A Blockchain-Based Proxy Re-Encryption Scheme with Conditional Privacy Protection and Auditability

被引:1
|
作者
Chen, Guo [1 ]
Peng, Weijun [2 ]
Wu, Jing [2 ]
Fang, Youxuan [2 ]
Ye, Keke [1 ]
Xin, Yanshuang [2 ]
机构
[1] China Mobile Informat Technol Co Ltd, Beijing 100037, Peoples R China
[2] China Mobile Informat Technol Co Ltd, Shenzhen 518048, Peoples R China
基金
北京市自然科学基金;
关键词
attribute encryption; blockchain; ho- momorphic encryption; house leasing; proxy re- encryption; zero-knowledge proof; IDENTITY-BASED ENCRYPTION; EFFICIENT; DEMAND;
D O I
10.23919/JCC.fa.2022-0863.202407
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
With the development of Internet of Things technology, intelligent door lock devices are widely used in the field of house leasing. In the traditional housing leasing scenario, problems of door lock information disclosure, tenant privacy disclosure and rental contract disputes frequently occur, and the security, fairness and auditability of the housing leasing transaction cannot be guaranteed. To solve the above problems, a blockchain-based proxy re-encryption scheme with conditional privacy protection and auditability is proposed. The scheme implements fine-grained access control of door lock data based on attribute encryption technology with policy hiding, and uses proxy re-encryption technology to achieve auditable supervision of door lock information transactions. Homomorphic encryption technology and zero-knowledge proof technology are introduced to ensure the confidentiality of housing rent information and the fairness of rent payment. To construct a decentralized housing lease transaction architecture, the scheme realizes the efficient collaboration between the door lock data ciphertext stored under the chain and the key information ciphertext on the chain based on the blockchain and InterPlanetary File System. Finally, the security proof and computing performance analysis of the proposed scheme are carried out. The results show that the scheme can resist the chosen plaintext attack and has low computational cost.
引用
收藏
页码:267 / 277
页数:11
相关论文
共 50 条
  • [31] Certificate-Based Conditional Proxy Re-Encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 299 - 310
  • [32] Identity-based Conditional Proxy Re-encryption
    Shao, Jun
    Wei, Guiyi
    Ling, Yun
    Xie, Mande
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [33] Proxy Impersonation Safe Conditional Proxy Re-Encryption
    Gandhi, Dheeraj
    Rangan, Pandu
    Selvi, Sharmila Deva
    Vivek, Sree
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 33 - 44
  • [34] Blockchain data sharing scheme supporting attribute and proxy re-encryption
    Li, Xuelian
    Zhang, Xiachuan
    Gao, Juntao
    Xiang, Dengmei
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2022, 49 (01): : 1 - 16
  • [35] Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption
    Gao, Juntao
    Yu, Haiyong
    Zhu, Xiuqin
    Li, Xuelian
    IEEE SYSTEMS JOURNAL, 2021, 15 (04): : 5233 - 5244
  • [36] Proxy Re-encryption Scheme Based on SK Identity Based Encryption
    Wang, Xu An
    Yang, Xiaoyuan
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 657 - 660
  • [37] A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud
    Chen, Zhanwen
    Chen, Jiageng
    Meng, Weizhi
    2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 569 - 576
  • [38] Conditional Privacy using Re-encryption
    Suriadi, Suriadi
    Foo, Ernest
    Smith, Jason
    2008 IFIP INTERNATIONAL CONFERENCE ON NETWORK AND PARALLEL COMPUTING, PROCEEDINGS, 2008, : 18 - 25
  • [39] Blockchain aware proxy re-encryption algorithm-based data sharing scheme
    Keshta, Ismail
    Aoudni, Yassine
    Sandhu, Mukta
    Singh, Abha
    Xalikovich, Pardayev Abdunabi
    Rizwan, Ali
    Soni, Mukesh
    Lalar, Sachin
    PHYSICAL COMMUNICATION, 2023, 58
  • [40] Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing Scheme
    Xu, Guangxia
    Huang, Yuling
    Ma, Chuang
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 372 - 380