Blockchain-Based Multi-Authority Ciphertext-Policy Attribute-Based Encryption Scheme with Equality Test

被引:0
|
作者
Yang X.-D. [1 ]
Chen A.-J. [1 ]
Wang Z.-S. [1 ]
Liao Z.-F. [1 ]
Wang C.-F. [2 ]
机构
[1] College of Computer Science and Engineering, Northwest Normal University, Gansu, Lanzhou
[2] College of Big Data and Internet, Shenzhen Technology University, Guangdong, Shenzhen
来源
基金
中国国家自然科学基金;
关键词
blockchain; ciphertext-policy attribute-based encryption; cloud storage; equality test; in tegrity verification; multi-authority;
D O I
10.12263/DZXB.20220950
中图分类号
学科分类号
摘要
Aiming at the problems of ciphertext retrieval classification difficulty and dependence on trusted third party in the ciphertext‑policy attribute‑based encryption schemes within cloud environment, a blockchain‑based multi‑authority ci-phertext‑policy attribute‑based encryption scheme with equality test is proposed. The attribute‑based encryption with equali-ty test technology is used to retrieve and classify ciphertexts that supports attribute‑level flexible authorization, which reduc-es the computational cost of data users to decrypt duplicate data. Combined with multi‑authority attribute‑based encryption and blockchain technology to achieve decentralized user key generation. Meanwhile, the key is jointly distributed by differ-ent authorized institutions can effectively resist collusive attacks by users and attribute authorization agencies. Blockchain and smart contract technology are introduced to eliminate the dependence of trusted cloud servers in the outsourcing decryp-tion, data storage and equivalence test operation in the existing ciphertext‑policy attribute‑based encryption with equality test-ing schemes. Outsourced server is used to perform part of the decryption computation, which reduces the user's local calcula-tion overhead. The original data hash and verification parameters are uploaded to the blockchain, which ensures the correct-ness of the outsourcing server's decryption results and the integrity of cloud data. Under the random oracle model, the one‑ way property of the proposed scheme under chosen‑ciphertext attack is proved based on the decision q‑parallel BDHE hard problem. Compared with similar schemes, the proposed scheme supports more security properties and has lower computa-tional overhead. © 2024 Chinese Institute of Electronics. All rights reserved.
引用
收藏
页码:898 / 908
页数:10
相关论文
共 27 条
  • [1] FENG C S, QIN Z G, YUAN D, Et al., Key techniques of access control for cloud computing, Acta Electronica Si-nica, 43, 2, (2015)
  • [2] BETHENCOURT J, SAHAI A, WATERS B., Ciphertext‑ policy attribute‑based encryption, 2007 IEEE Sympo-sium on Security and Privacy (SP'07), (2007)
  • [3] LI J, ZHANG Y H, CHEN X F, Et al., Secure attribute‑ based data sharing for resource‑limited users in cloud com-puting, Computers & Security, 72, pp. 1-12, (2018)
  • [4] ZHAO Z Y, WANG J H, ZHU Z Q, Et al., Attribute‑based encryption for data security sharing of Internet of Things, Journal of Computer Research and Development, 56, 6, (2019)
  • [5] CHEN N Y, LI J G, ZHANG Y C, Et al., Efficient CP‑ABE scheme with shared decryption in cloud storage, IEEE Transactions on Computers, 71, 1, (2022)
  • [6] ZHANG L Y, CUI Y L, MU Y., Improving security and privacy attribute based data sharing in cloud computing, IEEE Systems Journal, 14, 1, (2020)
  • [7] GUAN Z T, YANG T T, XU R Z, Et al., Multi‑authority at-tribute‑based encryption access control model for cloud storage, Journal on Communications, 36, 6, (2015)
  • [8] CHASE M., Multi‑authority attribute based encryption, Theory of Cryptography, pp. 515-534, (2007)
  • [9] LEWKO A, WATERS B., Decentralizing attribute‑based encryption, Advances in Cryptology—EUROCRYPT 2011, pp. 568-588, (2011)
  • [10] GAO S, PIAO G R, ZHU J M, Et al., TrustAccess: A trust-worthy secure ciphertext‑policy and attribute hiding ac-cess control scheme based on blockchain, IEEE Trans-actions on Vehicular Technology, 69, 6, pp. 5784-5798, (2020)