2/18/2023 0 Comments Search for encrypted files![]() ![]() To address these threats, we utilize the smart contract to record the logs of encrypted search (aka evidence) on the blockchain, and devise a fair protocol to handle disputes and issue fair payments. Service peers may return partial or incorrect results, while clients may intentionally slander the service peers to avoid payments. The reason is that decentralized storage commonly faces severe threats from both clients and service peers. But this primitive can hardly ensure the service integrity. ![]() To enable this function, we first apply searchable encryption techniques to the decentralized setting. However, the ubiquitous keyword search function over encrypted files is yet to be supported. Decentralized storage such as Storj and Sia leverages blockchain to establish an open platform for sharing economy, which provides private and reliable file-outsourcing services. Blockchain has led the trend of decentralized applications and shown great use beyond cryptocurrencies. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |