Blockchain-Based Multi-Authority Ciphertext-Policy Attribute-Based Encryption Scheme with Equality Test

被引:0
|
作者
Yang X.-D. [1 ]
Chen A.-J. [1 ]
Wang Z.-S. [1 ]
Liao Z.-F. [1 ]
Wang C.-F. [2 ]
机构
[1] College of Computer Science and Engineering, Northwest Normal University, Gansu, Lanzhou
[2] College of Big Data and Internet, Shenzhen Technology University, Guangdong, Shenzhen
来源
基金
中国国家自然科学基金;
关键词
blockchain; ciphertext-policy attribute-based encryption; cloud storage; equality test; in tegrity verification; multi-authority;
D O I
10.12263/DZXB.20220950
中图分类号
学科分类号
摘要
Aiming at the problems of ciphertext retrieval classification difficulty and dependence on trusted third party in the ciphertext‑policy attribute‑based encryption schemes within cloud environment, a blockchain‑based multi‑authority ci-phertext‑policy attribute‑based encryption scheme with equality test is proposed. The attribute‑based encryption with equali-ty test technology is used to retrieve and classify ciphertexts that supports attribute‑level flexible authorization, which reduc-es the computational cost of data users to decrypt duplicate data. Combined with multi‑authority attribute‑based encryption and blockchain technology to achieve decentralized user key generation. Meanwhile, the key is jointly distributed by differ-ent authorized institutions can effectively resist collusive attacks by users and attribute authorization agencies. Blockchain and smart contract technology are introduced to eliminate the dependence of trusted cloud servers in the outsourcing decryp-tion, data storage and equivalence test operation in the existing ciphertext‑policy attribute‑based encryption with equality test-ing schemes. Outsourced server is used to perform part of the decryption computation, which reduces the user's local calcula-tion overhead. The original data hash and verification parameters are uploaded to the blockchain, which ensures the correct-ness of the outsourcing server's decryption results and the integrity of cloud data. Under the random oracle model, the one‑ way property of the proposed scheme under chosen‑ciphertext attack is proved based on the decision q‑parallel BDHE hard problem. Compared with similar schemes, the proposed scheme supports more security properties and has lower computa-tional overhead. © 2024 Chinese Institute of Electronics. All rights reserved.
引用
收藏
页码:898 / 908
页数:10
相关论文
共 27 条
  • [11] BONEH D, DI CRESCENZO G, OSTROVSKY R, Et al., Public key encryption with keyword search[C], Advances in Cryptology—EUROCRYPT 2004, (2004)
  • [12] YANG G M, TAN C H, HUANG Q, Et al., Probabilistic public key encryption with equality test[C], Topics in Cryptology—CT‑RSA 2010, (2010)
  • [13] TANG Q., Towards public key encryption scheme sup-porting equality test with fine‑grained authorization[C], Information Security and Privacy, pp. 389-406, (2011)
  • [14] TANG Q., Public key encryption schemes supporting equality test with authorisation of different granularity[J], International Journal of Applied Cryptography, 2, 4, (2012)
  • [15] MA S, ZHANG M W, HUANG Q, Et al., Public key en-cryption with delegated equality test in a multi‑user set-ting, The Computer Journal, 58, 4, (2015)
  • [16] HUANG K B, TSO R, CHEN Y C, Et al., PKE‑AET: Pub-lic key encryption with authorized equality test, The Computer Journal, 58, 10, (2015)
  • [17] LIN X J, SUN L, QU H P., Generic construction of public key encryption, identity‑based encryption and signcryp-tion with equality test, Information Sciences, 453, (2018)
  • [18] MA S., Identity‑based encryption with outsourced equali-ty test in cloud computing[J], Information Sciences, 328, (2016)
  • [19] MING Y, WANG E X., Identity‑based encryption with fil-tered equality test for smart city applications, Sensors, 19, 14, (2019)
  • [20] QU H P, YAN Z, LIN X J, Et al., Certificateless public key encryption with equality test, Information Scienc-es, 462, (2018)