Open Access

Data Owner Rights Protection and Digital Identity Management Enabled by Blockchain

, , ,  and   
Feb 05, 2025

Cite
Download Cover

Figure 1.

Blockchain system architecture
Blockchain system architecture

Figure 2

Architecture design of data sharing rights protection system
Architecture design of data sharing rights protection system

Figure 3.

Application architecture design of data sharing rights protection
Application architecture design of data sharing rights protection

Figure 4.

Flowchart for encrypting shared files
Flowchart for encrypting shared files

Figure 5.

The protection of rights and interests can test the results
The protection of rights and interests can test the results

Figure 6.

The throughput comparison results of the four consensus algorithms
The throughput comparison results of the four consensus algorithms

Figure 7.

Hierarchy of the digital identity management system
Hierarchy of the digital identity management system

Figure 8

The total time of issuing certificates under different throughput
The total time of issuing certificates under different throughput

Figure 9.

Time cost varies with the number of signatures
Time cost varies with the number of signatures

The average time of a single voucher is time-consuming

Certificate quantity Mean time (ms)
Ours Hyrax Bulletproofs
100 61.95 91.17 89.03
500 69.91 96.45 85.7
700 60.27 94.53 89.87
1000 64.03 93.37 86.64
1500 66.21 97.46 82.58
Average (ms) 64.474 94.596 86.764

Authentication of the calculation overhead of the client and server

Time overhead (ms) Ours Hyrax Bulletproofs
User 6.09 3.89 3.31
Server 13.65 5.38 4.17
Language:
English