An Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme With Credible Verification Based on Blockchain

被引:24
|
作者
Zhang, Zhaoqian [1 ]
Zhang, Jianbiao [1 ]
Yuan, Yilin [1 ]
Li, Zheng [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
关键词
Cloud computing; Blockchains; Privacy; Data privacy; Servers; Encryption; Costs; Blockchain; hidden vector encryption (HVE); linear secret sharing scheme (LSSS); policy-hidden ciphertext policy attribute-based encryption (CP-ABE); privacy preserving; EFFICIENT;
D O I
10.1109/JIOT.2021.3117378
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the public cloud becomes one of the leading ways in data-sharing nowadays, data confidentiality and user privacy are increasingly critical. Partially policy-hidden ciphertext policy attribute-based encryption (CP-ABE) can effectively protect data confidentiality while reducing privacy leakage by hiding part of the access structure. However, it cannot satisfy the need of data sharing in the public cloud with complex users and large amounts of data, both in terms of less expressive access structures and limited granularity of policy hiding. Moreover, the verification of access right to shared data and correctness of decryption are ignored or conducted by an untrusted third party, and the prime-order groups are seldom considered in the expressive policy-hidden schemes. This article proposes a fully policy-hidden CP-ABE scheme constructed on linear secret sharing scheme (LSSS) access structure and prime-order groups for public cloud data sharing. To help users decrypt, hidden vector encryption (HVE) with a "convert step" is applied, which is more compatible with CP-ABE. Meanwhile, decentralized credible verification of access right to shared data and correctness of decryption based on blockchain are also provided. We prove the security of our scheme rigorously and compare the scheme with others comprehensively. The results show that our scheme performs better.
引用
收藏
页码:8681 / 8692
页数:12
相关论文
共 50 条
  • [1] An Efficient and Expressive Fully Policy-Hidden Ciphertext-Policy Attribute-Based Encryption Scheme for Satellite Service Systems
    Shi, Jiaoli
    Hu, Chao
    Zhang, Shunli
    Zhou, Qing
    Mei, Zhuolin
    Yao, Shimao
    Deng, Anyuan
    [J]. ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2024, 13 (09)
  • [2] An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures
    Cui, Hui
    Deng, Robert H.
    Wu, Guowei
    Lai, Junzuo
    [J]. PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 19 - 38
  • [3] Harnessing Policy Authenticity for Hidden Ciphertext Policy Attribute-Based Encryption
    Kim, Intae
    Susilo, Willy
    Baek, Joonsang
    Kim, Jongkil
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (03) : 1856 - 1870
  • [4] Dynamic Ciphertext-Policy Attribute-Based Encryption for Expressive Access Policy
    Rao, Y. Sreenivasa
    Dutta, Ratna
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2014, 2014, 8337 : 275 - 286
  • [5] An efficient and expressive ciphertext-policy attribute-based encryption scheme with partially hidden access structures, revisited
    Cui, Hui
    Deng, Robert H.
    Lai, Junzuo
    Yi, Xun
    Nepal, Surya
    [J]. COMPUTER NETWORKS, 2018, 133 : 157 - 165
  • [6] Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Li, Jiguo
    Wang, Haiping
    Zhang, Yichen
    Shen, Jian
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (07): : 3339 - 3352
  • [7] An expressive and provably secure Ciphertext-Policy Attribute-Based Encryption
    Balu, A.
    Kuppusamy, K.
    [J]. INFORMATION SCIENCES, 2014, 276 : 354 - 362
  • [8] Outsourced ciphertext-policy attribute-based encryption with partial policy hidden
    Yu, Jinxia
    He, Guanghui
    Yan, Xixi
    Tang, Yongli
    Qin, Rongxia
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2020, 16 (05)
  • [9] Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme
    Asim, Muhammad
    Ibraimi, Luan
    Petkovic, Milan
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, 2011, 7025 : 244 - +
  • [10] An Improved Ciphertext-Policy Attribute-Based Encryption Scheme
    Zheng, Hua
    Zhang, Xi
    Yang, Qi
    [J]. SMART COMPUTING AND COMMUNICATION, SMARTCOM 2016, 2017, 10135 : 400 - 411