An Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme With Credible Verification Based on Blockchain

被引:24
|
作者
Zhang, Zhaoqian [1 ]
Zhang, Jianbiao [1 ]
Yuan, Yilin [1 ]
Li, Zheng [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
关键词
Cloud computing; Blockchains; Privacy; Data privacy; Servers; Encryption; Costs; Blockchain; hidden vector encryption (HVE); linear secret sharing scheme (LSSS); policy-hidden ciphertext policy attribute-based encryption (CP-ABE); privacy preserving; EFFICIENT;
D O I
10.1109/JIOT.2021.3117378
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the public cloud becomes one of the leading ways in data-sharing nowadays, data confidentiality and user privacy are increasingly critical. Partially policy-hidden ciphertext policy attribute-based encryption (CP-ABE) can effectively protect data confidentiality while reducing privacy leakage by hiding part of the access structure. However, it cannot satisfy the need of data sharing in the public cloud with complex users and large amounts of data, both in terms of less expressive access structures and limited granularity of policy hiding. Moreover, the verification of access right to shared data and correctness of decryption are ignored or conducted by an untrusted third party, and the prime-order groups are seldom considered in the expressive policy-hidden schemes. This article proposes a fully policy-hidden CP-ABE scheme constructed on linear secret sharing scheme (LSSS) access structure and prime-order groups for public cloud data sharing. To help users decrypt, hidden vector encryption (HVE) with a "convert step" is applied, which is more compatible with CP-ABE. Meanwhile, decentralized credible verification of access right to shared data and correctness of decryption based on blockchain are also provided. We prove the security of our scheme rigorously and compare the scheme with others comprehensively. The results show that our scheme performs better.
引用
收藏
页码:8681 / 8692
页数:12
相关论文
共 50 条
  • [21] Black Box Traceable Ciphertext Policy Attribute-Based Encryption Scheme
    Fu, Xingbing
    Nie, Xuyun
    Li, Fagen
    [J]. INFORMATION, 2015, 6 (03): : 481 - 493
  • [22] Analysis of Ciphertext Policy Hidden Attribute-Based Encryption and Its Improved Method
    Hu, Gongcheng
    Zhang, Leyou
    [J]. FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 193 - 208
  • [23] Ciphertext Policy-Hiding Attribute-Based Encryption
    Yadav, Umesh Chandra
    Ali, Syed Taqi
    [J]. 2015 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2015, : 2067 - 2071
  • [24] Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing
    Yin, Hongjian
    Zhang, Leyou
    Cui, Yilei
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2019, 13 (05): : 2768 - 2780
  • [25] Ciphertext Policy Attribute-Based Encryption from Lattices
    Zhang, Jiang
    Zhang, Zhenfeng
    Ge, Aijun
    [J]. 7TH ACM SYMPOSIUM ON INFORMATION, COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS 2012), 2012,
  • [26] Ciphertext-policy attribute-based delay encryption
    Chen, Lijiao
    Lv, Kewei
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 22 (02) : 167 - 185
  • [27] Fully secure ciphertext policy attribute-based encryption with constant length ciphertext and faster decryption
    Doshi, Nishant
    Jinwala, Devesh C.
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (11) : 1988 - 2002
  • [28] An Access Control Scheme Based on Blockchain and Ciphertext Policy-Attribute Based Encryption
    Hu, Ronglei
    Ma, Ziwei
    Li, Li
    Zuo, Peiliang
    Li, Xiuying
    Wei, Jiaxin
    Liu, Sihui
    [J]. SENSORS, 2023, 23 (19)
  • [29] Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization
    Waters, Brent
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 53 - 70
  • [30] A Boolean circuit-based revocable ciphertext policy attribute-based encryption scheme
    Chao Ma
    Haiying Gao
    Bin Hu
    [J]. The Journal of Supercomputing, 2024, 80 : 11762 - 11797