A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability

被引:1
|
作者
Chen, Guo [1 ]
Peng, Weijun [2 ]
Wu, Jing [2 ]
Fang, Youxuan [2 ]
Ye, Keke [1 ]
Xin, Yanshuang [2 ]
机构
[1] China Mobile Informat Technol Co Ltd, Beijing 100037, Peoples R China
[2] China Mobile Informat Technol Co Ltd, Shenzhen 518048, Peoples R China
基金
北京市自然科学基金;
关键词
attribute encryption; blockchain; ho- momorphic encryption; house leasing; proxy re- encryption; zero-knowledge proof; IDENTITY-BASED ENCRYPTION; EFFICIENT; DEMAND;
D O I
10.23919/JCC.fa.2022-0863.202407
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the development of Internet of Things technology, intelligent door lock devices are widely used in the field of house leasing. In the traditional housing leasing scenario, problems of door lock information disclosure, tenant privacy disclosure and rental contract disputes frequently occur, and the security, fairness and auditability of the housing leasing transaction cannot be guaranteed. To solve the above problems, a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed. The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding, and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions. Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment. To construct a decentralized housing lease transaction architecture, the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System. Finally, the security proof and computing performance analysis of the proposed scheme are carried out. The results show that the scheme can resist the chosen plaintext attack and has low computational cost.
引用
收藏
页码:267 / 277
页数:11
相关论文
共 50 条
  • [41] A Threshold Proxy Re-Encryption Scheme for Secure IoT Data Sharing Based on Blockchain
    Chen, Yingwen
    Hu, Bowen
    Yu, Hujie
    Duan, Zhimin
    Huang, Junxin
    ELECTRONICS, 2021, 10 (19)
  • [42] Preserving Patient's Privacy using Proxy Re-encryption in Permissioned Blockchain
    Meena, Devendra
    Dwivedi, Ras
    Shukla, Sandeep
    2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 450 - 457
  • [43] Privacy-aware transmission scheme based on homomorphic proxy re-encryption for NDN
    Guo X.
    Chen C.
    Zhang M.-J.
    Ngaboyindekwe A.
    Cao L.-C.
    International Journal of Security and Networks, 2018, 13 (01) : 58 - 70
  • [44] On the Insecurity of an Identity Based Proxy Re-encryption Scheme
    Wang, Xu An
    Yang, Xiaoyuan
    FUNDAMENTA INFORMATICAE, 2010, 98 (2-3) : 277 - 281
  • [45] Blockchain-based Interoperable Healthcare Using Zero-knowledge Proofs and Proxy Re-Encryption
    Sharma, Bhavye
    Halder, Raju
    Singh, Jawar
    2020 INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS), 2020,
  • [46] Secure Outsourced Blockchain-Based Medical Data Sharing System Using Proxy Re-Encryption
    Park, Young-Hoon
    Kim, Yejin
    Lee, Shin-Ok
    Ko, Kwangman
    APPLIED SCIENCES-BASEL, 2021, 11 (20):
  • [47] Group-Based Proxy Re-encryption Scheme
    Ma, Chunbo
    Ao, Jun
    EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, 5754 : 1025 - 1034
  • [48] Anonymous Attribute-Based Conditional Proxy Re-encryption
    Mao, Xianping
    Li, Xuefeng
    Wu, Xiaochuan
    Wang, Chuansheng
    Lai, Junzuo
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 95 - 110
  • [49] Lattice-based Fuzzy Conditional Proxy Re-encryption
    Li, BaoHong
    Xu, JieFei
    Liu, YanZhi
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (05): : 1379 - 1385
  • [50] Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
    Yan, Xixi
    Zhang, Jing
    Cheng, Pengyu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 83 (01): : 1399 - 1414