浏览全部资源
扫码关注微信
1. 公共大数据国家重点实验室(贵州大学),贵州 贵阳 550025
2. 贵州大学计算机科学与技术学院,贵州 贵阳 550025
3. 贵州大学密码学与数据安全研究所,贵州 贵阳 550025
4. 贵州大学数学与统计学院,贵州 贵阳 550025
5. 兰州理工大学计算机与通信学院,甘肃 兰州 730050
[ "田有亮(1982- ),男,贵州盘县人,博士,贵州大学教授、博士生导师,主要研究方向为算法博弈论、密码学与安全协议、大数据安全与隐私保护等。" ]
[ "杨科迪(1990- ),男,贵州安顺人,贵州大学硕士生,主要研究方向为数据溯源、区块链应用、数字水印等。" ]
[ "王缵(1992- ),男,安徽安庆人,贵州大学硕士生,主要研究方向为信息安全、区块链应用与共识机制、机器学习。" ]
[ "冯涛(1970- ),男,甘肃临洮人,博士,兰州理工大学研究员、博士生导师,主要研究方向为网络与信息安全、密码学。\t" ]
网络出版日期:2019-11,
纸质出版日期:2019-11-25
移动端阅览
田有亮, 杨科迪, 王缵, 等. 基于属性加密的区块链数据溯源算法[J]. 通信学报, 2019,40(11):101-111.
Youliang TIAN, Kedi YANG, Zuan WANG, et al. Algorithm of blockchain data provenance based on ABE[J]. Journal on communications, 2019, 40(11): 101-111.
田有亮, 杨科迪, 王缵, 等. 基于属性加密的区块链数据溯源算法[J]. 通信学报, 2019,40(11):101-111. DOI: 10.11959/j.issn.1000-436x.2019222.
Youliang TIAN, Kedi YANG, Zuan WANG, et al. Algorithm of blockchain data provenance based on ABE[J]. Journal on communications, 2019, 40(11): 101-111. DOI: 10.11959/j.issn.1000-436x.2019222.
针对目前基于区块链的溯源算法主要通过同态加密及零知识证明进行隐私保护,使溯源信息难于实现动态共享这一问题,提出基于属性加密的区块链数据溯源算法。为实现交易隐私的动态保护,基于 Waters 所提CP-ABE方案设计适用于区块链的策略更新算法,完成交易隐私的动态保护。为实现区块内容可见性的动态更新,基于策略更新算法设计区块结构,实现区块内容可见性的动态更新。通过安全性及实验仿真分析表明,所提算法可以在完成保护交易隐私的同时,实现溯源信息动态共享。
To solve the problem that the blockchain-based traceability algorithm mainly used homomorphic encryption and zero-knowledge proof for privacy protection
making it difficult to achieve dynamic sharing of traceability information
a blockchain data traceability algorithm based on attribute encryption was proposed.In order to realize the dynamic protection of transaction privacy
the strategy update algorithm applicable to block chain was designed based on the CP-ABE scheme proposed by Waters to achieve dynamic protection of transaction privacy.In order to realize the dynamic update of the visibility about block content
based on the strategy update algorithm
the block structure was designed to achieve the dynamic update about the content visibility of the block.The security and experimental simulation analysis show that the proposed algorithm can realize the dynamic sharing of traceability information while completing the protection transaction privacy.
RAMACHANDRAN A , KANTARCIOGLU M . Smart provenance:a distributed,blockchain based data provenance system [C ] // Eighth ACM Conference on Data and Application Security and Privacy . ACM , 2018 : 35 - 42 .
TOSH D K , SHETTY S , LIANG X , et al . Consensus protocols for blockchain-based data provenance:challenges and opportunities [C ] // Ubiquitous Computing,Electronics & Mobile Communication Conference . IEEE , 2018 .
WU S H , DU J . Electronic medical record security sharing model based on blockchain [C ] // International Conference on Cryptography,Security and Privacy . ACM , 2019 : 3 - 17 .
WANG R , TSAI W T , HE J , et al . A medical data sharing platform based on permissioned blockchains [C ] // International Conference on Blockchain Technology and Application . ACM , 2018 : 12 - 16 .
LEI X , SHAH N , LIN C , et al . Enabling the sharing economy:privacy respecting contract based on public blockchain [C ] // ACM Workshop on Blockchain . ACM , 2017 .
ZHANG Y , WU S , JIN B , et al . A blockchain-based process provenance for cloud forensics [C ] // International Conference on Computer and Communications . IEEE , 2017 : 2470 - 2473 .
BHUIYAN M Z A , ZAMAN A , WANG T , et al . Blockchain and big data to transform the healthcare [C ] // International Conference on Data Processing and Applications . ACM , 2018 : 62 - 68 .
NEISSE R , STERI G,NAI-FOVINO I . A blockchain-based approach for data accountability and provenance tracking [C ] // International Conference on Availability,Reliability and Security . ACM , 2017 : 1 - 10 .
SAHAI A , WATERS B R . Fuzzy identity based encryption [C ] // 24th Annual International Conference on Theory and Applications of Cryptographic Techniques . Springer Berlin Heidelberg , 2004 : 457 - 473 .
GOYAL V , PANDEY O , SAHAI A , et al . Attribute-based encryption for fine-grained access control of encrypted data [C ] // 13th ACM Conference on Computer and Communications Security . ACM , 2006 : 89 - 98 .
BETHENCOURT J , SAHAI A , WATERS B . Ciphertext-policy attribute-based encryption [C ] // The 2007 IEEE Symposium on Security and Privacy . IEEE Computer Society , 2007 : 321 - 334 .
WATERS B , . Ciphertext-policy attribute-based encryption:an expressive,efficient,and provably secure realization [C ] // 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography . Heidelberg , 2011 : 53 - 70 .
SAHAI A , SEYALIOGLU H , WATERS B . Dynamic credentials and ciphertext delegation for attribute-based encryption [J ] . Lecture Notes in Computer Science , 2012 : 199 - 217 .
YANG K , JIA X , REN K . Secure and verifiable policy update outsourcing for big data access control in the cloud [J ] . IEEE Transactions on Parallel and Distributed Systems , 2015 , 26 ( 12 ): 3461 - 3470 .
LIU D , LI H , YANG Y , et al . Achieving multi-authority access control with efficient attribute revocation in smart grid [C ] // IEEE International Conference on Communications . IEEE , 2014 .
HUANG X F , TAO Q , QIN B D , et al . Multi-authority attribute based encryption scheme with revocation [C ] // IEEE International Conference on Computer Communication & Networks . IEEE , 2015 : 1 - 5 .
LIU Z , CAO Z . On efficiently transferring the linear secret-sharing scheme matrix in ciphertext-policy attribute-based encryption [J ] . IACR Cryptology ePrint Archive , 2010 .
BEIMEL A . Secure schemes for secret sharing and key distribution [D ] . Haifa,Israel:Institute of Technology , 1996 .
0
浏览量
1785
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构