A Regulation Scheme Based on the Ciphertext-Policy Hierarchical Attribute-Based Encryption in Bitcoin System

被引:15
|
作者
Wang, Yuxiao [1 ]
Gao, Juntao [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
来源
IEEE ACCESS | 2018年 / 6卷
关键词
Bitcoin; ciphertext-policy hierarchical attribute-based encryption (CP-HABE); regulation; illegal activities;
D O I
10.1109/ACCESS.2018.2814620
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In Bitcoin financial system, a user's privacy is supposed to be protected by means of anonymity. However, the anonymity makes illegal trades possible because nobody is able to reveal the real identities of the illegal users. In this paper, we propose a regulation scheme based on the ciphertext-policy hierarchical attribute-based encryption (CP-HABE). In the scheme, users' identities are encrypted by using access policy and are contained in their transaction. A type of user is defined as the dependable regulation node, which is responsible for the regulation of transactions and encrypted identities. A new signature algorithm instead of the elliptic curve signature is adopted to generate wallet key pairs, this establishes a connection between wallet addresses and encrypted identities. When a transaction is doubted to involve illegal activities, the authorized regulation nodes are capable of revealing the users' real identities and add the illegal identities to a public blacklist. Our system is based on a new CP-HABE scheme which is proved to be secure against chosen-plaintext attack in the standard model under the Bilinear Diffic-Hellman Exponent assumption. Finally, we give a performance analysis of our system. The proposed regulation system can reveal criminals' identities undertaking illegal activities.
引用
收藏
页码:16267 / 16278
页数:12
相关论文
共 50 条
  • [21] Ciphertext-Policy Attribute-Based Encryption with Short Keys
    XU Peng
    TANG Yong
    JIANG Wenbin
    JIN Hai
    ZOU Deqing
    [J]. Chinese Journal of Electronics, 2014, 23 (04) : 655 - 660
  • [22] Securely outsourcing the ciphertext-policy attribute-based encryption
    Kim Thuat Nguyen
    Nouha Oualha
    Maryline Laurent
    [J]. World Wide Web, 2018, 21 : 169 - 183
  • [23] Survey on Revocation in Ciphertext-Policy Attribute-Based Encryption
    Al-Dahhan, Ruqayah R.
    Shi, Qi
    Lee, Gyu Myoung
    Kifayat, Kashif
    [J]. SENSORS, 2019, 19 (07)
  • [24] A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy Protection
    Han, Dezhi
    Pan, Nannan
    Li, Kuan-Ching
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (01) : 316 - 327
  • [25] CP-ABSE: A Ciphertext-Policy Attribute-Based Searchable Encryption Scheme
    Yin, Hui
    Zhang, Jixin
    Xiong, Yinqiao
    Ou, Lu
    Li, Fangmin
    Liao, Shaolin
    Li, Keqin
    [J]. IEEE ACCESS, 2019, 7 : 5682 - 5694
  • [26] Conditional Ciphertext-Policy Attribute-Based Encryption Scheme in Vehicular Cloud Computing
    Guan, Zhitao
    Li, Jing
    Zhang, Zijian
    Zhu, Liehuang
    [J]. MOBILE INFORMATION SYSTEMS, 2016, 2016
  • [27] A Ciphertext-Policy Attribute-Based Encryption Scheme Supporting Arithmetic Span Program
    Wei D.
    Gao H.-Y.
    [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2020, 48 (10): : 1993 - 2002
  • [28] Traceable Ciphertext-policy Attribute-based Encryption Scheme with Constant Decryption Costs
    Wang Jianhua
    Wang Guangbo
    Xu Yang
    Hu Yixiao
    Zhang Yue
    Fan Liwen
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (04) : 802 - 810
  • [29] Ciphertext-policy weighted attribute based encryption scheme
    Liu, Ximeng
    Ma, Jianfeng
    Xiong, Jinbo
    Li, Qi
    Zhang, Tao
    [J]. Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University, 2013, 47 (08): : 44 - 48
  • [30] Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Li, Jiguo
    Wang, Haiping
    Zhang, Yichen
    Shen, Jian
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3339 - 3352