Skip navigation

DSpace

機構典藏 DSpace 系統致力於保存各式數位資料(如:文字、圖片、PDF)並使其易於取用。

點此認識 DSpace
DSpace logo
English
中文
  • 瀏覽論文
    • 校院系所
    • 出版年
    • 作者
    • 標題
    • 關鍵字
    • 指導教授
  • 搜尋 TDR
  • 授權 Q&A
    • 我的頁面
    • 接受 E-mail 通知
    • 編輯個人資料
  1. NTU Theses and Dissertations Repository
  2. 電機資訊學院
  3. 資訊工程學系
請用此 Handle URI 來引用此文件: http://tdr.lib.ntu.edu.tw/jspui/handle/123456789/69777
完整後設資料紀錄
DC 欄位值語言
dc.contributor.advisor吳家麟(Ja-Ling Wu)
dc.contributor.authorYu-Jen Chenen
dc.contributor.author陳昱任zh_TW
dc.date.accessioned2021-06-17T03:27:29Z-
dc.date.available2019-05-17
dc.date.copyright2018-05-17
dc.date.issued2017
dc.date.submitted2018-04-09
dc.identifier.citation[1] J. Kelly, A. Williams, Forty Big Banks Test Blockchain-Based Bond Trading System, 2016, [online] Available: http://www.nytimes.com/reuters/2016/03/02/business/02reuters-banking-blockchain-bonds.html.
[2] I. Kar, Estonian Citizens Will Soon Have the World’s Most Hack-Proof Health-Care Records, 2016, [online] Available: http://qz.com/628889/this-eastern-european-country-is-moving-its-health-recordsto-the-blockchain/.
[3] A. Azaria, A. Ekblaw et al., “MedRec: Using blockchain for medical data access and permission management,” in 2016 2nd International Conference on Open and Big Data (OBD). Institute of Electrical and Electronics Engineers (IEEE), aug 2016.
[4] S. Lacey, The Energy Blockchain: How Bitcoin Could be a Catalyst for the Distributed Grid, 2016, [online] Available: http://www.greentechmedia.com/articles/read/the-energy-blockchain-could-bitcoin-be-a-catalyst-for-the-distributed-grid.
[5] K. Christidis and M. Devetsikiotis,“Blockchains and smart contracts for the internet of things,” IEEE Access, vol. 4, pp. 2292–2303, 2016.
[6] G. Zyskind et al., “Decentralizing privacy: Using blockchain to protect personal data,” in Security and Privacy Workshops (SPW), 2015 IEEE. IEEE, 2015, pp. 180–184.
[7] S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” White Paper, 2008.
[8] White Paper—Ethereum/WiKi, Mar. 2016, [online] Available: https://github.com/ethereum/wiki/wiki/White-Paper.
[9] G. Wood, “Ethereum: A secure decentralised generalised transaction ledger,” Ethereum Project Yellow Paper, 2014.
[10] Double-Spending—Bitcoin WiKi, Mar. 2016, [online] Available: https://en.bitcoin.it/wiki/Double-spending.
[11] Patricia-Tree—Ethereum/WiKi, Mar. 2016, [online] Available: https://github.com/ethereum/wiki/wiki/Patricia-Tree.
[12] J. R. Douceur, 'The Sybil attack' in Peer-to-Peer Systems, Berlin, Germany:Springer, pp. 251-260, Mar. 2002, [online] Available: http://link.springer.com/chapter/10.1007/3-540-45748-8_24.
[13] Hashcash-Bitcoin WiKi, Mar. 2016, [online] Available: https://en.bitcoin.it/wiki/Hashcash.
[14] V. Buterin, On Stake, 2014, [online] Available: https://blog.ethereum.org/2014/07/05/stake/.
[15] F. Tschorsch, B. Scheuermann, 'Bitcoin and beyond: A technical survey on decentralized digital currencies', IEEE Commun. Surveys Tuts..
[16] L. Lamport, R. Shostak, M. Pease, 'The Byzantine generals problem', ACM Trans. Program. Lang. Syst., vol. 4, pp. 382-401, Jul. 1982, [online] Available: http://doi.acm.org/10.1145/357172.357176.
[17] M. Castro, B. Liskov, 'Practical Byzantine fault tolerance', Proc. OSDI, vol. 99, pp. 173-186, 1999.
[18] D. Schwartz, N. Youngs, A. Britto, 'The ripple protocol consensus algorithm', 2014, [online] Available: https://ripple.com/files/ripple_consensus_whitepaper.pdf.
[19] G. Greenspan, MultiChain Private Blockchain—White Paper, 2015, [online] Available: http://www.multichain.com/white-paper/.
[20] M. Vukolić, 'The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication', Proc. IFIP WG 11.4 Workshop Open Res. Problems Netw. Secur. (iNetSec), pp. 112-125, 2015, [online] Available: http://www.vukolic.com/iNetSec_2015.pdf.
[21] N. Szabo, Smart Contracts, 1994, [online] Available: http://szabo.best.vwh.net/smart.contracts.html.
[22] M. Andrychowicz, S. Dziembowski, D. Malinowski, and L. Mazurek. 
Secure Multiparty Computations on Bitcoin. In S&P, 2013.
[23] Pass, Rafael. 'Micropayments for decentralized currencies.' Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. ACM, 2015.
[24] R. Kumaresan and I. Bentov. How to Use Bitcoin to Incentivize Correct 
Computations. In CCS, 2014. 

[25] Paillier, Pascal. 'Public-key cryptosystems based on composite degree residuosity classes.' Eurocrypt. Vol. 99. 1999.
[26] Kosba, Ahmed, et al. 'Hawk: The blockchain model of cryptography and privacy-preserving smart contracts.' Security and Privacy (SP), 2016 IEEE Symposium on. IEEE, 2016.
[27] Bost, Raphael, et al. 'Machine Learning Classification over Encrypted Data.' NDSS. 2015.
[28] LevelDB, Google Inc. , 2011, [online] Available: https://github.com/google/leveldb.
[29] Goldwasser, Shafi, and Silvio Micali. 'Probabilistic encryption & how to play mental poker keeping secret all partial information.' Proceedings of the fourteenth annual ACM symposium on Theory of computing. ACM, 1982.
dc.identifier.urihttp://tdr.lib.ntu.edu.tw/jspui/handle/123456789/69777-
dc.description.abstract近幾年各式各樣不同的產業正在利用區塊鏈技術和智能合約的概念大量的研發新的應用。傳統上,大多數的應用都依賴於一個中央管理機構,換句話說,需要一個可以信任的第三方來處理和管理交易和通訊服務。然而這種集中式管理模式會遇到一些安全問題。有了區塊鏈的技術,我們在分佈式的環境基礎上構建了一個系統,並且一樣擁有原來中央管理模式應用服務的功能。
我們演示了如何使用Oracle讓區塊鏈和鏈外的儲存資料庫可以進行溝通和交互,建立利用區塊鏈來當平台的分佈式資料庫和真正實體資產的連接。此外,我們將智能合約的概念應用於我們兩個目標的應用程序。然而,由於區塊鏈本質上的特性,也就是資料公開性,我們會遇到一些隱私的問題。當使用區塊鏈同時又必須在鏈上保有隱私,我們提出使用同態加密的方法來達到鏈上隱私保護來保護重要的資料。另外,我們建構了一個安全的比較協議,可以檢查加密域中的邏輯功能。利用提出的訪問控制合約和安全比較協議,我們可以執行擁有重要資料的合約相關的操作,並且不會洩漏重要的資料。
zh_TW
dc.description.abstractBy leveraging blockchain technology and smart contract concept, there is an explosive amount of applications applied to many different industries recently. Traditionally, most applications are relied on a centralized authority, which required a trusted intermediate to handle transactions and communications service. This centralized service model can encounter some security issues. With the aid of blockchain, we built a system on the basis of distributed environment, which can ensure the functionality of the original application service.
We demonstrate how to interact between blockchain and the off-chain storage with oracle-based mechanism, establishing the connection between a distributed database and the real asset. Also, we apply the concept of smart contract to our two target applications. However, because of blockchain’s nature characteristics, we may encounter some privacy issues, since the data on blockchain is expose to the public. Our proposed scheme provided a solution for the major privacy issue, which is said, achieving on-chain privacy by using homomorphic encryption on the sensitive data. Moreover, we constructed a secure comparison protocol that can check the logic function in the encrypted domain. With the aid of the proposed access control contract and the secure comparison protocol, we can carry out the protected sensitive data dependent smart contract operations and without revealing the data themselves.
en
dc.description.provenanceMade available in DSpace on 2021-06-17T03:27:29Z (GMT). No. of bitstreams: 1
ntu-106-R04922113-1.pdf: 22725878 bytes, checksum: c8551f5ba2840165c87ccaba53e319e0 (MD5)
Previous issue date: 2017
en
dc.description.tableofcontents口試委員審定書 i
誌謝 ii
中文摘要 iii
Abstract iv
List of Figures vii
List of Tables viii
Chapter 1. Introduction 1
Chapter 2. Related Works and Background Knowledge 4
2.1 Related works 4
2.2 Background 5
2.2.1 Transaction 5
2.2.2 Blockchain 13
2.2.3 Smart Contract 21
2.2.4 Paillier 26
Chapter 3. The Proposed Mechanism 29
3.1 Execution Environment 29
3.2 APPLICATION SCENARIO 1 31
3.3 APPLICATION SCENARIO 2 34
Chapter 4. Discussions of Security Issues 42
Chapter 5. Discussion 45
Chapter 6. Conclusion and Future Work 47
Chapter 7. References 48
dc.language.isozh-TW
dc.subject存取控制zh_TW
dc.subject物聯網zh_TW
dc.subject智能合約zh_TW
dc.subject同態加密zh_TW
dc.subject隱私zh_TW
dc.subject區塊鏈zh_TW
dc.subjectinternet of thingsen
dc.subjectaccess controlen
dc.subjectblockchainen
dc.subjectsmart contracten
dc.subjectprivacyen
dc.subjecthomomorphic encryptionen
dc.title一種基於Oracle的鏈上隱私保護機制及其應用zh_TW
dc.titleAn Oracle-Based On-Chain Privacy Preserving Mechanism and Its Applicationsen
dc.typeThesis
dc.date.schoolyear106-2
dc.description.degree碩士
dc.contributor.coadvisor陳文進(Wen-Chin Chen)
dc.contributor.oralexamcommittee鄭文皇(Wen-Huang Cheng),胡敏君(Min-Chun Hu),朱威達(Wei-Ta Chu)
dc.subject.keyword物聯網,存取控制,區塊鏈,智能合約,隱私,同態加密,zh_TW
dc.subject.keywordinternet of things,access control,blockchain,smart contract,privacy,homomorphic encryption,en
dc.relation.page51
dc.identifier.doi10.6342/NTU201800722
dc.rights.note有償授權
dc.date.accepted2018-04-10
dc.contributor.author-college電機資訊學院zh_TW
dc.contributor.author-dept資訊工程學研究所zh_TW
顯示於系所單位:資訊工程學系

文件中的檔案:
檔案 大小格式 
ntu-106-1.pdf
  未授權公開取用
22.19 MBAdobe PDF
顯示文件簡單紀錄


系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。

社群連結
聯絡資訊
10617臺北市大安區羅斯福路四段1號
No.1 Sec.4, Roosevelt Rd., Taipei, Taiwan, R.O.C. 106
Tel: (02)33662353
Email: ntuetds@ntu.edu.tw
意見箱
相關連結
館藏目錄
國內圖書館整合查詢 MetaCat
臺大學術典藏 NTU Scholars
臺大圖書館數位典藏館
本站聲明
© NTU Library All Rights Reserved