Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption

被引:35
作者
Gao, Juntao [1 ]
Yu, Haiyong [1 ]
Zhu, Xiuqin [2 ]
Li, Xuelian [3 ,4 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
[2] Beijing Qunar Software Technol Co Ltd, Beijing 100080, Peoples R China
[3] Xidian Univ, Sch Math & Stat, Xian 710071, Peoples R China
[4] Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2021年 / 15卷 / 04期
关键词
Copyright protection; Blockchain; Cryptography; Smart contracts; Public key; Encryption; Privacy; digital rights management (DRM); multiauthority ciphertext-policy attribute-based encryption (MA-CPABE); proxy re-encryption; ACCESS-CONTROL; PRIVACY; MODEL;
D O I
10.1109/JSYST.2021.3064356
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In order to ensure the confidentiality of digital contents, improve the fairness of digital copyright transactions, and reduce the time and management overhead of digital copyright owners, we proposed a blockchain-based digital rights management scheme. First, we designed a new multiauthority ciphertext-policy attribute-based encryption (MA-CPABE) scheme and showed that the new MA-CPABE has the indistinguishability of plaintext under adaptively chosen plaintext attack (IND-CPA) security and good performance. By combining the MA-CPABE and proxy re-encryption, the rights owner can flexibly sell the copyright to different users with once encryption by an agent who cannot access any information related to digital content when changing the ciphertext access policy as required. By using the smart contract of Ethereum, a fair trade of the decryption keys between the rights owner and rights requester is implemented. In order to further improve fairness, another blockchain is used as a ledge to store information related to digital rights, which greatly reduces the storage overhead in public blockchain. Security analysis shows that our scheme can provide IND-CPA security, resist collusion attacks, and protect the user's privacy. Performance analysis shows that our scheme can provide a wealth of features to meet the various needs of users. The simulation results show that our scheme is very efficient compared to other schemes.
引用
收藏
页码:5233 / 5244
页数:12
相关论文
共 35 条
[1]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[2]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[3]  
Gang Yu, 2017, Cyberspace Safety and Security. 9th International Symposium, CSS 2017. Proceedings: LNCS 10581, P337, DOI 10.1007/978-3-319-69471-9_25
[4]  
Ibrahim M. H., 2015, INT J INFORM INFORM, V18, P625
[5]  
Kaitai Liang, 2013, 2013 5th International Conference on Intelligent Networking and Collaborative Systems, P552, DOI 10.1109/INCoS.2013.103
[6]   Smart-AC: A New Framework Concept for Modeling Access Control Policy [J].
Kashmar, Nadine ;
Adda, Mehdi ;
Atieh, Mirna ;
Ibrahim, Hussein .
16TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2019),THE 14TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC-2019),THE 9TH INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY INFORMATION TECHNOLOGY, 2019, 155 :417-424
[7]  
Kirrane S, 2017, SEMANT WEB, V8, DOI 10.3233/SW-160236
[8]   Efficient and Adaptively Secure Attribute-Based Proxy Reencryption Scheme [J].
Li, Huixian ;
Pang, Liaojun .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016,
[9]   Multi-authority fine-grained access control with accountability and its application in cloud [J].
Li, Jin ;
Chen, Xiaofeng ;
Chow, Sherman S. M. ;
Huang, Qiong ;
Wong, Duncan S. ;
Liu, Zheli .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 112 :89-96
[10]   Secure, efficient and revocable multi-authority access control system in cloud storage [J].
Li, Qi ;
Ma, Jianfeng ;
Li, Rui ;
Liu, Ximeng ;
Xiong, Jinbo ;
Chen, Danwei .
COMPUTERS & SECURITY, 2016, 59 :45-59