Blockchain-based Educational Credential Sharing with Privacy Protection and Incentive Mechanism

Sida Huang*, Dongkun Hou, Zitian Peng, Jie Zhang, Yuji Dong

*Corresponding author for this work

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

Abstract

Electronic sharing of educational credentials typically involves multiple independent institutions. To mitigate trust issues among these institutions, blockchain technology has been leveraged to create a decentralized data-sharing system. However, storing educational credentials on the blockchain introduces privacy concerns since the blockchain can be accessed by all nodes participating in the system. This paper addresses the privacy issue of blockchain-based educational credential sharing through the use of searchable encryption and proxy re-encryption. By employing these technologies, the confidentiality of students' credentials can be guaranteed while also enabling authorized searching. Additionally, a reputation-based consensus mechanism is designed to improve the efficiency of the system and motivate institutions to participate in the system.

Original languageEnglish
Title of host publication2024 4th International Conference on Educational Technology, ICET 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages234-238
Number of pages5
ISBN (Electronic)9798350376944
DOIs
Publication statusPublished - 2024
Event4th International Conference on Educational Technology, ICET 2024 - Wuhan, China
Duration: 13 Sept 202415 Sept 2024

Publication series

Name2024 4th International Conference on Educational Technology, ICET 2024

Conference

Conference4th International Conference on Educational Technology, ICET 2024
Country/TerritoryChina
CityWuhan
Period13/09/2415/09/24

Keywords

  • Blockchain
  • Data Sharing
  • Educational Credential Sharing
  • Proxy Re-Encryption
  • Reputation Mechanism
  • Searchable Encryption

Fingerprint

Dive into the research topics of 'Blockchain-based Educational Credential Sharing with Privacy Protection and Incentive Mechanism'. Together they form a unique fingerprint.

Cite this