Symmetric and Asymmetric Encryption in Blockchain

A special issue of Symmetry (ISSN 2073-8994). This special issue belongs to the section "Computer".

Deadline for manuscript submissions: closed (31 December 2022) | Viewed by 13400

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung 413310, Taiwan
Interests: blockchain; authentication mechanism; M-Commerce, E-Commerce; digital signature; radio frequency identification (RFID); wireless sensor network;Vehicular Ad Hoc Networks (VANET); Ad Hoc Networks; home network; medical safety service and digital right management security issues
Special Issues, Collections and Topics in MDPI journals
Department of Computer Science and Information Engineering, Chaoyang University of Technology, Taichung 413310, Taiwan
Interests: blockchain; information security; cryptography; automated optical inspection; computer vision; pattern recognition; software engineering

E-Mail Website
Guest Editor
Fujian Provincial Key Laboratory of Big Data Mining and Applications, Fujian University of Technology, Fuzhou 350118, China
Interests: semantic sensor network; artificial Internet of Things; intelligent computation
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The technology that is most likely to change the corporate world in the next ten years is not social networks, big data, cloud computing, robots; not even artificial intelligence, but blockchain." The main characteristics of blockchain technology are decentralization, high credibility, versatility, transparency, autonomy, non-changeable information, anonymity, traceability, irreversibility, intelligence, reward mechanism, and other characteristics. Blockchain technology is essentially a decentralized and open and transparent distributed database maintained by the collective. It has the characteristics of reliability and high confidentiality and has a good prospect in effectively solving the trust problem between the parties to the transaction. Credit is the basis for the production and maintenance of social relations between people and organizations. At present, people mainly use regulations, systems, laws, contracts, etc. to restrict credit problems. These methods cannot solve the credit problem due to many human subjective factors. Blockchain can achieve collaboration and trust between multiple entities through smart contracts, thereby expanding the scope and depth of mutual cooperation between roles. Symmetry is one of the most important notions in natural science.

Prof. Dr. Chin-Ling Chen
Dr. Zi-Yi Lim
Prof. Dr. Xingsi Xue
Prof. Dr. Chi-Hua Chen
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Symmetry is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • security in blockchain
  • blockchain platforms
  • blockchain technologies for public services
  • smart contract and blockchain
  • other technical issues when combining blockchain with emerging applications
  • blockchains and distributed ledger security
  • cloud security
  • privacy
  • authentication

Published Papers (5 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Editorial

Jump to: Research

4 pages, 168 KiB  
Editorial
Special Issue: Symmetric and Asymmetric Encryption in Blockchain
by Chin-Ling Chen, Zi-Yi Lim, Xingsi Xue and Chi-Hua Chen
Symmetry 2023, 15(2), 458; https://0-doi-org.brum.beds.ac.uk/10.3390/sym15020458 - 09 Feb 2023
Cited by 1 | Viewed by 1882
Abstract
The technology that is most likely to change the corporate world in the next ten years is not social networks, Big Data, cloud computing, robots, not even artificial intelligence, but blockchain [...] Full article
(This article belongs to the Special Issue Symmetric and Asymmetric Encryption in Blockchain)

Research

Jump to: Editorial

28 pages, 2269 KiB  
Article
An Approach for Blockchain Pool Mining Employing the Consensus Protocol Robust against Block Withholding and Selfish Mining Attacks
by Miodrag J. Mihaljević, Lianhai Wang, Shujiang Xu and Milan Todorović
Symmetry 2022, 14(8), 1711; https://0-doi-org.brum.beds.ac.uk/10.3390/sym14081711 - 17 Aug 2022
Cited by 4 | Viewed by 1727
Abstract
This paper proposes an approach for pool mining in public blockchain systems based on the employment of a recently reported consensus protocol with the puzzle based on a symmetric encryption that provides an energy–space trade-off and reduces energy consumption. The proposed architecture employs [...] Read more.
This paper proposes an approach for pool mining in public blockchain systems based on the employment of a recently reported consensus protocol with the puzzle based on a symmetric encryption that provides an energy–space trade-off and reduces energy consumption. The proposed architecture employs a pseudo-symmetric allocation of the resources for the blockchain consensus protocol and provides protection against certain malicious actions of the pool members, as well as a miner’s opportunity for selecting the resources required for participation in the consensus protocol. Given that the considered consensus protocol employs two resources, the proposed architecture uses this two-dimensional nature to provide resistance against block withholding and selfish mining attacks, as well as a reduction in energy spending as a trade-off with the employment of certain memory resources. The high resistance of the proposed pool mining approach against the considered attacks appears to be a consequence of the success probability of the pool in comparison with the success probability of malicious miners. Assuming appropriate selection of the puzzle hardness, the probability that malicious miners can solve the puzzle without the support of the pool manager can be arbitrarily small. Implementation of the proposed approach on a modified Ethereum platform and experimental evaluation issues have also been reported. The conceptual novelty of the proposed pool mining approach is the following: Instead of separation of the blockchain consensus protocol and control of pool miners honest work, this paper proposes an approach where honest work of miners and pool managers is provided by a dedicated application of the considered consensus protocol. Advantages of the proposal in comparison with the previously reported ones include the following: (i) high resistance against block withholding and selfish mining attacks without an additional security procedure; (ii) reduction in the energy required, and at the same time preservationthe security of the consensus protocol; (iii) flexibility of the pool miners regarding selection of the resources that should be employed providing a trade-off between required energy and memory resources. The proposed architecture was implemented employing a dedicated modification of the Ethereum platform and the performed experiments confirmed the feasibility and effectiveness of the proposal. Full article
(This article belongs to the Special Issue Symmetric and Asymmetric Encryption in Blockchain)
Show Figures

Figure 1

17 pages, 3796 KiB  
Article
Asymmetric Orientation Combination for Reversible and Authenticable Data Hiding of Dual Stego-images
by Jiang-Yi Lin, Ji-Hwei Horng, Chin-Chen Chang and Yung-Hui Li
Symmetry 2022, 14(4), 819; https://0-doi-org.brum.beds.ac.uk/10.3390/sym14040819 - 14 Apr 2022
Cited by 4 | Viewed by 1595
Abstract
A dual-image-based reversible data hiding (RDH) scheme can conceal secret data into a cover image by creating two steganographic images. These two stego-images can cooperate to extract secret data and restore the cover image. This paper describes a generalization of the orientation combination [...] Read more.
A dual-image-based reversible data hiding (RDH) scheme can conceal secret data into a cover image by creating two steganographic images. These two stego-images can cooperate to extract secret data and restore the cover image. This paper describes a generalization of the orientation combination technology for dual-image-based RDH. We first propose a full search algorithm to find the optimal set of the reversible orientation combinations. Based on the algorithm, the modification range of pixel values can be dynamically enlarged, and thus the embedding capacity becomes adjustable. In addition, an authentication algorithm is provided to detect tampered shadows based on a faithful one. Experimental results confirm that the proposed scheme can produce dual stego-images with a good visual quality. Furthermore, our method provides an adjustable payload. A lot more secret data can be embedded than with state-of-the-art methods, with a satisfactory image quality. Two steganalysis tools are applied to demonstrate the security level of the proposed scheme. Full article
(This article belongs to the Special Issue Symmetric and Asymmetric Encryption in Blockchain)
Show Figures

Figure 1

23 pages, 5410 KiB  
Article
Data Security and Preservation Mechanisms for Industrial Control Network Using IOTA
by Iuon-Chang Lin, Chin-Chen Chang and Yu-Sung Chang
Symmetry 2022, 14(2), 237; https://0-doi-org.brum.beds.ac.uk/10.3390/sym14020237 - 26 Jan 2022
Cited by 10 | Viewed by 2909
Abstract
In the Internet of Things (IoT), many devices can communicate with each other directly through the Internet, and there are already good applications in transportation systems, smart meters, and smart home appliances. Wireless sensor networks are used in these Internet of things applications. [...] Read more.
In the Internet of Things (IoT), many devices can communicate with each other directly through the Internet, and there are already good applications in transportation systems, smart meters, and smart home appliances. Wireless sensor networks are used in these Internet of things applications. Playing a vital role, the upload of data requires multiple layers of transmission to reach the cloud. In the industrial control field, many IoT devices upload data to the cloud for storage, but the upload process is easily tampered with, and centralized cloud services also have security concerns. In addition, in the local IoT perception layer among them, the security of sensor identity verification is also very important for message transmission. The main reason why the past blockchain technology could not be widely used in industrial control and other application fields is the cost considerations, because the procedures for running blockchain nodes and uploading transactions are too expensive. Therefore, this paper proposes an IoT architecture based on the IOTA Tangle network to solve the centralization problem of IoT storage in the cloud, and uses the method of MAM (Masked Authenticated Message) to trace the information of WSNs, while achieving data security and data preservation. In the edge devices of WSNs, because of the insufficient memory and computing performance of many devices, it is impossible to perform proof of work calculations. Therefore, this paper uses the logical key hierarchy-based method to manage the sensors, and applies symmetric and asymmetric encryption in blockchain. The identity verification of the device can be effectively achieved, and the operating cost can be effectively reduced. Full article
(This article belongs to the Special Issue Symmetric and Asymmetric Encryption in Blockchain)
Show Figures

Figure 1

19 pages, 782 KiB  
Article
Towards Convergence of IoT and Blockchain for Secure Supply Chain Transaction
by A S M Touhidul Hasan, Shabnam Sabah, Rakib Ul Haque, Apubra Daria, Abdur Rasool and Qingshan Jiang
Symmetry 2022, 14(1), 64; https://0-doi-org.brum.beds.ac.uk/10.3390/sym14010064 - 03 Jan 2022
Cited by 19 | Viewed by 3095
Abstract
Supply chain management (SCM) is essential for a company’s faster, efficient, and effective product life cycle. However, the current SCM systems are insufficient to provide product legitimacy, transaction privacy, and security. Therefore, this research proposes a secure SCM system for the authenticity of [...] Read more.
Supply chain management (SCM) is essential for a company’s faster, efficient, and effective product life cycle. However, the current SCM systems are insufficient to provide product legitimacy, transaction privacy, and security. Therefore, this research proposes a secure SCM system for the authenticity of the products based on the Internet of Things (IoT) and blockchain technology. The IoT-enabled Quick Response (QR) scanner and the blockchain-integrated distributed system will allow all the SCM stakeholders to begin secure and private transactions for their products or services. Resulting, the consumer will receive an authentic and genuine product from the original producer. A lightweight asymmetric key encryption technique, i.e., elliptic curve cryptography (ECC) and Hyperledger Fabric-based blockchain technology with on-chain smart contracts are applied for distributed IoT devices to make the authentication process faster and lighter. Each SCM stakeholder is registered by the service provider and receives corresponding public and private keys, which will be used for the authentication process of the participants and IoT devices. The authenticated QR scanner records all transactions on the blockchain. Consequently, there will be no human intervention for the SCM transactions. The security and scalability analysis demonstrates that the proposed system is more secure and robust than other state-of-the-art techniques. Full article
(This article belongs to the Special Issue Symmetric and Asymmetric Encryption in Blockchain)
Show Figures

Figure 1

Back to TopTop