A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability

被引:1
|
作者
Chen, Guo [1 ]
Peng, Weijun [2 ]
Wu, Jing [2 ]
Fang, Youxuan [2 ]
Ye, Keke [1 ]
Xin, Yanshuang [2 ]
机构
[1] China Mobile Informat Technol Co Ltd, Beijing 100037, Peoples R China
[2] China Mobile Informat Technol Co Ltd, Shenzhen 518048, Peoples R China
基金
北京市自然科学基金;
关键词
attribute encryption; blockchain; ho- momorphic encryption; house leasing; proxy re- encryption; zero-knowledge proof; IDENTITY-BASED ENCRYPTION; EFFICIENT; DEMAND;
D O I
10.23919/JCC.fa.2022-0863.202407
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the development of Internet of Things technology, intelligent door lock devices are widely used in the field of house leasing. In the traditional housing leasing scenario, problems of door lock information disclosure, tenant privacy disclosure and rental contract disputes frequently occur, and the security, fairness and auditability of the housing leasing transaction cannot be guaranteed. To solve the above problems, a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed. The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding, and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions. Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment. To construct a decentralized housing lease transaction architecture, the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System. Finally, the security proof and computing performance analysis of the proposed scheme are carried out. The results show that the scheme can resist the chosen plaintext attack and has low computational cost.
引用
收藏
页码:267 / 277
页数:11
相关论文
共 50 条
  • [21] A Proxy Re-encryption Scheme of Medical Data Sharing Based on Consortium Blockchain
    Li, Juxia
    Zhang, Xing
    Chu, Zhiguang
    BLOCKCHAIN TECHNOLOGY AND APPLICATION, CBCC 2022, 2022, 1736 : 1 - 12
  • [22] On the Security of a Conditional Proxy Re-Encryption
    Zhang, Xi
    Chen, Min-Rong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) : 2644 - 2647
  • [23] Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme
    Sun, Yuxia
    Liu, Dan
    MOBILE NETWORKS & APPLICATIONS, 2017, 22 (02): : 209 - 215
  • [24] Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme
    Yuxia Sun
    Dan Liu
    Mobile Networks and Applications, 2017, 22 : 209 - 215
  • [25] Hierarchical conditional proxy re-encryption
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 380 - 389
  • [26] Fuzzy conditional proxy re-encryption
    FANG LiMing
    WANG JianDong
    GE ChunPeng
    REN YongJun
    ScienceChina(InformationSciences), 2013, 56 (05) : 211 - 223
  • [27] Conditional Proxy Broadcast Re-Encryption
    Chu, Cheng-Kang
    Weng, Jian
    Chow, Sherman S. M.
    Zhou, Jianying
    Deng, Robert H.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 327 - +
  • [28] Fuzzy conditional proxy re-encryption
    LiMing Fang
    JianDong Wang
    ChunPeng Ge
    YongJun Ren
    Science China Information Sciences, 2013, 56 : 1 - 13
  • [29] Identity-Based Conditional Proxy Re-Encryption
    Zhou Dehua
    Chen Kefei
    Liu Shengli
    Zheng Dong
    CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (01): : 61 - 66
  • [30] Blockchain-based Scalable and Secure EHR Data Sharing using Proxy Re-Encryption
    Sammeta, Naresh
    Parthiban, Latha
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2023, 20 (05) : 702 - 710