Key public verifiable MA-CP-ABE scheme based on aggregatable PVSS and consortium blockchain
Correspondences|更新时间:2024-09-10
|
Key public verifiable MA-CP-ABE scheme based on aggregatable PVSS and consortium blockchain
Journal on CommunicationsVol. 45, Issue 8, Pages: 258-270(2024)
作者机构:
1.西北农林科技大学信息工程学院,陕西 杨凌 712100
2.陕西省农业信息智能感知与分析工程技术研究中心,陕西 杨凌 712100
作者简介:
基金信息:
The National Natural Science Foundation of China(72271202);The National Key Research and Development Program of China(2020YFD1100601);The“Scientist+Engineer”Team Building Foundation of Shaanxi Qinchuangyuan(2022KXJ-67);Northwest A&F University Graduate Innovation Competition Project
JING Xu,JIANG Yan.Key public verifiable MA-CP-ABE scheme based on aggregatable PVSS and consortium blockchain[J].Journal on Communications,2024,45(08):258-270.
JING Xu,JIANG Yan.Key public verifiable MA-CP-ABE scheme based on aggregatable PVSS and consortium blockchain[J].Journal on Communications,2024,45(08):258-270. DOI: 10.11959/j.issn.1000-436x.2024139.
Key public verifiable MA-CP-ABE scheme based on aggregatable PVSS and consortium blockchain
To address challenges associated with threshold-based multi-authority ciphertext-policy attribute-based encryption (MA-CP-ABE)
such as untrusted attribute authorities (AA) and the inability to verify the correctness of attribute private keys publicly
a key public verifiable MA-CP-ABE scheme based on aggregatable publicly verifiable secret sharing (PVSS) and consortium blockchain was proposed. An aggregatable PVSS algorithm was improved based on ElGamal
which enabled the public verifiability of the system master key distribution. A publicly verifiable method for MA-CP-ABE attribute private keys was constructed based on bilinear maps and ElGamal encryption
enabling the public verifiability of attribute private keys and their shares in ciphertext conditions. A key public verifiable MA-CP-ABE scheme was proposed based on a consortium blockchain
ensuring the trustworthiness of verification parameters through the consortium blockchain and achieving automated verification via smart contracts. The analysis of correctness
confidentiality
robustness
and liveness indicates that when the total number of AA is
n
the threshold value is
t
and the number of malicious AA is not more than
t
-1
the scheme can ensure the correct distribution of attribute private keys
and the communication overhead complexity of the system master key initialization is
O
(
tn
).
关键词
Keywords
references
YANG K , JIA X H . Expressive, efficient, and revocable data access control for multi-authority cloud storage [J ] . IEEE Transactions on Parallel and Distributed Systems , 2014 , 25 ( 7 ): 1735 - 1744 .
OBERKO P S K , OBENG V H K S , XIONG H . A survey on multi-authority and decentralized attribute-based encryption [J ] . Journal of Ambient Intelligence and Humanized Computing , 2022 , 13 ( 1 ): 515 - 533 .
CUI H Y , MA L M , WANG J H , et al . Research on the security model of multi-authority for attribute encryption based on blockchain [J ] . Netinfo Security , 2022 ( 5 ): 84 - 93 .
LI X J , LYU M X . Multi-authority attribute-based encryption scheme in mobile cloud environment [J ] . Application Research of Computers , 2018 , 35 ( 5 ): 1519 - 1525, 1544 .
GUO Z Z , WANG G L , LI Y X , et al . Accountable attribute-based data-sharing scheme based on blockchain for vehicular ad hoc network [J ] . IEEE Internet of Things Journal , 2023 , 10 ( 8 ): 7011 - 7026 .
CHASE M . Multi-authority attribute based encryption [C ] // Theory of Cryptography Conference . Berlin : Springer , 2007 : 515 - 534 .
HUANG X F , TAO Q , QIN B D , et al . Multi-authority attribute based encryption scheme with revocation [C ] // Proceedings of the 2015 24th International Conference on Computer Communication and Networks (ICCCN) . Piscataway : IEEE Press , 2015 : 1 - 5 .
WU G Q . Multi-authority CP-ABE with policy update in cloud storage [J ] . Journal of Computer Research and Development , 2016 , 53 ( 10 ): 2392 - 2398 .
XUE K P , XUE Y J , HONG J N , et al . RAAC: robust and auditable access control with multiple attribute authorities for public cloud storage [J ] . IEEE Transactions on Information Forensics and Security , 2017 , 12 ( 4 ): 953 - 967 .
WANG C , JIN H , WEI R L , et al . Revocable, dynamic and decentralized data access control in cloud storage [J ] . The Journal of Supercomputing , 2022 , 78 ( 7 ): 10063 - 10087 .
LEWKO A , WATERS B . Decentralizing attribute-based encryption [C ] // Annual International Conference on the Theory and Applications of Cryptographic Techniques . Berlin : Springer , 2011 : 568 - 588 .
YAN X X , LIU Y , LI Z C , et al . Multi-authority attribute-based encryption scheme with privacy protection [J ] . Journal of Computer Research and Development , 2018 , 55 ( 4 ): 846 - 853 .
DATTA P , KOMARGODSKI I , WATERS B . Fully adaptive decentralized multi-authority ABE [C ] // Annual International Conference on the Theory and Applications of Cryptographic Techniques . Berlin : Springer , 2023 : 447 - 478 .
LIN H , CAO Z F , LIANG X H , et al . Secure threshold multi authority attribute based encryption without a central authority [J ] . Information Sciences , 2010 , 180 ( 13 ): 2618 - 2632 .
LI W , XUE K P , XUE Y J , et al . TMACS: a robust and verifiable threshold multi-authority access control system in public cloud storage [J ] . IEEE Transactions on Parallel and Distributed Systems , 2016 , 27 ( 5 ): 1484 - 1496 .
GU J , SHEN J Q , WANG B Y . A robust and secure multi-authority access control system for cloud storage [J ] . Peer-to-Peer Networking and Applications , 2021 , 14 ( 3 ): 1488 - 1499 .
RAMESH D , MISHRA R , TRIVEDI M C . PCS-ABE (t, n): a secure threshold multi authority CP-ABE scheme based efficient access control systems for cloud environment [J ] . Journal of Ambient Intelligence and Humanized Computing , 2021 , 12 ( 10 ): 9303 - 9322 .
TANG F , BAO J L , HUANG Y H , et al . Multi-authority attribute-based identification scheme [J ] . Journal on Communications , 2021 , 42 ( 3 ): 220 - 228 .
GURKAN K , JOVANOVIC P , MALLER M , et al . Aggregatable distributed key generation [C ] // Annual International Conference on the Theory and Applications of Cryptographic Techniques . Berlin : Springer , 2021 : 147 - 176 .
WATERS B . Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization [C ] // International Workshop on Public Key Cryptography . Berlin : Springer , 2011 : 53 - 70 .
ELGAMAL T . A public key cryptosystem and a signature scheme based on discrete logarithms [J ] . IEEE Transactions on Information Theory , 1985 , 31 ( 4 ): 469 - 472 .
LIU M D , CHEN Z N , SHI Y J , et al . Research progress of blockchain in data security [J ] . Chinese Journal of Computers , 2021 , 44 ( 1 ): 1 - 27 .
CASCUDO I , DAVID B . SCRAPE: scalable randomness attested by public entities [C ] // International Conference on Applied Cryptography and Network Security . Berlin : Springer , 2017 : 537 - 556 .
FELDMAN P . A practical scheme for non-interactive verifiable secret sharing [C ] // Proceedings of the 28th Annual Symposium on Foundations of Computer Science (sfcs 1987) . Piscataway : IEEE Press , 1987 : 427 - 438 .
KE W Y , SHI R H . Measurement-device-independent quantum voting scheme with identity authentication [J ] . Journal of Software , 2023 , 34 ( 11 ): 5376 - 5391 .
ZHANG L , QIU F Y , HAO F , et al . 1-round distributed key generation with efficient reconstruction using decentralized CP-ABE [J ] . IEEE Transactions on Information Forensics and Security , 2022 , 17 : 894 - 907 .