Data Sharing in the Metaverse With Key Abuse Resistance Based on Decentralized CP-ABE

被引:1
作者
Zhang, Liang [1 ,2 ]
Ou, Zhanrong [1 ]
Hu, Changhui [1 ]
Kan, Haibin [3 ,4 ,5 ]
Zhang, Jiheng [2 ]
机构
[1] Hainan Univ, Sch Cyberspace Secur, Sch Cryptol, Haikou 570228, Peoples R China
[2] Hong Kong Univ Sci & Technol, Dept Ind Engn & Decis Analyt, Kowloon, Clear Water Bay, Hong Kong, Peoples R China
[3] Fudan Univ, Sch Comp Sci, Shanghai Key Lab Intelligent Informat Proc, Shanghai 200433, Peoples R China
[4] Shanghai Engn Res Ctr Blockchain, Shanghai 200433, Peoples R China
[5] Zhuhai Fudan Innovat Res Inst, Zhuhai 518057, Peoples R China
基金
海南省自然科学基金; 中国国家自然科学基金;
关键词
Metaverse; accountability; CP-ABE; key abuse; GameFi; DAO; ATTRIBUTE-BASED ENCRYPTION;
D O I
10.1109/TC.2024.3512177
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Data sharing is ubiquitous in the metaverse, which adopts blockchain as its foundation. Blockchain is employed because it enables data transparency, achieves tamper resistance, and supports smart contracts. However, securely sharing data based on blockchain necessitates further consideration. Ciphertext-policy attribute-based encryption (CP-ABE) is a promising primitive to provide confidentiality and fine-grained access control. Nonetheless, authority accountability and key abuse are critical issues that practical applications must address. Few studies have considered CP-ABE key confidentiality and authority accountability simultaneously. To our knowledge, we are the first to fill this gap by integrating non-interactive zero-knowledge (NIZK) proofs into CP-ABE keys and outsourcing the verification process to a smart contract. To meet the decentralization requirement, we incorporate a decentralized CP-ABE scheme into the proposed data sharing system. Additionally, we provide an implementation based on smart contract to determine whether an access control policy is satisfied by a set of CP-ABE keys. We also introduce an open incentive mechanism to encourage honest participation in data sharing. Hence, the key abuse issue is resolved through the NIZK proof and the incentive mechanism. We provide a theoretical analysis and conduct comprehensive experiments to demonstrate the feasibility and efficiency of the data sharing system. Based on the proposed accountable approach, we further illustrate an application in GameFi, where players can play to earn or contribute to an accountable DAO, fostering a thriving metaverse ecosystem.
引用
收藏
页码:901 / 914
页数:14
相关论文
共 49 条
[1]   Open Data from the Third Observing Run of LIGO, Virgo, KAGRA, and GEO [J].
Abbott, R. ;
Abe, H. ;
Acernese, F. ;
Ackley, K. ;
Adhicary, S. ;
Adhikari, N. ;
Adhikari, R. X. ;
Adkins, V. K. ;
Adya, V. B. ;
Affeldt, C. ;
Agarwal, D. ;
Agathos, M. ;
Aguiar, O. D. ;
Aiello, L. ;
Ain, A. ;
Ajith, P. ;
Akutsu, T. ;
Albanesi, S. ;
Alfaidi, R. A. ;
Al-Jodah, A. ;
Allene, C. ;
Allocca, A. ;
Almualla, M. ;
Altin, P. A. ;
Amato, A. ;
Amez-Droz, L. ;
Amorosi, A. ;
Anand, S. ;
Ananyeva, A. ;
Andersen, R. ;
Anderson, S. B. ;
Anderson, W. G. ;
Andia, M. ;
Ando, M. ;
Andrade, T. ;
Andres, N. ;
Andres-Carcasona, M. ;
Andric, T. ;
Ansoldi, S. ;
Antelis, J. M. ;
Antier, S. ;
Aoumi, M. ;
Apostolatos, T. ;
Appavuravther, E. Z. ;
Appert, S. ;
Apple, S. K. ;
Arai, K. ;
Araya, A. ;
Araya, M. C. ;
Areeda, J. S. .
ASTROPHYSICAL JOURNAL SUPPLEMENT SERIES, 2023, 267 (02)
[2]   Hyperledger Fabric: A Distributed Operating System for Permissioned Blockchains [J].
Androulaki, Elli ;
Barger, Artem ;
Bortnikov, Vita ;
Cachin, Christian ;
Christidis, Konstantinos ;
De Caro, Angelo ;
Enyeart, David ;
Ferris, Christopher ;
Laventman, Gennady ;
Manevich, Yacov ;
Muralidharan, Srinivasan ;
Murthy, Chet ;
Binh Nguyen ;
Sethi, Manish ;
Singh, Gari ;
Smith, Keith ;
Sorniotti, Alessandro ;
Stathakopoulou, Chrysoula ;
Vukolic, Marko ;
Cocco, Sharon Weed ;
Yellick, Jason .
EUROSYS '18: PROCEEDINGS OF THE THIRTEENTH EUROSYS CONFERENCE, 2018,
[3]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[4]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[5]   Key regeneration-free ciphertext-policy attribute-based encryption and its application [J].
Cui, Hui ;
Deng, Robert H. ;
Qin, Baodong ;
Weng, Jian .
INFORMATION SCIENCES, 2020, 517 :217-229
[6]  
Diament T., 2004, P 11 ACM C COMPUTER, P330
[7]   Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing [J].
Dong, Xin ;
Yu, Jiadi ;
Luo, Yuan ;
Chen, Yingying ;
Xue, Guangtao ;
Li, Minglu .
COMPUTERS & SECURITY, 2014, 42 :151-164
[8]  
E.I.P.-196, Eip-196: Precompiled contracts for addition and scalar multiplication on the elliptic curve altbn128
[9]  
E.I.P.-197, Precompiled contracts for optimal ate pairing check on the elliptic curve altbn128
[10]  
Entriken W., 2018, EIP-721: Non-Fungible Token Standard