研究生: |
董郡麟 Tung, Chun-Lin |
---|---|
論文名稱: |
Blockchain-based Reward for Data Delivery Service with Zero-Knowledge Proof Blockchain-based Reward for Data Delivery Service with Zero-Knowledge Proof |
指導教授: |
黃冠寰
Hwang, Gwan-Hwan |
口試委員: |
黃冠寰
Hwang, Gwan-Hwan 張道顧 Chang, Tao-Ku 林哲生 Lin, Che-Sheng |
口試日期: | 2022/08/17 |
學位類別: |
碩士 Master |
系所名稱: |
資訊工程學系 Department of Computer Science and Information Engineering |
論文出版年: | 2022 |
畢業學年度: | 110 |
語文別: | 中文 |
論文頁數: | 56 |
中文關鍵詞: | 區塊鏈 、零知識證明 、OTA 、智能合約 、以太坊 、隱藏資訊 |
研究方法: | 實驗設計法 、 比較研究 |
DOI URL: | http://doi.org/10.6345/NTNU202201362 |
論文種類: | 學術論文 |
相關次數: | 點閱:114 下載:14 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
隨著資訊化時代的來臨,網路上的資訊量有著爆炸性的成長,使得人們對於通訊相關軟體的使用需求愈趨增加,經過了逐年行動網際網路技術的蓬勃發展、進步,如智慧型手機、個人電腦等電子產品徹底成為了電子市場的主流硬體,已經與現今人們的生活有著密不可分的關係,不管是在學生時期又或是出社會工作每天幾乎都會接觸到電子產品,然而隨著手機上的應用程序與功能愈來愈多,為了確保使用者之資訊安全考量,各大公司通常會藉由OTA來發佈新的韌體版本以保障其客戶之資訊安全,因此OTA的需求也愈趨重要。儘管目前已有許多大公司致力於發展OTA技術,也已經有了相當成熟的功能以提供客戶使用,但現今尚有許多小公司無法支援如此大量的雲端更新系統,因此通常會委託一些大公司幫忙對其客戶做OTA服務並予以報酬,但不能保證每一次OTA委託皆有確實完成,所以要達到公平公正的論件計酬是非常困難的。
我們希望藉由加入近年來熱門的主題「零知識證明技術」結合了以太坊區塊鏈中的智能合約,實現出一個由Vendor建構的OTA服務系統,並藉由零知識證明的技術將IoT device的一些私密資訊隱藏起來,同時由代理商證明他已完成相關的委託任務,並生成一組特定的有效證明交由區塊鏈系統上的智能合約進行此proof之驗證,讓合約自動判斷此代理商是否有達到領取報酬之條件,一旦判斷條件皆符合Vendor所制定的條件,合約會將報酬自動轉入代理商的以太坊錢包位址,同樣的若是合約判斷代理商不符合領取報酬之條件,則合約會直接結束程式的執行,並由給出錯誤proof的代理商支付本次呼叫合約的手續費給礦工.以達成一個公平公正的OTA服務系統。
1. OTA update (over-the-air update)https://www.techtarget.com/searchmobilecomputing/definition/OTA-updateover-
the-air-update/.
2. Kexun, Changyuan, Yanyan & Xiyu (2020). Research on cyber security Technology and Test Method of OTA for Intelligent Connected Vehicle. Published
in: 2020 International Conference on Big Data, Artificial Intelligence and Internet
of Things Engineering (ICBAIE).
3. Aurora Labs - Vehicle Software Intelligence Available from: https://www.auroralabs.com/ota-ccg-lp-1/.
4. Wind River Software | Safe, Secure, Reliable Available from: https://www.windriver.com/company/.
5. OTAmatic Software Management – Airbiquity Available from: https://www.airbiquity.com/company/.
6. Leiba, Yitzchak, Bitton, Nadler & Shabtai (2018). Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution. Paper present in: 2018 IEEE European Symposium on Security and Privacy Workshops. (EuroS&PW). DOI: 10.1109/EuroSPW.2018.00011
7. CO6GC: Introduction to Zero-Knowledge Proofs https://www.esat.kuleuven.be/cosic/blog/co6gc-introduction-to-zero-knowledgeproofs-1/.
8. Zero-Knowledge Proofs: What is a zero-knowledge proof? Available from: https://zkp.science/.
9. Introduction to smart contracts - ethereum.org https://ethereum.org/en/developers/docs/smart-contracts/
10. Sebastián E. Peyrott, Auth0 Inc. (2017). An Introduction to Ethereum and Smart Contracts(pdf)
11. History | Micropayments: A Viable Business Model? https://cs.stanford.edu/people/eroberts/cs201/projects/2010-11/MicropaymentsAndTheNet/history.html/.
12. Merkle Tree: Implementation in java and its real world applications https://www.pranaybathini.com/2021/05/merkle-tree.html/.
13. Cryptography Hash functions https://www.tutorialspoint.com/cryptography/cryptography_hash_functions.htm/.
14. Introduction to Peer to Peer (P2P) Network – CodeSpot https://www.codespot.org/introduction-to-peer-to-peer-network/.
15. 詳解哈希樹-Merkle Tree(默克爾樹)算法解析 https://www.itread01.com/articles/1487247623.html/.
16. Satoshi Nakamoto (2008). Bitcoin: A Peer-to-Peer Electronic Cash System.
17. Bitcoin. Available from: https://www.bitcoin.com/.
18. Arthur Gervais, Ghassan Karame (2016). On the Security and Performance of Proof of Work Blockchains. Paper presented at the 2016 ACM SIGSAC Conference. DOI:10.1145/2976749.2978341
19. Blockchain’s Impossible Triangle: Decentralisation, Security, Scalability https://medium.com/@silvestrimichela.s/blockchains-impossible-triangle-decentralisation-
security-scalability-4571d9d30632/.
20. The Casper Network: A Dev-Friendly Enterprise Blockchain https://www.gemini.com/cryptopedia/casper-crypto-network-casper-blockchain-cspr/.
21. MetaMask: The crypto wallet for Defi, Web3 Dapps and NFTs Available from: https://metamask.io/.
22. ”加密貓”Available from: https://www.cryptokitties.co/.
23. RFC-8235, Schnorr Non-interactive Zero-Knowledge Proof. September 2017.
24. Maksym Petku (2019). Why and How zk-SNARK Works:Definitive Explanation.
25. Baza, Nabil, Lasla, Fidan, Mahmoud & Abdallah (2019). Blockchain-based Firmware Update Scheme Tailored for Autonomous Vehicles. Publish in IEEE 2019, Marrakesh, Morocco. DOI: 10.1109/WCNC.2019.8885769
26. Zcash: Privacy-protecting digital currency. Available from: https://z.cash/.
27. Hwang, G.-H. “區塊鏈擴容方案” International Trust Machines Corporation, Taipei, Taiwan.
28. ZK Rollup & Optimistic Rollup. Available from: https://reurl.cc/55jOOz/.
29. Tutorial - iden3 0.1 documentation circom and snarkjs https://iden3-docs.readthedocs.io/en/latest/iden3_repos/circom/TUTORIAL.html/.
30. Iden3 - snarkjs & Circom Available from: https://github.com/iden3/snarkjs/.
31. Introduce Merkle trees and inclusion proofs. Available from: https://research.lisk.com/t/introduce-merkle-trees-and-inclusion-proofs/
213/.
32. RFC-8032, Edwards-Curve Digital Signature Algorithm (EdDSA). January 2017