CD-ABSE: Attribute-Based Searchable Encryption Scheme Supporting Cross-Domain Sharing on Blockchain

被引:3
作者
Guo, Kaiyang [1 ,2 ]
Han, Yiliang [1 ,2 ]
Wu, Riming [1 ,2 ]
Liu, Kai [1 ,2 ]
机构
[1] Engn Univ PAP, Xian 710086, Peoples R China
[2] Key Lab Network & Informat Secur PAP, Xian 710086, Peoples R China
基金
中国国家自然科学基金;
关键词
STORAGE;
D O I
10.1155/2022/6719302
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The network security situation is grim, and the problem of "information isolated island" is becoming increasingly prominent. In view of the low efficiency and insufficient security of data cross-domain sharing in the open network environment, a searchable data sharing scheme supporting cross-domain is proposed based on attribute encryption technology. Firstly, different types of nodes on the blockchain are used to realize the data sharing of users in different domains. Secondly, the flexible ciphertext-search function is realized through the search form of keyword strategy. Moreover, the scheme adopts the mode of storage under the chain, which reduces the operation pressure of the blockchain. At the same time, according to the characteristics of the blockchain, the traceability and tamper-proof of the access process can be realized. Finally, the analysis shows that the scheme can resist quantum attack and collusive attack while avoiding complex bilinear operation and meet the security of trapdoor search and indistinguishability under chosen-plaintext attack. Compared with other searchable attribute-based encryption schemes, the scheme has certain advantages in function and performance.
引用
收藏
页数:15
相关论文
共 31 条
[1]  
Agrawal S, 2012, LECT NOTES COMPUT SC, V7293, P280, DOI 10.1007/978-3-642-30057-8_17
[2]   Cross-domain access control based on trusted third-party and attribute center [J].
Bai, Liyang ;
Fan, Kai ;
Bai, Yuhan ;
Cheng, Xiaochun ;
Li, Hui ;
Yang, Yintang .
JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 116
[3]   Securing Multicast Group Communication in IoT-Enabled Systems [J].
Basu, Subho Shankar ;
Tripathy, Somanath .
IETE TECHNICAL REVIEW, 2019, 36 (01) :83-93
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]   Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage [J].
Challagidad, Praveen S. ;
Birje, Mahantesh N. .
INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND DATA SCIENCE, 2020, 167 :840-849
[6]  
Cheung L., 2007, Cryptology ePrint Archive
[7]   BSSPD: A Blockchain-Based Security Sharing Scheme for Personal Data with Fine-Grained Access Control [J].
Gao, Hongmin ;
Ma, Zhaofeng ;
Luo, Shoushan ;
Xu, Yanping ;
Wu, Zheng .
WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
[8]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1, DOI DOI 10.1145/1180405.1180418
[9]   Traceable Attribute-Based Encryption on OBDD Access Structure from Lattice [J].
Guo Kaiyang ;
Han Yiliang ;
Liu Kai ;
Wu Riming .
2022 11TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS, CIRCUITS AND SYSTEMS (ICCCAS 2022), 2022, :210-215
[10]  
Guo L.F, 2020, J COMPUTER APPL, V41, P3266