算法的实现中,以精确控制随机数的生成,从而导致秘密从有偏差的输出中泄露。为了阻止潜意识信道攻击,双重分裂是一种可行的解决方案,它将随机算法的随机数生成器拆分为两个独立的生成器。本文将双重分裂实例化,提出了一种安全的随机数生成算法,称为 SRG,该算法使用两个物理上独立的生成器:普通随机数生成器和公共随机数生成器。基于公共区块链,我们构建了公共随机数生成器,该生成器可以公开验证。区块链上新确认的足够数量的连续区块的哈希值用于产生公共随机数。在 SRG 中,两个生成器的输出作为免疫函数的输入。SRG 实现了对潜意识信道攻击的免疫。此外,我们还讨论了 SRG 在对称加密和公钥加密中的应用策略。

Pdf下载链接:
https://www.sciengine.com/SCIS/doi/10.1007/s11432-023-3883-4
3
Title:
Fault-tolerant identity-based encryption from SM9
SM9 基于身份的容错加密
Authors:****

Key words:
attribute-based encryption, identity-based encryption, fault-tolerant, SM9
基于属性的加密,基于身份的加密,容错,SM9
Abstract:****
This paper initiates the formal study of attribute-based encryption within the framework of SM9, the Chinese National Cryptography Standard for Identity-Based Cryptography, by presenting two new fault-tolerant identity-based encryption (FIBE) schemes. Our first scheme uses the same private-key/ciphertext structure as the original SM9 algorithm and operates in a small attribute universe. As a result, it can be effectively and smoothly integrated into the information systems using SM9. In the random oracle model, we prove that our scheme is ciphertext-indistinguishable against fuzzy selective-identity and chosen-plaintext attacks under the (k+3)-DBDHI assumption. Our second design is a large universe FIBE scheme based on SM9 that is ciphertext-indistinguishable against chosen-plaintext attacks in the random oracle model under the (f,g)-GDDHE assumption. Finally, we compare the communication and computing costs of our schemes to those of other classical ones. The comparison shows that our schemes have comparable performance as others. We believe that our findings will accelerate the applications of SM9 in modern information systems such as cloud computing and blockchain.
本文在国家密码标准SM9(基于身份的密码体制)框架下,提出了两个新的容错身份加密(FIBE)方案,开启了属性基加密的正式研究。第一个方案采用与原始SM9算法相同的私钥/密文结构,并在较小的属性论域内运行,因此可以有效且平滑地集成到使用SM9的信息系统中。在随机预言机模型下,我们证明了该方案在(k+3)-DBDHI假设下,对模糊选择身份攻击和选择明文攻击具有密文不可区分性。第二个方案是基于SM9的大论域FIBE方案,在随机预言机模型下,在(f,g)-GDDHE假设下,对选择明文攻击具有密文不可区分性。最后,我们将该方案与其他经典方案的通信和计算成本进行了比较。比较结果表明,该方案的性能与其他方案相当。我们相信我们的研究成果将加速SM9在云计算、区块链等现代信息系统中的应用。

Pdf下载链接:
https://www.sciengine.com/SCIS/doi/10.1007/s11432-022-3706-7