Resource Type

Journal Article 5

Year

2022 3

2020 1

2011 1

Keywords

Decentralization 2

decentralization 2

Blockchain 1

Data decentralization 1

Data management 1

Domain shift 1

Lattices 1

Longgang River basin 1

Multi-source domain adaptation 1

Negative transfer 1

Post-quantum cryptography 1

Privacy 1

Robustness 1

Shenzhen 1

Threshold proxy re-encryption 1

Transparency 1

blockchain technology 1

integrated river basin management (IRBM) model 1

risk management 1

smart contract 1

open ︾

Search scope:

排序: Display mode:

Integrated river basin management in rapidly urbanizing areas: a case of Shenzhen, China

Lei LIU, Xiaoming MA

Frontiers of Environmental Science & Engineering 2011, Volume 5, Issue 2,   Pages 243-254 doi: 10.1007/s11783-010-0276-0

Abstract: The problems with the current management system include the lack of decentralization in decision-making

Keywords: integrated river basin management (IRBM) model     Longgang River basin     Shenzhen     decentralization     stakeholder    

Blockchain-driven supply chain finance solution for small and medium enterprises

Jian LI, Shichao ZHU, Wen ZHANG, Lean YU

Frontiers of Engineering Management 2020, Volume 7, Issue 4,   Pages 500-511 doi: 10.1007/s42524-020-0124-2

Abstract: Blockchain has attracted much attention in recent years with the development of cryptocurrency and digital assets. As the underlying technology of cryptocurrency, blockchain has numerous benefits, such as de-centralization, collective maintenance, tamper-resistance, traceability, and anonymity. The potential of the blockchain technology (BT) is widely recognized in the financial field. Although some scholars have proposed the combination of blockchain and supply chain finance (SCF), the details of this combination is rarely mentioned. This study first analyzes the coupling between SCF and blockchain technology. Second, the conceptual framework of blockchain-driven SCF platform (BcSCFP) is presented. Third, the operation process of three SCF models on the BcSCFP is proposed. Finally, a case study combined with actual events is conducted. This paper has a positive practical significance in the operation and management of banks and loan enterprises.

Keywords: blockchain technology     supply chain finance     risk management     smart contract     decentralization    

Dual collaboration for decentralized multi-source domain adaptation Research Article

Yikang WEI, Yahong HAN

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 12,   Pages 1780-1794 doi: 10.1631/FITEE.2200284

Abstract: The goal of decentralized is to conduct unsupervised in a scenario. The challenge of is that the source domains and target domain lack cross-domain collaboration during training. On the unlabeled target domain, the target model needs to transfer supervision knowledge with the collaboration of source models, while the domain gap will lead to limited adaptation performance from source models. On the labeled source domain, the source model tends to overfit its domain data in the scenario, which leads to the problem. For these challenges, we propose dual collaboration for decentralized by training and aggregating the local source models and local target model in collaboration with each other. On the target domain, we train the local target model by distilling supervision knowledge and fully using the unlabeled target domain data to alleviate the problem with the collaboration of local source models. On the source domain, we regularize the local source models in collaboration with the local target model to overcome the problem. This forms a dual collaboration between the decentralized source domains and target domain, which improves the domain adaptation performance under the scenario. Extensive experiments indicate that our method outperforms the state-of-the-art methods by a large margin on standard datasets.

Keywords: Multi-source domain adaptation     Data decentralization     Domain shift     Negative transfer    

Blockchain for Transparent Data Management Toward 6G Article

Xuemin (Sherman) Shen, Dongxiao Liu, Cheng Huang, Liang Xue, Han Yin, Weihua Zhuang, Rob Sun, Bidi Ying

Engineering 2022, Volume 8, Issue 1,   Pages 74-85 doi: 10.1016/j.eng.2021.10.002

Abstract:

The wealth of user data acts as a fuel for network intelligence toward the sixth generation wireless networks (6G). Due to data heterogeneity and dynamics, decentralized data management (DM) is desirable for achieving transparent data operations across network domains, and blockchain can be a promising solution. However, the increasing data volume and stringent data privacy-preservation requirements in 6G bring significantly technical challenge to balance transparency, efficiency, and privacy requirements in decentralized blockchain-based DM. In this paper, we propose blockchain solutions to address the challenge. First, we explore the consensus protocols and scalability mechanisms in blockchains and discuss the roles of DM stakeholders in blockchain architectures. Second, we investigate the authentication and authorization requirements for DM stakeholders. Third, we categorize DM privacy requirements and study blockchain-based mechanisms for collaborative data processing. Subsequently, we present research issues and potential solutions for blockchain-based DM toward 6G from these three perspectives. Finally, we conclude this paper and discuss future research directions.

Keywords: Blockchain     Data management     Decentralization     Transparency     Privacy    

Identity-based threshold proxy re-encryption scheme from lattices and its applications Research Articles

Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 2,   Pages 258-277 doi: 10.1631/FITEE.2000366

Abstract: (TPRE) can prevent collusion between a single proxy and a delegatee from converting arbitrary files against the wishes of the delegator through multiple proxies, and can also provide normal services even when certain proxy servers are paralyzed or damaged. A non-interactive identity-based TPRE (IB-TPRE) scheme over is proposed which removes the public key certificates. To accomplish this scheme, Shamir‘s secret sharing is employed twice, which not only effectively hides the delegator‘s private key information, but also decentralizes the proxy power by splitting the re-encryption key. means that a combiner can detect a misbehaving proxy server that has sent an invalid transformed ciphertext share. This property is achieved by lattice-based fully homomorphic signatures. As a result, the whole scheme is thoroughly capable of resisting quantum attacks even when they are available. The security of the proposed scheme is based on the decisional learning with error hardness assumption in the standard model. Two typical application scenarios, including a file-sharing system based on a blockchain network and a robust key escrow system with threshold cryptography, are presented.

Keywords: Post-quantum cryptography     Threshold proxy re-encryption     Lattices     Robustness     Decentralization    

Title Author Date Type Operation

Integrated river basin management in rapidly urbanizing areas: a case of Shenzhen, China

Lei LIU, Xiaoming MA

Journal Article

Blockchain-driven supply chain finance solution for small and medium enterprises

Jian LI, Shichao ZHU, Wen ZHANG, Lean YU

Journal Article

Dual collaboration for decentralized multi-source domain adaptation

Yikang WEI, Yahong HAN

Journal Article

Blockchain for Transparent Data Management Toward 6G

Xuemin (Sherman) Shen, Dongxiao Liu, Cheng Huang, Liang Xue, Han Yin, Weihua Zhuang, Rob Sun, Bidi Ying

Journal Article

Identity-based threshold proxy re-encryption scheme from lattices and its applications

Liqiang WU, Yiliang HAN, Xiaoyuan YANG, Minqing ZHANG,latticewj@163.com,hanyil@163.com

Journal Article