A Blockchain-Based Shamir's Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings

Keping Yu, Liang Tan*, Caixia Yang, Kim Kwang Raymond Choo, Ali Kashif Bashir, Joel J.P.C. Rodrigues, Takuro Sato

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

87 Citations (Scopus)


The Industrial Internet of Things (IIoT), a typical Internet of Things (IoT) application, integrates the global industrial system with other advanced computing, analysis, and sensing technologies through Internet connectivity. Due to the limited storage and computing capacity of edge and IIoT devices, data sensed and collected by these devices are usually stored in the cloud. Encryption is commonly used to ensure privacy and confidentiality of IIoT data. However, the key used for data encryption and decryption is usually directly stored and managed by users or third-party organizations, which has security and privacy implications. To address this potential security and privacy risk, we propose a Shamir threshold cryptography scheme for IIoT data protection using blockchain: STCChain. Specifically, in our solution, the edge gateway uses a symmetric key to encrypt the data uploaded by the IoT device and stores it in the cloud. The symmetric key is protected by a private key generated by the edge gateway. To prevent the loss of the private key and privacy leakage, we use a Shamir secret sharing algorithm to divide the private key, encrypt it, and publish it on the blockchain. We implement a prototype of STCChain using Xuperchain, and the results show that STCChain can effectively prevent attackers from stealing data as well as ensuring the security of the encryption key.

Original languageEnglish
Pages (from-to)8154-8167
Number of pages14
JournalIEEE Internet of Things Journal
Issue number11
Publication statusPublished - 2022 Jun 1


  • Blockchain
  • Industrial Internet of Things (IIoT)
  • Shamir secret sharing (SSS)
  • data protection

ASJC Scopus subject areas

  • Signal Processing
  • Information Systems
  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications


Dive into the research topics of 'A Blockchain-Based Shamir's Threshold Cryptography Scheme for Data Protection in Industrial Internet of Things Settings'. Together they form a unique fingerprint.

Cite this