Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing Scheme

被引:0
作者
Xu, Guangxia [1 ,2 ]
Huang, Yuling [1 ]
Ma, Chuang [1 ]
机构
[1] Chongqing Univ Posts & Telecommun, Sch Software Engn, Chongqing, Peoples R China
[2] Guangzhou Univ, Cyberspace Inst Adv Technol, Guangzhou, Guangdong, Peoples R China
来源
2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET | 2023年
基金
中国国家自然科学基金;
关键词
Blockchain; Attribute-based encryption; Keyword searchable; Proxy re-encryption; KEYWORD SEARCH;
D O I
10.1109/CloudNet59005.2023.10490083
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of the internet economy, blockchain has emerged as one of the leading methods for data sharing. However, due to the high value and sensitivity of data assets, electronic data sharing faces challenges such as access control and privacy leakage. Traditional encryption schemes based on attributes have been ineffective in addressing these problems and still suffer from security vulnerabilities. In this paper, we propose a decentralized data sharing framework that combines keyword-searchable attributes encryption with proxy re-encryption using blockchain technology and Interplanetary File Systems. This framework offers high flexibility and efficiency by addressing the issues of a single point of failure and privacy leaks. We provide comprehensive and rigorous proofs of security and efficiency for our scheme, considering security proof and storage overhead. The simulation results demonstrate that our scheme satisfies the requirements for ciphertext and keyword security and is capable of resisting collusive attacks. Furthermore, our proposed scheme exhibits higher computational efficiency and better feasibility compared to existing schemes.
引用
收藏
页码:372 / 380
页数:9
相关论文
共 27 条
[1]   Blockchain-Based Multi-Party Authorization for Accessing IPFS Encrypted Data [J].
Battah, Ammar Ayman ;
Madine, Mohammad Moussa ;
Alzaabi, Hamad ;
Yaqoob, Ibrar ;
Salah, Khaled ;
Jayaraman, Raja .
IEEE ACCESS, 2020, 8 :196813-196825
[2]   TraceChain: A blockchain-based scheme to protect data confidentiality and traceability [J].
Fan, Yongkai ;
Lin, Xiaodong ;
Liang, Wei ;
Wang, Jinghan ;
Tan, Gang ;
Lei, Xia ;
Jing, Lei .
SOFTWARE-PRACTICE & EXPERIENCE, 2022, 52 (01) :115-129
[3]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[4]   Multi-user Attribute Based Searchable Encryption [J].
Kaushik, Kulvaibhav ;
Varadharajan, Vijayaraghavan ;
Nallusamy, Rajarathnam .
2013 IEEE 14TH INTERNATIONAL CONFERENCE ON MOBILE DATA MANAGEMENT (MDM 2013), VOL 2, 2013, :200-205
[5]   Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices [J].
Kuchta, Veronika ;
Markowitch, Olivier .
PARADIGMS IN CRYPTOLOGY - MYCRYPT 2016: MALICIOUS AND EXPLORATORY CRYPTOLOGY, 2017, 10311 :409-435
[6]  
Li S, 2012, IJACT Int J Adv Comput Technol, V4, P260
[7]  
Nakamoto S, 2008, BITCOIN PEER TO PEER
[8]  
Nishide T, 2008, LECT NOTES COMPUT SC, V5037, P111, DOI 10.1007/978-3-540-68914-0_7
[9]   MedSBA: a novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption [J].
Pournaghi, Seyed Morteza ;
Bayat, Majid ;
Farjami, Yaghoub .
JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2020, 11 (11) :4613-4641
[10]   On Lattices, Learning with Errors, Random Linear Codes, and Cryptography [J].
Regev, Oded .
JOURNAL OF THE ACM, 2009, 56 (06)