<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Blockchain-Based Charitable Donation Privacy Protection Scheme 1</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Le Deng</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Shuxian Liu</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Huan Xu</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Wei Wang</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Wenzhong Yang</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>School of Information Science and Engineering of Xinjiang University</institution>
          ,
          <addr-line>Urumqi</addr-line>
          ,
          <country country="CN">China</country>
        </aff>
      </contrib-group>
      <fpage>76</fpage>
      <lpage>85</lpage>
      <abstract>
        <p>Blockchain has the characteristics of decentralization, tamper-proof, information traceability, openness and transparency, and has a good fit with charitable donations. Aiming at the problems of data center management, poor transparency and tampering in the existing charity traceability process, a secure sharing scheme of charity donation data based on blockchain is proposed. The scheme uses the blockchain to store the hash value, key and access policy of the encrypted data, and the original data is stored in IPFS(InterPlanetary File System), which ensures the privacy of users. A trust model based on reward and punishment mechanism is proposed to evaluate the trust value according to the behavior of nodes. Ciphertext policy attribute encryption technology combining trust and time attribute is used in smart contract to design data security sharing method. After evaluation and analysis, the scheme has the characteristics of openness and transparency, decentralization, and difficulty in tampering, which provides a new reference for solving the long-standing corruption problem in the charity field.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;blockchain</kwd>
        <kwd>charity</kwd>
        <kwd>access control</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1 Introduction</title>
      <p>In modern society, various charitable forces represented by charitable organizations have grown
rapidly, and social charitable awareness has been significantly enhanced. Charitable donations through
charitable organizations play an important role in national and regional responses to emergencies, such
as the Novel Coronavirus (Covid-19) epidemic, earthquakes, typhoons, floods and other disasters, as
well as social and public issues such as poverty alleviation, pensions, and diseases. With the disclosure
of various charitable scandals, problems in the process of charitable donations have been exposed to
the public one by one, such as the lack of credibility of charitable organizations, corruption of charitable
organizations, low transparency of information disclosure, and the inability to trace the use of donations,
which has led to scandals in the charitable industry. The public gradually lost trust in the charity industry.</p>
      <p>The emergence of blockchain brings hope to solve problems in the field of charity, everyone turns
their attention to promoting the transformation of public welfare into blockchain, hoping to use
blockchain to realize on-chain donations and information traceability. The features of blockchain, such
as decentralization, openness and transparency, information that cannot be tampered with and traceable,
and smart contracts, can perfectly solve the problems in philanthropy. Combining blockchain
technology with the public welfare system can effectively monitor the whereabouts of each donation,
forming a closed loop from fundraising to donation. Due to the characteristics of blockchain technology,
it is difficult to modify the data once recorded, which can greatly improve the public's trust in non-profit
organizations, so that non-profit organizations can self-certify their fairness and fairness, improve
transparency, and build credibility.</p>
      <p>
        In recent years, academics from around the world have performed substantial research on how to
address the problem of public distrust in philanthropic organizations. Basil D Z summary how might
cause-related marketing affect attitudes toward the charity involved[
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]; MD Diarmuid Analyzed the
characteristics of charities in charities to drive charitable accountability [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]; Inger Lyngdrup explores
when and why charity vanished from public relief in Copenhagen and thereby differentiates itself from
the traditional research field on welfare that focuses on studying the growth of taxation and social
spending in the 19th century[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]; Davidson S points to potential fraud by middlemen who oversee and
manage money[
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]; A. Farsya Kirana aims to examine the institutional mechanism and information
systems success factors that influence trust and distrust in the online donation platform and how it
influences attitude and online donation intention[
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Some scholars tries to propose a charitable
donation system combined with Internet technology,Hai-ying YU proposes a model of trust formation
in online charity information, rooted in the information processing theory [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]; Lanerolle proposes a
system that manages donations after investigating current disaster management system in Sri Lanka and
in several other countries which get affected by natural disasters frequently [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. D.Chhibber Virtualizing
Food Donation Distribution through Mobile Application and Cloud-Based Supply Chain
Management[
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Although the above methods have certain improvement effects, they have not changed
the problems existing in the traditional charitable donation process, and the credibility of charitable
undertakings is still low. With the development of blockchain technology, a type of solution has
emerged, namely blockchain + charity: Mohd Nor R proposed a decentralized, authentic and transparent
donation system to solve the problems of additional fees, information opacity and processing delays in
online donation platforms[9]. Wu H developing a reliable service system of charity donation loaded on
the blockchain to cope with the complex service needs of charities due to the COVID-19
epidemic[10];Farooq M S designed a blockchain-based charity management platform aiming to provide
a transparent, secure, auditable and efficient system[11].
      </p>
      <p>These methods make some improvements in the donation method, but they do not consider the
privacy information involved in the donation process, and the privacy information of participants is not
protected. We think attribute encryption can be used to protect privacy.Zhang X proposed a novel
blockchain-based architecture for data sharing with attribute-based cryptosystem (BaDS), the
architecture can achieve privacy-preserving,user-self-controlled data sharing, and decentralization by
using blockchain and several attribute-based cryptosystems[12]. Axin Wu In view of the efficiency of
ABE, the privacy protection of the attribute and the abuse of the secret key, the efficient and
privacypreserving traceable attribute-based encryption in blockchain is proposed[13]. Zhang X propose a
privacy-preserving and user-controlled architecture for data sharing based on blockchain system and
Ciphertext-Policy Attribute-Based Encryption (CP-ABE), called ThemisABE[14].</p>
      <p>In this paper,we proposes a charity foundation scheme based on blockchain,Our main contributions
are as follow:
• We propose a blockchain-based charity donation privacy protection scheme that aims to provide
a transparent, secure, auditable, and efficient system. At the same time,we established a trust
model for nodes, and a trust evaluation framework is proposed.
• Combining symmetric encryption with attribute encryption, we not only protect the
confidentiality of data, but also provide fine-grained access to data according to user roles and
attributes.
• We use the time attribute to automatically revocate the user’s attribute key, which solves the key
management problem existing in the ABE solution.</p>
    </sec>
    <sec id="sec-2">
      <title>2 Preliminaries</title>
    </sec>
    <sec id="sec-3">
      <title>2.1 Blockchain</title>
      <p>On October 31, 2008, Satoshi Nakamoto posted an article on the Cypherpunk mailing list entitled
"Bitcoin: A peer-to-peer Electronic Cash System, this paper points out the disadvantages of traditional
Electronic payment System and proposes an Electronic payment System based on cryptography instead
of credit. With the success of Bitcoin, blockchain, the underlying technology of bitcoin, has received
wide attention around the world. Blockchain is a new application mode of distributed data storage,
point-to-point transmission, consensus mechanism, encryption algorithm and other computer
technologies. Its essence is a decentralized database, which is a string of data blocks associated with
cryptography. Each data block contains a certain amount of transaction information, which is used to
verify the validity of its information and generate the next block. In a narrow sense, blockchain is a
distributed ledger that combines blocks of data in a sequential manner in chronological order, and is
cryptographically immutable and unforged. Broadly speaking, the block chain technology is to use the
piece of chain to verify the data structure and data storage and use of distributed node consensus
mechanism to generate and update the data, use cryptography ways to ensure the safety of data transmission
and access, use of intelligent automation scripts code contracts to programming and operating data of a
new kind of distributed infrastructure and calculation.</p>
    </sec>
    <sec id="sec-4">
      <title>2.2 Smart contract</title>
      <p>A smart contract is a computer protocol that runs programmatically on a blockchain and is
automatically validated, irreversible, and performed.The cryptographer Nick Szabo made the initial suggestion
in 1994.The goal is to reduce the reliance of traders on reliable third parties by converting traditional
contract terms into code and embedding them in hardware or software that can be implemented
autonomously.The development of practical smart contracts is now possible because to the advent of
blockchain technology and the availability of platforms for developing smart contracts built on high-level
languages like C++ and Solidity.A set of executable functions, state variables, and identifying addresses
make up a smart contract, which is essentially a state machine.Other users can start a transaction to the
specified contract by identifying the address, which activates the relevant execution function in the
specified contract, returns the execution result, and updates the status of the contract. This happens after
the contract deployer has specified the pertinent permission confirmation logic and uploaded the
compiled contract to the blockchain.As a result, smart contracts increase the computing power of
blockchains and enable developers to govern and control data on the chain using logical operations.
2.3</p>
    </sec>
    <sec id="sec-5">
      <title>Attribute-based encryption</title>
      <p>In order to enable one-to-many data sharing, the attribute encryption mechanism uses a number of
user attributes as identity identifiers and defines an access policy that corresponds to a set of attributes.
The ciphertext corresponds to an access control structure, and the key corresponds to a set of attributes.
The decryption succeeds only when the attributes of the access user meet the corresponding access
control structure.</p>
    </sec>
    <sec id="sec-6">
      <title>3 Proposed scheme</title>
    </sec>
    <sec id="sec-7">
      <title>3.1 System model</title>
      <p>The charity foundation system model proposed in this paper is mainly composed of users, non-profit
organizations(NPO), regulatory organizations, logistics enterprises, consortium blockchain and IPFS,
as shown in Figure 1.</p>
      <p>1) User</p>
      <p>Users can be divided into donor and beneficiary, and users can choose their identity after
registering.Donor can donate according to their personal wishes and set up access policies for personal privacy
information.The beneficiary submits help information in the system.</p>
      <p>2) Non-Profit Organizations</p>
      <p>The subject trusted by users will generate donation projects according to the information submitted
by the beneficiary, formulate use plans for the donations and materials received by the project, and
collect feedback information.</p>
      <p>3) Regulatory organization</p>
      <p>Responsible for the distribution of relevant certificates to users who apply for registration, and as
the supervision department of donation process, to supervise and manage non-profit organizations.
4) Logistics enterprises
Provide material transportation services for the NPOs, returning details of transportation.
5) Consortium Blockchain</p>
      <p>The consortium blockchain consists of a number of non-profit organizations and regulatory
organizations that jointly maintain the blockchain. Donation metadata is stored in the consortium blockchain
to prevent data from being maliciously tampered with or corrupted.</p>
      <p>6) IPFS</p>
      <p>Store the original data of the donation information and generate the hash address of the original data.</p>
    </sec>
    <sec id="sec-8">
      <title>3.2 Trust model based on reward and punishment mechanism</title>
      <p>Blockchain generally uses peer-to-peer network(P2P) as a network mode, in P2P network, users can
share information freely, but the characteristics of openness and anonymity provide convenience for
malicious nodes lacking sense of responsibility to abuse the network. Aiming at the problem of
malicious nodes in the network, a trust model for nodes is established, and a trust evaluation framework is
proposed by taking reputation, scale and transparency of nodes as trust factors. We introduces reward
and punishment mechanism, transparency report index and Zhongji transparency index FTI(China
Foundation Transparency index) as an intuitive evaluation system to optimize the existing charity model
and improve the trust model.</p>
      <p>In the scheme, the nodes are divided into user nodes and organization nodes. The user node is a
network node used by user, and only one trust factors, namely the reputation of the node, need to be
considered for personal use. Institutional nodes are used by NPO, supervisory agencies and logistics
enterprises respectively. The credit factors of supervisory agencies and logistics enterprises Only
consider reputation a trust factor, while NPO also consider scale and transparency on the basis of reputation.
An initial reputation value will be assigned to each node during initialization, both users and
organizations have the function of reporting. When users or organizations have malicious behavior, they can
expose malicious behavior through the reporting function. When the malicious behavior is verified
successfully, the whistleblower will gain reputation, and the reputation of the malicious user will be
reduced by 10 points, Minimum trust value is 0. The reputation of the user will be increased by 1 point
for every normal donation or assistance completed; the reputation of the institution will be increased by
1 point for every 10 normal projects completed, Trust value up to 100.</p>
      <p>The network provides a new channel for the development of philanthropy, provides a platform for
NPO, establishes and enhances the relationship between NPO and donors, volunteers and beneficiary.
• reputation is one of the important factors affecting the charity industry. Whether individuals or
organizations, good reputation has a positive effect on them and can establish trust relationships.
This scheme is evaluated according to the behavior of nodes in the network, and the reputation
value is always in the range of 0-100. Initialization assigns an initial reputation value to each
node, according to the behavior of the node in the system to enhance or reduce the reputation
value r, the trust value Tr based on reputation can be expressed as :</p>
      <p>Tr = 10 ×</p>
      <p>，r ∈ 0,100
•</p>
      <p>100
scale is a trust factor that NPO need to consider. The size of the NPO will affect users’ judgment.
Users who lack donation experience will be easy to choose larger NPO, and believe that their
1
r
services and processes are more standardized. This scheme determines the size of the
organization according to the information submitted by the NPO when it is registered. The determination
of the size is mainly based on the two factors of organizational assets A and the number of
employees S. Classification of assets, every ten times a score, 100000 level is 0-2, million level
is 2-4, 10 million level is 4-6, billion level is 6-8, billion and above is 8-10 ; the classification of
the number of employees is similar, with 0 – 2 in individual level, 2 – 4 in 10 level, 4 – 6 in 100
level, 6 – 8 in thousand level and 8 – 10 in thousand level. The trust value Ts based on scale can
be expressed as :</p>
      <p>Ts = A × 50% + S × 50%
2
Donor tend to trust NPO with high transparency. After entering the era of online philanthropy,
it is easy for the public to obtain donation information, but the information disclosure is not good.
Information disclosure includes basic information disclosure, fundraising information disclosure,
project implementation information disclosure, financial information disclosure, daily
disclosure, and disclosure channels / frequencies. This scheme calculates the trust value Tp based on
transparency according to the China Charity Transparency Report Index issued by the China
Charity Donation Information Center under the Ministry of Civil Affairs, the ranking index of
China ' s most transparent charitable foundation, the development of the foundation center
network, and the ' Central Fund Transparency Index ' FTI provided by the Center for Integrity and
Governance Research of Tsinghua University. For fair selection of data in recent three years,
the average values are calculated to be i1, i2 and i3, which can be expressed as :</p>
      <p>Tp = i1 × 20% + i2 × 30% + i3 × 50%
The trust value calculation of node: based on the four trust factors of network capability,
reputation, scale and transparency, the trust value of any node k in the network is defined as Tk, and
the user node does not consider the scale Ts and transparency Tp, which can be expressed as:
3
4</p>
      <p>Tr × 0.4 + Ts × 0.2 + Tp × 0.4, Tr ≥ 6</p>
      <p>Tk = −Tr × 0.4 + Ts × 0.2 + Tp × 0.4, Tr &lt; 6</p>
      <p>The weight coefficient in this scheme is set according to the network and the actual situation. Nodes
with reputation value greater than or equal to 6 can receive the gain from reputation, and the trust
evaluation score is higher. Nodes with reputation value less than 6 are punished, which reduces their
trust value.
3.3</p>
    </sec>
    <sec id="sec-9">
      <title>Donation data access control</title>
      <p>It is composed of four stages of system initialization, data encryption, data storage, and data access.
In this process, in order to improve encryption efficiency, the symmetric encryption algorithm SM4 and
CP-ABE are combined, and the original data is encrypted using the symmetric encryption algorithm,
and then the symmetric key is encrypted with the CP-ABE algorithm, which realizes fine-grained access
control while ensuring data confidentiality.</p>
    </sec>
    <sec id="sec-10">
      <title>3.3.1 System initialization</title>
      <p>Execute the initialization algorithm of the property-based encryption to initialize the system's
parameters and produce the system's master key MK and common parameter PK. The user initiates a
registration request to the regulator and submits the identity information Infouser (nickname, ID number,
name, contact information, etc.), and after the regulator verifies the identity information, a
public-private key pair (Pubuser ,Priuser) and a certificate Certuser representing his identity are generated. The
collection of attributes Auser is determined based on the identification data that the user has provided, and
the regulator then provides the user the public-private key pair, identity certificate, and attribute
collection through a secure channel.</p>
      <p>Procedure init:</p>
    </sec>
    <sec id="sec-11">
      <title>3.3.2 Data encryption</title>
      <p>The random key K(K= k1 ⊗ k2) for symmetric encryption is calculated when the data owner uploads
the donated material after first generating two random keys, k1 and k2. To ensure the safe keeping of
the original data file, the SM4 symmetric encryption technique uses K as the encryption key. Fileenc is
used to represent the encrypted file. The original data file is computed using the SHA256 technique to
get the file hash value, which is represented by filehash, before the original data is encrypted. The final
access control policy is composed of attributes, a trust value interval, and a time interval, and is created
by the data owner. The final access control policy' and the generated public parameter PK are used as
the input of the encryption algorithm of CP-ABE scheme. Attribute encryption is performed on k2 to
obtain the encrypted ciphertext Cenc(k2),only when the user's attribute set meets the access control
policy, k2 can be obtained.</p>
      <p>Procedure encrypt:</p>
    </sec>
    <sec id="sec-12">
      <title>3.3.3 Data storage</title>
      <p>The IPFS contains the original data file that has been symmetrically encrypted by the data owner.
The IPFS returns a distinct storage address Addr, which is then symmetrically encrypted to produce
Enc(Addr). The client creates a transaction record using the Fabric SDK and stores it in a new
blockchain block along with the original data hash filehash, the key Cenc(k2) encrypted by the attribute base,
the encrypted IPFS file system storage address Enc(Addr), and the description M taken from the donated
data, then broadcast to other nodes on the chain to reach a consensus to complete the information on
the chain, description information including project name, project number, donor, donation information.</p>
      <p>Procedure storage:</p>
    </sec>
    <sec id="sec-13">
      <title>3.3.4 Data access</title>
      <p>The data owner encrypts the data in accordance with the attributes, trust values, and access duration
of the access request if a data accessor wishes to know specific details about donated data. Data accessor
can access the blockchain records and retrieve the encrypted file storage address Enc(Addr), original
data hash value filehash, and key encrypted by characteristics Cenc(k2). The contributed data ciphertext
can only be obtained by data accessor when their attributes align with the access policy and access
window established by the data owner.</p>
      <p>In this scheme, smart contract and CPABE are combined to realize access control with time
dimension, and three functions are designed to realize access control with time dimension. The steps to access
the data are as follows:
• The data accessor sends a request to the data owner that contains the public key Pubuser, the
duration [ts,te], and the digital certificate Certuser.
• After receiving the access request, the data owner first verifies the identity of the data accessor,
and then sends k1 encrypted with the public key of the data accessor to the data accessor.
• The data accessor uses the attribute KeyGeneration algorithm KeyGeneration(MK, S) to
generate the user's attribute private key SKuser, S includes the user attribute set Auser, the trust value,
and the timestamp of sending the request.</p>
      <p>S = Auser ∪ Tk ∪ Time
5
•
•</p>
      <p>After obtaining the encrypted ciphertext data, the data accessor uses the public parameter PK,
the attribute private key SKuser, and the ciphertext Cenc(k2) as the input of decrypt algorithm
Decrypt(PK,SKuser, Cenc(k2)). If the data accessor attributes meet the access policy, the key k2
in plaintext is output. The key K= k1 ⊗ k2 can be calculated. The user can decrypt the encrypted
file according to the obtained storage address Enc(Addr) to obtain Addr, then obtain the original
ciphertext fileenc from IPFS according to the address, and call SM4 decryption algorithm,the
symmetric key K and the original ciphertext fileenc are used as input to decrypt the ciphertext
fileenc for get the original data file. SHA256 algorithm is used to hash the decrypted file, and
the hash value of the file is obtained, which is compared with the hash value saved in the
blockchain. If the hash values are the same, the files are not tampered with and the data query succeeds.
Otherwise, the file is tampered with or damaged, and the data query fails.</p>
      <p>In order to prevent a data accessor that does not comply with the access policy from still using
the previous attribute private key to access the data, if the trust value of the data accessor is
reduced and is not within the trust value range set by the data owner, when the attributes of a
user are found to be changed, the attribute set will be regenerated, and the attribute key will be
regenerated when applying to access data.</p>
      <p>Procedure access:</p>
      <p>In this scheme, combined with a variety of Internet technologies such as blockchain, SM4, CPABE,
IPFS, a charity donation model based on blockchain is constructed, the upstream and downstream
information involved in the donation process is incorporated into the consortium blockchain. The
transaction data are uploaded to the blockchain, which makes the transaction data open and transparent by
using the characteristics of untamperable and traceable blockchain, and effectively solves the problems
of easy data tampering and poor transparency in the process of traditional charitable donations.
4.1 Safety analysis</p>
      <p>1) data confidentiality: Most of the data stored in the chain are encrypted ciphertext data, such as
original file ciphertext, storage address, symmetric key of attribute encryption, file hash value, etc. Even
if a malicious user gets the k2 stored on the blockchain, k1 is only available to data accessor and cannot
calculate the file encryption key K. Moreover, even if the accessor has a key k1 without access to the
data, he cannot get the key K2. Therefore, data confidentiality is protected.</p>
      <p>2) data integrity: In this scheme, the data integrity is reflected in two aspects. One is the
untamperability of blockchain. The Merkle tree and block connection of blockchain make it impossible for
malicious users to modify the data stored in blockchain at will, unless more than 51 % of the nodes in the
whole network are tampered with, it is almost impossible in a large blockchain. Second, the original
data integrity verification. The hash value is calculated before the encryption of the original data. Due
to the uniqueness of the hash value, when the user finally gets the ciphertext and decrypts it, the
comparison of the hash value can verify whether the original file is tampered with and ensure the integrity
of the data.</p>
      <p>3) privacy protection: The donation metadata is stored on the chain, and the original data is stored
on the IPFS to ensure the scalability and security of data storage. NPO encrypt donation data according
to the access strategy set by data owners. When data are accessed, the owner sets the access period for
the accessor. Only the accessor who satisfies the access strategy can view the complete donation data
within the set time range, which fully guarantees the privacy of the donation data.</p>
    </sec>
    <sec id="sec-14">
      <title>4.2 Performance analysis</title>
      <p>In order to accurately evaluate the actual performance of the scheme, the operating system of this
paper is the virtual machine Ubuntu 18.04.5 installed on VMware Workstation Pro. The experimental
hardware environment is AMD Ryzen 54600H CPU @ 3.00 GHz, and the memory is 16 GB. Using
python language, based on openssl, gmssl, PBC library simulation test, test performance of scheme.</p>
      <p>The scheme proposed in this paper is characterized by the combination of symmetric encryption and
attribute encryption, encryption overhead is mainly reflected in the two encryption process. Therefore,
the performance test in this paper is mainly to test the performance of the two encryption methods, and
the final total encryption and decryption overhead is the time superposition of the two encryption
methods. As shown in Figure 2, this paper tests AES, DES, SM4 three symmetric encryption algorithms,
and selects different sizes of files for encryption. It can be seen that the encryption performance of the
three algorithms is determined by the size of the original data. The larger the original data, the longer
the encryption time. After considering the two factors of efficiency and security, SM4 is selected as the
symmetric encryption method in this paper.</p>
      <p>Figure 3 shows the encryption and decryption time under different number of attributes. The size of
encrypted files is determined, which does not affect the encryption and decryption time. The number of
attributes is taken as a variable, and the number of attributes used for encryption and decryption is
increased from 5 to 50, with an increment of 5 for each time. It is observed that the encryption and
decryption time increases with the increase of the number of attributes, but the time used is not more
than the second level, indicating that the data can be secured and the data can be obtained in time.</p>
    </sec>
    <sec id="sec-15">
      <title>5 Conclusion</title>
      <p>This paper proposes a scheme for charitable donations, with the help of the characteristics of
traceability and untamperability of blockchain, the whole process of donation is guaranteed to be open,
transparent and traceable. IPFS is used to expand the storage capacity of blockchain, and the basic
architecture of storing metadata on the chain and storing original data under the chain are designed. In
view of the problem of data information leakage, combined with symmetric encryption and attribute
encryption technology, an access control scheme based on block chain with time attribute is constructed
to realize the fine-grained access control of data by data owners. The time attribute is introduced to
make the access authorization without additional revocation cost. In the future, algorithm efficiency
and consensus protocol will be our research direction. This work was supported in part by the National
Nature Science Foundation of China under Grant 61762085, in part by the Autonomous Region Science
and Technology Program of Xinjiang Grant 2020A02001-1.</p>
    </sec>
    <sec id="sec-16">
      <title>6 References</title>
      <p>Conference on Consumer Electronics (ICCE), 2021, pp. 1-5, doi:
10.1109/ICCE50685.2021.9427641
[9] Mohd Nor R , Rahman M M H , Rahman T , et al. Blockchain sadaqa mechanism for disaster aid
crowd funding. 2017
[10] Wu H , Zhu X . Developing a Reliable Service System of Charity Donation during the Covid-19</p>
      <p>Outbreak[J]. IEEE Access, 2020, PP(99):1-1
[11] Farooq M S , Khan M , Abid A . A framework to make charity collection transparent and auditable
using blockchain technology[J]. Computers &amp; Electrical Engineering, 83
[12] Zhang Y , He D , Choo K . BaDS: Blockchain-based architecture for data sharing with ABS and</p>
      <p>CP-ABE in IoT[J]. Wireless Communications and Mobile Computing, 2018, 2018:1-9
[13] Wu, A., Zhang, Y., Zheng, X. et al. Efficient and privacy-preserving traceable attribute-based
encryption in blockchain. Ann. Telecommun. 74, 401–411 (2019).
https://doi.org/10.1007/s12243018-00699-y
[14] Zhang X, Chen T, Feng Y, et al. A Data Sharing Scheme Based on Blockchain System and
AttributeBased Encryption[C]//2021 The 3rd International Conference on Blockchain Technology.
2021: 195-202</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Basil</surname>
            <given-names>D Z</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herr P M . Dangerous</surname>
          </string-name>
          <article-title>Donations? The Effects of Cause-Related Marketing on Charity Attitude[J]</article-title>
          .
          <source>Journal of Nonprofit &amp; Public Sector Marketing</source>
          ,
          <year>2003</year>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>MD</given-names>
            <surname>Diarmuid</surname>
          </string-name>
          ,
          <string-name>
            <surname>Rutherford A C .</surname>
          </string-name>
          <article-title>Promoting charity accountability: understanding disclosure of serious incidents[J]</article-title>
          .
          <source>Accounting Forum</source>
          ,
          <year>2018</year>
          :
          <fpage>S0155998217301977</fpage>
          -
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Inger</given-names>
            <surname>Lyngdrup</surname>
          </string-name>
          ,
          <string-name>
            <surname>Nørgård .</surname>
          </string-name>
          <article-title>The role of charity in public relief</article-title>
          ,
          <fpage>1708</fpage>
          -
          <lpage>1871</lpage>
          :
          <article-title>Copenhagen as case[J]</article-title>
          .
          <source>Scandinavian Journal of History</source>
          ,
          <year>2018</year>
          :
          <fpage>1</fpage>
          -
          <lpage>24</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Davidson</surname>
            <given-names>S</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Filippi</surname>
            <given-names>P D</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Potts J . Disrupting</surname>
          </string-name>
          <article-title>Governance: The New Institutional Economics of Distributed Ledger Technology[J]</article-title>
          .
          <source>SSRN Electronic Journal</source>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>A.</given-names>
            <surname>Farsya Kirana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Azzahro</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P. Wuri</given-names>
            <surname>Handayani</surname>
          </string-name>
          and
          <string-name>
            <given-names>W. Resti</given-names>
            <surname>Fitriani</surname>
          </string-name>
          ,
          <article-title>"Trust and Distrust: The Antecedents of Intention to Donate in Digital Donation Platform,"</article-title>
          <source>2020 Fifth International Conference on Informatics and Computing (ICIC)</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/ICIC50835.
          <year>2020</year>
          .9288548
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6] H.
          <article-title>-y.</article-title>
          <string-name>
            <surname>YU</surname>
            , P.-w. DONG and
            <given-names>T. MA</given-names>
          </string-name>
          ,
          <article-title>"</article-title>
          <source>Exploring Donors' Online Charity Adoption Base on Trust on Information Adoption Process," 2018 International Conference on Management Science and Engineering (ICMSE)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>110</fpage>
          -
          <lpage>118</lpage>
          , doi: 10.1109/ICMSE.
          <year>2018</year>
          .8745097
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>P.</given-names>
            <surname>Lanerolle</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Rathnayaka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Rupasinghe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Madhushanka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>U.</given-names>
            <surname>Samarakoon</surname>
          </string-name>
          and
          <string-name>
            <given-names>D.</given-names>
            <surname>Kasthurirathne</surname>
          </string-name>
          ,
          <article-title>"Donate.lk: A Smart Donation Handling System,"</article-title>
          <source>2018 National Information Technology Conference (NITC)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          , doi: 10.1109/NITC.
          <year>2018</year>
          .8550078
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>D.</given-names>
            <surname>Chhibber</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Tripathi</surname>
          </string-name>
          and
          <string-name>
            <given-names>S.</given-names>
            <surname>Ray</surname>
          </string-name>
          ,
          <article-title>"Do VIR: Virtualizing Food Donation Distribution through Mobile Application and Cloud-Based Supply Chain Management,"</article-title>
          2021 IEEE International
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>