Proceedings of the 2022 3rd International Conference on E-commerce and Internet Technology (ECIT 2022)

Blockchain Information Tamper-Proof Algorithm Design Based on Searchable Encryption

Authors
Pingfan Jia1, Junhai Cao1, *
1Army Academy of Armored Forces, Beijing, China
*Corresponding author. Email: caojunhai@163.com
Corresponding Author
Junhai Cao
Available Online 10 November 2022.
DOI
10.2991/978-94-6463-005-3_70How to use a DOI?
Keywords
Blockchain; search for encryption; privacy protection Introduction
Abstract

In view of the problem that the traditional blockchain platform data protection mechanism is not perfect, the blockchain information is easily tampered with and lost. In this study, a searchable encrypted protection scheme for blockchain information was designed to prevent information tampering. The scheme model and the specific algorithm are first introduced in detail. The complexity and security of the scheme are then analyzed. Based on the above schemes and algorithms, a data sharing system based on Fabric alliance chain platform data is constructed with blockchain searchable encryption, and the overall architecture and functional partition of the system are designed in detail. Finally, in order to test the effectiveness of the system, the test environment and the experimental environment will be built to test and encryption, and the overall architecture and functional partition of the system are designed in detail. Finally, in order to test the effectiveness of the system, the test environment and the experimental environment will be built to test and algorithms, the proposed scheme are more time efficient and significantly improved.

Copyright
© 2023 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the 2022 3rd International Conference on E-commerce and Internet Technology (ECIT 2022)
Series
Atlantis Highlights in Engineering
Publication Date
10 November 2022
ISBN
978-94-6463-005-3
ISSN
2589-4943
DOI
10.2991/978-94-6463-005-3_70How to use a DOI?
Copyright
© 2023 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Pingfan Jia
AU  - Junhai Cao
PY  - 2022
DA  - 2022/11/10
TI  - Blockchain Information Tamper-Proof Algorithm Design Based on Searchable Encryption
BT  - Proceedings of the 2022 3rd International Conference on E-commerce and Internet Technology (ECIT 2022)
PB  - Atlantis Press
SP  - 681
EP  - 692
SN  - 2589-4943
UR  - https://doi.org/10.2991/978-94-6463-005-3_70
DO  - 10.2991/978-94-6463-005-3_70
ID  - Jia2022
ER  -