• ISSN 0258-2724
  • CN 51-1277/U
  • EI Compendex
  • Scopus
  • Indexed by Core Journals of China, Chinese S&T Journal Citation Reports
  • Chinese S&T Journal Citation Reports
  • Chinese Science Citation Database
Volume 58 Issue 1
Jan.  2023
Turn off MathJax
Article Contents
HONG Zhichao, LI Hui, ZHANG Jin, CHEN Haojie. Risk Evaluation Model of Blockchain Integration Based on CKKS Encryption Scheme[J]. Journal of Southwest Jiaotong University, 2023, 58(1): 100-108. doi: 10.3969/j.issn.0258-2724.20210082
Citation: HONG Zhichao, LI Hui, ZHANG Jin, CHEN Haojie. Risk Evaluation Model of Blockchain Integration Based on CKKS Encryption Scheme[J]. Journal of Southwest Jiaotong University, 2023, 58(1): 100-108. doi: 10.3969/j.issn.0258-2724.20210082

Risk Evaluation Model of Blockchain Integration Based on CKKS Encryption Scheme

doi: 10.3969/j.issn.0258-2724.20210082
  • Received Date: 28 Jan 2021
  • Rev Recd Date: 18 May 2021
  • Available Online: 30 Sep 2022
  • Publish Date: 26 May 2021
  • Aiming at solving problems of distrust in the data interaction between multiple parties and leakage of privacy data, an integrated risk assessment model based on the Cheon-Kim-Kim-Song (CKKS) fully homomorphic encryption scheme is proposed by using homomorphic encryption algorithm in combination with multiple assessment models for risk assessment. Firstly, the triangular fuzzy comprehensive evaluation method is used to determine weights of evaluation indexs, and a variety of evaluation methods are used to process the sample data in the distributed database to obtain the risk evaluation results of related nodes for the same transaction event. Secondly, the public key is used to encrypt the evaluation results, and then homomorphic operation is performed to obtain the encrypted comprehensive evaluation results, so as to avoid data leakage in the process of risk assessment. Thirdly, the private key is used to decode the evaluation results to obtain decrypted comprehensive evaluation results. Finally, 5000 samples from China Railway Express companies are taken as cases to evaluate the risk with eight common evaluation models, including the decision tree model, Adaboost model, Bagging model, ExtraTree model, gradient boosting regression tree (GBDT) model, K-nearest neighbor (KNN) model, random forest model, and support vector machine (SVM) model. In addition, the comprehensive evaluation results encrypted by CKKS scheme are compared with the results directly calculated by plaintext and encrypted by BFV scheme. The findings show that: the integrated risk assessment model is universal and applicable to more common assessment models; the error rates of the comprehensive evaluation results obtained by the integrated risk assessment model are small, within 10−9 against the actual results; compared with the result encrypted by BFV scheme, the error rate of the result encrypted by CKKS scheme is less than 1/100000 of the former, and the evaluation result is more accurate.

     

  • loading
  • [1]
    ELGHAISH F A K, ABRISHAMI S, HOSSEINI M R. Integrated project delivery with blockchain: an automated financial system[J]. Automation in Construction, 2020, 114(1): 209-224.
    [2]
    LIU H, ZHANG Y, YANG T. Blockchain-enabled security in electric vehicles cloud and edge computing[J]. IEEE Network, 2018, 32(3): 78-83. doi: 10.1109/MNET.2018.1700344
    [3]
    邰雪,孙宏斌,郭庆来. 能源互联网中基于区块链的电力交易和阻塞管理方法[J]. 电网技术,2016,40(12): 3630-3638.

    TAI Xue, SUN Hongbin, GUO Qinglai. Electricity transactions and congestion management based on blockchain in energy internet[J]. Power System Technology, 2016, 40(12): 3630-3638.
    [4]
    张宁,王毅,康重庆,等. 能源互联网中的区块链技术:研究框架与典型应用初探[J]. 中国电机工程学报,2016,36(15): 4011-4023.

    ZHANG Ning, WANG Yi, KANG Chongqing, et al. Blockchain technique in the energy Internet: preliminary research framework and typical applications[J]. Proceedings of the CSEE, 2016, 36(15): 4011-4023.
    [5]
    袁勇,王飞跃. 区块链技术发展现状与展望[J]. 自动化学报,2016,42(4): 481-494.

    YUAN Yong, WANG Feiyue. Blockchain: the state of the art and future trends[J]. Acta Automatica Sinica, 2016, 42(4): 481-494.
    [6]
    OMRAN Y, HENKE M, HEINES R, et al. Blockchain-driven supply chain finance: towards a conceptual framework from a buyer perspective[C]//2017: 26th Annual Conference of the International Purchasing and Supply Education and Research Association. Budapest: [s.n.], 2017: 1-15.
    [7]
    徐忠,邹传伟. 区块链能做什么、不能做什么?[J]. 金融研究,2018(11): 1-16.

    XU Zhong ZOU Chuanwei. What can blockchain do and cannot do?[J]. Journal of Financial Research, 2018(11): 1-16.
    [8]
    龚强,班铭媛,张一林. 区块链、企业数字化与供应链金融创新[J]. 管理世界,2021,37(2): 3,22-34. doi: 10.3969/j.issn.1002-5502.2021.02.004

    GONG Qiang, BAN Mingyuan, ZHANG Yilin. Blockchain, enterprise digitalization and supply chain finance innovation[J]. Journal of Management World, 2021, 37(2): 3,22-34. doi: 10.3969/j.issn.1002-5502.2021.02.004
    [9]
    RIVEST RL, ADLEMAN L M, DERTOUZOS M L. On databanks and privacy homomorphisms[J]. Foundations of Secure Computation, 1978, 76(4): 169-179.
    [10]
    GOLDWASSER S, MICALI S. Probabilistic encryption[J]. Journal of Computer and System Sciences, 1984, 28(2): 270-299. doi: 10.1016/0022-0000(84)90070-9
    [11]
    GENTRY C. Fully homomorphic encryption using ideal lattices[C]//In Proceedings of the Forty-First Annual ACM Symposium on Theory of computing, Association for Computing Machinery. New York: ACM Press, 2009: 169-178.
    [12]
    GENTRY C. A fully homomorphic encryption scheme[M]. Ann Arbor: [s.n.], 2009.
    [13]
    CHEON J H , KIM A , KIM M , et al. Homomorphic encryption for arithmetic of approximate numbers[C]//International Conference on the Theory and Application of Cryptology and Information Security. Hong Kong: Springer, 2017: 409-437.
    [14]
    郑尚文,刘尧,周潭平,等. 优化的基于错误学习问题的CKKS方案[J]. 计算机应用,2021,41(6): 1723-1728.

    ZHENG Shangwen, LIU Yao, ZHOU Tanping, et al. Optimized CKKS scheme based on learning with errors problem[J]. Journal of Computer Applications, 2021, 41(6): 1723-1728.
    [15]
    NAKASUMI M. Information sharing for supply chain management based on block chain technology[C]//2017 IEEE 19th Conference on Business Informatics. Thessaloniki: IEEE, 140-149.
    [16]
    刘彦松,夏琦,李柱,等. 基于区块链的链上数据安全共享体系研究[J]. 大数据,2020,6(5): 92-105.

    LIU Yansong, XIA Qi, LI Zhu, et al. Research on secure data sharing system based on blockchain[J]. Big Data Research, 2020, 6(5): 92-105.
    [17]
    钱萍,吴蒙. 同态加密隐私保护数据挖掘方法综述[J]. 计算机应用研究,2011,28(5): 1614-1617,1622. doi: 10.3969/j.issn.1001-3695.2011.05.004

    QIAN Ping, WU Meng. Survey of privacy preserving data mining methods based on homomorphic encryption[J]. Application Research of Computers, 2011, 28(5): 1614-1617,1622. doi: 10.3969/j.issn.1001-3695.2011.05.004
    [18]
    DU M X, CHEN Q J, XIAO J, et al. Supply chain finance innovation using blockchain[J]. IEEE Transactions on Engineering Management, 2020, 67(4): 1045-1058. doi: 10.1109/TEM.2020.2971858
    [19]
    王竹泉,宋晓缤,王苑琢. 我国实体经济短期金融风险的评价与研判——存量与流量兼顾的短期财务风险综合评估与预警[J]. 管理世界,2020,36(10): 156-170,216. doi: 10.3969/j.issn.1002-5502.2020.10.012

    WANG Zhuquan, SONG Xiaobin, WANG Yuanzhuo. Objective evaluation and rational judgment of short-term financial risk in China’s real economy: comprehensive assessment and early warning of short-term financial risk considering stock and flow[J]. Management World, 2020, 36(10): 156-170,216. doi: 10.3969/j.issn.1002-5502.2020.10.012
    [20]
    廖礼坤,张炜. 导入期风险企业的风险综合评价[J]. 西南交通大学学报,2004,39(5): 590-594. doi: 10.3969/j.issn.0258-2724.2004.05.008

    LIAO Likun, ZHANG Wei. Synthetical evaluation of risks of venture business during start-up period[J]. Journal of Southwest Jiaotong University, 2004, 39(5): 590-594. doi: 10.3969/j.issn.0258-2724.2004.05.008
    [21]
    龙云飞. 基于熵值法的中小企业供应链融资信用风险评价[J]. 统计与决策,2013(13): 177-179.
    [22]
    程昔武,丁忠明. 高校负债融资风险及其评价方法研究[J]. 财贸研究,2009,20(6): 131-138,152. doi: 10.3969/j.issn.1001-6260.2009.06.022

    CHENG Xiwu, DING Zhongming. Research on risk of debt financing to colleges & universities and it’s evaluating[J]. Finance and Trade Research, 2009, 20(6): 131-138,152. doi: 10.3969/j.issn.1001-6260.2009.06.022
    [23]
    曹清玮,戴丽芳,孙琪,等. 社会网络环境下基于分布式信任的在线评价方法[J]. 控制与决策,2020,35(7): 1697-1702.

    CAO Qingwei, DAI Lifang, SUN Qi, et al. A distributed trust based online evaluation under social network[J]. Control and Decision, 2020, 35(7): 1697-1702.
    [24]
    仇文革,李俊松,胡兰,等. 基于WebGIS的地下工程安全风险管理系统[J]. 西南交通大学学报,2011,46(6): 953-959,965. doi: 10.3969/j.issn.0258-2724.2011.06.011

    QIU Wenge, LI Junsong, HU Lan, et al. WebGIS-based safety risk management system of underground engineering[J]. Journal of Southwest Jiaotong University, 2011, 46(6): 953-959,965. doi: 10.3969/j.issn.0258-2724.2011.06.011
    [25]
    胡兰,胡培. 基于概率论-逻辑学的隧道各方关系与风险研究[J]. 西南交通大学学报,2013,48(6): 1122-1128. doi: 10.3969/j.issn.0258-2724.2013.06.024

    HU Lan, HU Pei. Relation and risk in owner and contractors of tunnel projects based on probability and logic theories[J]. Journal of Southwest Jiaotong University, 2013, 48(6): 1122-1128. doi: 10.3969/j.issn.0258-2724.2013.06.024
    [26]
    何正友,冯玎,林圣,等. 高速铁路牵引供电系统安全风险评估研究综述[J]. 西南交通大学学报,2016,51(3): 418-429. doi: 10.3969/j.issn.0258-2724.2016.03.002

    HE Zhengyou, FENG Ding, LIN Sheng, et al. Research on security risk assessment for traction power supply system of high-speed railway[J]. Journal of Southwest Jiaotong University, 2016, 51(3): 418-429. doi: 10.3969/j.issn.0258-2724.2016.03.002
    [27]
    吴波前,蔡伯根,陆德彪,等. 基于GNSS/INS的列车定位风险评估方法[J]. 西南交通大学学报,2020,55(6): 1191-1198. doi: 10.3969/j.issn.0258-2724.20190981

    WU Boqian, CAI Baigen, LU Debiao, et al. GNSS/INS based risk assessment in train localization[J]. Journal of Southwest Jiaotong University, 2020, 55(6): 1191-1198. doi: 10.3969/j.issn.0258-2724.20190981
    [28]
    刘曙阳. CI 系统开发技术[M]. 北京: 国防工业出版社, 1997.
    [29]
    刘颖,张丽娟,韩亚男,等. 基于粒子群协同优化算法的供应链金融信用风险评价模型[J]. 吉林大学学报(理学版),2018,56(1): 119-125.

    LIU Ying, ZHANG Lijuan, HAN Yanan, et al. Financial credit risk evaluation model of supply chain finance based on particle swarm cooperative optimization algorithm[J]. Journal of Jilin University (Science Edition), 2018, 56(1): 119-125.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(7)  / Tables(5)

    Article views(488) PDF downloads(33) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return