τ-Access Policy: Attribute-Based Encryption Scheme for Social Network Based Data Trading

被引:0
|
作者
Shamsher Ullah [1 ,2 ]
Lan Zhang [2 ]
Muhammad Wasif Sardar [2 ,3 ]
Muhammad Tanveer Hussain [4 ]
机构
[1] School of Software, Northwestern Polytechnical University
[2] School of Science, Department of Mathematics, University of Management and Technology
[3] Department of Electronics and Electrical Systems, University of Lahore
[4] School of Computer Science and Technology University of Science and Technology of China
关键词
D O I
暂无
中图分类号
TP309.7 [加密与解密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
The rapid development of social technology has replaced physical interaction in the trading market. The implication of this technology is to provide access to the right information at the right time.The drawback of these technologies is that the eavesdropper can remove the user from the network and can create proxy participants. In this paper, we discuss how a social network overcome and prevent these data trading issues. To maintain the security of data trading,we applied ABE technique based on DBDH to secure data trading network. Our proposed τ-access policy scheme provides the best solution for the betterment of data trading network in terms of security.In τ-access policy scheme, the users can encrypt and decrypt Private Transactions Information(PTI) using our proposed τ-access policy. The security properties of τ-access policy are data confidentiality, data integrity, authenticity, non-repudiation, and unforgeability. The efficiency of our scheme is 77.73%, which is more suitable for data trading markets and trading strategies.
引用
收藏
页码:183 / 198
页数:16
相关论文
共 50 条
  • [21] An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update
    Wang, Changji
    Yuan, Yuan
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 1031 - 1041
  • [22] On Attribute-Based Encryption for Access Control to Multidimensional Data Structures
    Epishkina, Anna
    Zapechnikov, Sergey
    BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES (BICA) FOR YOUNG SCIENTISTS, 2018, 636 : 251 - 256
  • [23] Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy
    Rao, Y. Sreenivasa
    Dutta, Ratna
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 275 - 286
  • [24] Ciphertext-policy attribute-based encryption scheme with verifiability on authority
    Yu J.
    He X.
    Yan X.
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2019, 46 (04): : 49 - 57
  • [25] Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext
    Su, Zelin
    Zhang, Wenfang
    Wang, Xiaomin
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2024, 61 (12): : 3088 - 3097
  • [26] Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme
    Fu, Xingbing
    Nie, Xuyun
    Li, Fagen
    INFORMATION, 2015, 6 (03): : 481 - 493
  • [27] Security analysis for a ciphertext-policy attribute-based encryption scheme
    Zeng, Fugeng
    Xu, Chunxiang
    Zhang, Xinpeng
    Advances in Information Sciences and Service Sciences, 2012, 4 (12): : 201 - 207
  • [28] Key-policy attribute-based encryption scheme for general circuits
    Hu P.
    Gao H.-Y.
    Ruan Jian Xue Bao/Journal of Software, 2016, 27 (06): : 1498 - 1510
  • [29] KEY-POLICY ATTRIBUTE-BASED ENCRYPTION SCHEME FOR GENERAL CIRCUITS
    Bolocan, Diana
    PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2020, 21 (01): : 11 - 19
  • [30] Ciphertext-Policy Attribute-Based Encryption with Hiding Access Structure
    Yadav, Umesh Chandra
    2015 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE (IACC), 2015, : 23 - 27