{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T08:01:20Z","timestamp":1767168080983,"version":"build-2238731810"},"reference-count":33,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T00:00:00Z","timestamp":1605657600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U19A2081"],"award-info":[{"award-number":["U19A2081"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802270"],"award-info":[{"award-number":["61802270"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["SCU2018D018"],"award-info":[{"award-number":["SCU2018D018"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2019SCU12069"],"award-info":[{"award-number":["2019SCU12069"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["U19A2081"],"award-info":[{"award-number":["U19A2081"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["61802270"],"award-info":[{"award-number":["61802270"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["SCU2018D018"],"award-info":[{"award-number":["SCU2018D018"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2019SCU12069"],"award-info":[{"award-number":["2019SCU12069"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,11,18]]},"abstract":"<jats:p>Data transmission exists in almost all the Internet-based applications, while few of them consider the property of nonrepudiation as part of data security. If a data transmission scheme is performed without the endorsement of a trusted third party (TTP) or a central server, it is easy to raise disputes while transmitting valuable data, especially digital goods, because a dishonest participant can deny the fact of particular data transmission instance. The above problem can be solved by signing and encrypting. However, digital signature schemes usually assume public key infrastructure (PKI), increasing the burden on certificate management and are not suitable for distributed networks without TTP such as blockchain. To solve the above problems, we propose two new schemes for nonrepudiation data transmission based on blockchain (we call it BNRDT): one for short message transmission and the other for large file transmission. In BNRDT schemes, nonrepudiation evidence of data transmission is generated and stored on the blockchain to satisfy both the properties of nonrepudiation (including nonrepudiation of origin and nonrepudiation of receipt) and data confidentiality. We implement and test the schemes on Hyperledger Fabric. The experimental results show that the proposed schemes can provide appealing performance.<\/jats:p>","DOI":"10.1155\/2020\/8828984","type":"journal-article","created":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T21:20:28Z","timestamp":1605734428000},"page":"1-16","source":"Crossref","is-referenced-by-count":2,"title":["BNRDT: When Data Transmission Meets Blockchain"],"prefix":"10.1155","volume":"2020","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6352-5806","authenticated-orcid":true,"given":"Hongjian","family":"Jin","sequence":"first","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu 610065, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8705-2617","authenticated-orcid":true,"given":"Xingshu","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu 610065, China"},{"name":"Cybersecurity Research Institute, Sichuan University, Chengdu 610065, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4091-5569","authenticated-orcid":true,"given":"Xiao","family":"Lan","sequence":"additional","affiliation":[{"name":"Cybersecurity Research Institute, Sichuan University, Chengdu 610065, China"}]},{"given":"Hui","family":"Guo","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Cryptology, P.O. Box 5159, Beijing 100878, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2832-2450","authenticated-orcid":true,"given":"Hongxia","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu 610065, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9337-5164","authenticated-orcid":true,"given":"Qi","family":"Cao","sequence":"additional","affiliation":[{"name":"College of Cybersecurity, Sichuan University, Chengdu 610065, China"}]}],"member":"311","reference":[{"key":"1","volume-title":"Information Technology: Security Techniques, Non-Repudiation\u2014Part 1","author":"ISO\/IEC 13888-1:2009","year":"2009"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35515-3_28"},{"key":"3","doi-asserted-by":"crossref","article-title":"Continuous certification of non-repudiation in cloud storage services","author":"M. Krotsiani","DOI":"10.1109\/TrustCom.2014.122"},{"key":"4","article-title":"A fair non-repudiation protocol","author":"J. Zhou"},{"key":"5","article-title":"An efficient non-repudiation protocol","author":"J. Zhou"},{"key":"6","article-title":"Investigation of non-repudiation protocols","author":"Y. Han"},{"key":"7","article-title":"Probabilistic non-repudiation without trusted third party","author":"O. Markowitch"},{"key":"8","first-page":"1","volume-title":"A New Approach to Enforcing Non-Repudiation of Receipt","author":"J. Mitsianis","year":"2001"},{"key":"9","doi-asserted-by":"crossref","article-title":"A blockchain-based solution for enabling log-based resolution of disputes in multi-party transactions","author":"L. Aniello","DOI":"10.1007\/978-3-319-70578-1_6"},{"key":"10","article-title":"TLS-N: non-repudiation over TLS enablign ubiquitous content signing","author":"R. Hubert"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/tii.2019.2897133"},{"key":"12","article-title":"A dispute arbitration protocol based on a peer-to-peer service contract management scheme","author":"J. Zou"},{"key":"13","volume-title":"Secure Multi-Party Non-Repudiation Protocols and Applications","author":"J. A. Onieva","year":"2008","edition":"1st"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/s0140-3664(02)00049-x"},{"key":"15","unstructured":"NakamotoS.Bitcoin: a peer-to-peer electronic cash system2008Cambridge, MA, USAAcademic PressTechnical report"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/9060756"},{"key":"17","volume-title":"PBFT vs. Proof-of-Authority: Applying the Cap Theorem to Permissioned Blockchain","author":"S. De Angelis"},{"issue":"2","key":"18","article-title":"Smart contracts: building blocks for digital markets","volume":"18","author":"N. Szabo","year":"1996","journal-title":"EXTROPY: The Journal of Transhumanist Thought"},{"key":"19","first-page":"1","article-title":"Ethereum: a secure decentralised generalised transaction ledger","volume":"151","author":"G. Wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"20","doi-asserted-by":"crossref","article-title":"Hyperledger fabric: a distributed operating system for permissioned blockchains","author":"E. Androulaki","DOI":"10.1145\/3190508.3190538"},{"key":"21","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/978-1-4842-2535-6_4","article-title":"Solidity programming","volume-title":"Introducing Ethereum and Solidity","author":"C. Dannen","year":"2017"},{"key":"22","volume-title":"The GO Programming Language","author":"R. Pike","year":"2009"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/mic.2010.145"},{"key":"24","article-title":"A digital signature based on a conventional encryption function","author":"R. C. Merkle"},{"key":"25","doi-asserted-by":"crossref","article-title":"Decentralised runtime monitoring for access control systems in cloud federations","author":"M. S. Ferdous","DOI":"10.1109\/ICDCS.2017.178"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2020.2976697"},{"key":"27","doi-asserted-by":"crossref","article-title":"Secure multiparty computations on bitcoin","author":"M. Andrychowicz","DOI":"10.1109\/SP.2014.35"},{"key":"28","doi-asserted-by":"crossref","article-title":"Fairswap: how to fairly exchange digital goods","author":"S. Dziembowski","DOI":"10.1145\/3243734.3243857"},{"issue":"2","key":"29","first-page":"289","article-title":"Blockchain empowered arbitrable data auditing scheme for network storage as a service","volume":"13","author":"Y. Xu","year":"2019","journal-title":"IEEE Transactions on Services Computing"},{"key":"30","article-title":"On-the-fly verification of rateless erasure codes for efficient content distribution","author":"M. N. Krohn"},{"key":"31","doi-asserted-by":"crossref","DOI":"10.1201\/b17668","volume-title":"Introduction to Modern Cryptography","author":"J. Katz","year":"2014","edition":"2nd"},{"key":"32","doi-asserted-by":"crossref","article-title":"Non-interactive and information-theoretic secure verifiable secret sharing","author":"T. P. Pedersen","DOI":"10.1007\/3-540-46766-1_9"},{"key":"33","article-title":"Hyperledger caliper architecture","author":"H. Caliper","year":"2019"}],"updated-by":[{"DOI":"10.1155\/2021\/9814372","type":"corrigendum","label":"Corrigendum","source":"publisher","updated":{"date-parts":[[2021,7,17]],"date-time":"2021-07-17T00:00:00Z","timestamp":1626480000000}}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8828984.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8828984.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8828984.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T21:20:38Z","timestamp":1605734438000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8828984\/"}},"subtitle":[],"editor":[{"given":"Chenquan","family":"Gan","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,11,18]]},"references-count":33,"alternative-id":["8828984","8828984"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8828984","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"value":"1939-0122","type":"electronic"},{"value":"1939-0114","type":"print"}],"subject":[],"published":{"date-parts":[[2020,11,18]]}}}