Amazing technological breakthrough possible @S-Logix pro@slogix.in

Office Address

  • #5, First Floor, 4th Street Dr. Subbarayan Nagar Kodambakkam, Chennai-600 024 Landmark : Samiyar Madam
  • pro@slogix.in
  • +91- 81240 01111

Social List

Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption for IP Circuit Protection - 2020

Circuit Copyright Blockchain: Blockchain-Based Homomorphic Encryption For Ip Circuit Protection

Research Area:  Blockchain Technology

Abstract:

The fast development of Blockchain technology makes it widely applied in several fields of digital transactions, like e-government affairs and the protection of financial transactions. In this article, we propose a homomorphic encryption-based Blockchain for circuit copyright protection that effectively addresses the issues in the protection of circuit copyright transactions, such as low security of private data, low efficiency in transaction data storage, cooperation and supervision. First, we establish a homomorphic encryption-based mathematical model by utilizing Blockchain and intelligent contract, and next, the algorithms that include Blockchain generation, homomorphic chain encryption/decryption, and intelligent contract are designed. As the intelligent contract is correctly executed in Blockchain, a fully homomorphic encryption-based identity authentication protocol is tackled for Blockchain, given that it ensures the change operation of any third-party in Blockchain and realizes real-time verification. The system is apposite for circuit copyright protection in a blockchain network, due to the use of distributed identity authentication and real-time extensible storage improves the security and extensibility of blockchain-based circuit copyright protection. The experimental results show that the proposed algorithm has reduced the transmission cost and improved the efficiency of data storage and supervision. In addition, it is resilient to several common attacks (e.g., double-spending attacks), yet incurs low cost/overhead and has a higher level of security when compared to three other competing algorithms.

Keywords:  

Author(s) Name:  Wei Liang; Dafang Zhang; Xia Lei; Mingdong Tang; Kuan-Ching Li; Albert Y. Zomaya

Journal name:  IEEE Transactions on Emerging Topics in Computing

Conferrence name:  

Publisher name:  IEEE

DOI:  10.1109/TETC.2020.2993032

Volume Information:  Volume: 9, Issue: 3, 01 July-Sept. 2021, Page(s): 1410 - 1420