An Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme With Credible Verification Based on Blockchain

被引:25
作者
Zhang, Zhaoqian [1 ]
Zhang, Jianbiao [1 ]
Yuan, Yilin [1 ]
Li, Zheng [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
关键词
Cloud computing; Blockchains; Privacy; Data privacy; Servers; Encryption; Costs; Blockchain; hidden vector encryption (HVE); linear secret sharing scheme (LSSS); policy-hidden ciphertext policy attribute-based encryption (CP-ABE); privacy preserving; EFFICIENT;
D O I
10.1109/JIOT.2021.3117378
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the public cloud becomes one of the leading ways in data-sharing nowadays, data confidentiality and user privacy are increasingly critical. Partially policy-hidden ciphertext policy attribute-based encryption (CP-ABE) can effectively protect data confidentiality while reducing privacy leakage by hiding part of the access structure. However, it cannot satisfy the need of data sharing in the public cloud with complex users and large amounts of data, both in terms of less expressive access structures and limited granularity of policy hiding. Moreover, the verification of access right to shared data and correctness of decryption are ignored or conducted by an untrusted third party, and the prime-order groups are seldom considered in the expressive policy-hidden schemes. This article proposes a fully policy-hidden CP-ABE scheme constructed on linear secret sharing scheme (LSSS) access structure and prime-order groups for public cloud data sharing. To help users decrypt, hidden vector encryption (HVE) with a "convert step" is applied, which is more compatible with CP-ABE. Meanwhile, decentralized credible verification of access right to shared data and correctness of decryption based on blockchain are also provided. We prove the security of our scheme rigorously and compare the scheme with others comprehensively. The results show that our scheme performs better.
引用
收藏
页码:8681 / 8692
页数:12
相关论文
共 38 条
[1]  
Bach LM, 2018, 2018 41ST INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1545, DOI 10.23919/MIPRO.2018.8400278
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[4]   An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited [J].
Cui, Hui ;
Deng, Robert H. ;
Lai, Junzuo ;
Yi, Xun ;
Nepal, Surya .
COMPUTER NETWORKS, 2018, 133 :157-165
[5]  
De Caro A, 2011, IEEE SYMP COMP COMMU
[6]  
Emura K, 2009, LECT NOTES COMPUT SC, V5451, P13, DOI 10.1007/978-3-642-00843-6_2
[7]   A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks [J].
Fan, Kai ;
Pan, Qiang ;
Zhang, Kuan ;
Bai, Yuhan ;
Sun, Shili ;
Li, Hui ;
Yang, Yintang .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) :5826-5835
[8]   TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain [J].
Gao, Sheng ;
Piao, Guirong ;
Zhu, Jianming ;
Ma, Xindi ;
Ma, Jianfeng .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (06) :5784-5798
[9]  
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[10]   Achieving efficient and Privacy-preserving energy trading based on blockchain and ABE in smart grid [J].
Guan, Zhitao ;
Lu, Xin ;
Yang, Wenti ;
Wu, Longfei ;
Wang, Naiyu ;
Zhang, Zijian .
JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2021, 147 :34-45