Efficient and privacy-preserving traceable attribute-based encryption in blockchain

被引:8
|
作者
Axin Wu
Yinghui Zhang
Xiaokun Zheng
Rui Guo
Qinglan Zhao
Dong Zheng
机构
[1] Xi’an University of Posts and Telecommunications,National Engineering Laboratory for Wireless Security
[2] Westone Cryptologic Research Center,undefined
来源
Annals of Telecommunications | 2019年 / 74卷
关键词
CP-ABE; Fast ciphertext generation; Hidden policies; Public traceability;
D O I
暂无
中图分类号
学科分类号
摘要
Attribute-based encryption, especially ciphertext-policy attribute-based encryption, plays an important role in the data sharing. In the process of data sharing, the secret key does not contain the specific information of users, who may share his secret key with other users for benefits without being discovered. In addition, the attribute authority can generate the secret key from any attribute set. If the secret key is abused, it is difficult to judge whether the abused private key comes from users or the attribute authority. Besides, the access control structure usually leaks sensitive information in a distributed network, and the efficiency of attribute-based encryption is a bottleneck of its applications. Fortunately, blockchain technology can guarantee the integrity and non-repudiation of data. In view of the above issues, an efficient and privacy-preserving traceable attribute-based encryption scheme is proposed. In the proposed scheme, blockchain technologies are used to guarantee both integrity and non-repudiation of data, and the ciphertext can be quickly generated by using the pre-encryption technology. Moreover, attributes are hidden in anonymous access control structures by using the attribute bloom filter. When a secret key is abused, the source of the abused secret key can be audited. Security and performance analysis show that the proposed scheme is secure and efficient.
引用
收藏
页码:401 / 411
页数:10
相关论文
共 50 条
  • [1] Efficient and privacy-preserving traceable attribute-based encryption in blockchain
    Wu, Axin
    Zhang, Yinghui
    Zheng, Xiaokun
    Guo, Rui
    Zhao, Qinglan
    Zheng, Dong
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) : 401 - 411
  • [2] Privacy-preserving Blockchain based IoT Ecosystem using Attribute-based Encryption
    Rahulamathavan, Yogachandran
    Phan, Raphael C-W
    Rajarajan, Muttukrishnan
    Misra, Sudip
    Kondoz, Ahmet
    2017 IEEE INTERNATIONAL CONFERENCE ON ADVANCED NETWORKS AND TELECOMMUNICATIONS SYSTEMS (ANTS), 2017,
  • [3] A Privacy-Preserving Medical Data Traceability System Based on Attribute-Based Encryption on Blockchain
    Zhao, Yujuan
    Cui, Baojiang
    Xu, Jie
    CYBER SECURITY, CNCERT 2021, 2022, 1506 : 27 - 36
  • [4] An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage
    Huang, Chanying
    Wei, Songjie
    Fu, Anmin
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2019, 28 (11)
  • [5] An efficient blockchain-based privacy-preserving scheme with attribute and homomorphic encryption
    Xu, Guangxia
    Zhang, Jiajun
    Cliff, Uchani Gutierrez Omar
    Ma, Chuang
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2022, 37 (12) : 10715 - 10750
  • [6] Novel Secure Privacy-Preserving Decentralized Attribute-Based Encryption
    Liang, Pengfei
    Zhang, Leyou
    Shang, Yujie
    FRONTIERS IN CYBER SECURITY, 2018, 879 : 66 - 80
  • [7] Privacy-Preserving Digital Rights Management based on Attribute-based Encryption
    Petrlic, Ronald
    Sorge, Christoph
    2014 6TH INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2014,
  • [8] Privacy-Preserving Attribute-Based Encryption Supporting Expressive Access Structures
    Zhang, Liangxuan
    Li, Hui
    Zhang, Yinghui
    Khan, Fawad
    2017 IEEE SECOND INTERNATIONAL CONFERENCE ON DATA SCIENCE IN CYBERSPACE (DSC), 2017, : 475 - 482
  • [9] Attribute-Based encryption mechanism with Privacy-Preserving approach in cloud computing
    Yogesh Deshmukh J.
    Yadav S.K.
    Bhandari G.M.
    Materials Today: Proceedings, 2023, 80 : 1786 - 1791
  • [10] Privacy-preserving attribute-based access control using homomorphic encryption
    Kerl, Malte
    Bodin, Ulf
    Schelen, Olov
    CYBERSECURITY, 2025, 8 (01):