期刊文献+

基于区块链与代理重加密的数据共享方案 被引量:22

Data Sharing Scheme Based on the Blockchain and the Proxy Re-encryption
下载PDF
导出
摘要 在不可信环境下实现安全的数据共享一直是一个难题,传统中心化方案存在数据容易被泄露、数据容易被篡改、数据去向难以追踪、监管难度大等问题。公钥体制下的数据共享方案则存在通信代价、计算开销大,实用性差等问题。针对上述问题,文章提出一个基于区块链的数据共享方案。该方案通过区块链维护一个可信账本来保证数据的可追溯性,同时也保证了访问控制权限的不可篡改。在此基础上构建了基于Schnorr的代理重加密方案,通过一个代理重加密密钥实现了数据的安全共享。文章所提方案相比传统方案有较好的安全性和可追溯性,且已成功应用于医疗数据共享项目中。 Achieving secure data sharing in an untrusted environment is always a difficult problem.Traditional centralized solutions have problems that data is easily leaked,data is easily tampered,data destination is difficult to track,and supervision is difficult.Data sharing scheme based on public-key system has some problems such as high communication cost,high computation cost and poor practicability.To solve the above problems,this paper proposes a data sharing scheme based on blockchain.The scheme maintains a credible ledger through the blockchain to ensure the traceability of data and immutability of the access control authority.On this basis,a proxy re-encryption scheme based on Schnorr is constructed,which realizes the secure data sharing by a proxy re-encryption secret key.Compared with the traditional schemes,the proposed scheme has better security and traceability,and has been successfully applied in the medical data sharing project.
作者 李莉 曾庆贤 文义红 王士成 LI Li;ZENG Qingxian;WEN Yihong;WANG Shicheng(School of Cyber Science and Engineering,Wuhan University,Wuhan 430072,China;The 54th Research Institute of China Electronics Technology Group Corporation,Shijiazhuang 050081,China)
出处 《信息网络安全》 CSCD 北大核心 2020年第8期16-24,共9页 Netinfo Security
基金 国家重点研发计划[2018YFC1315404]。
关键词 区块链 代理重加密 数据共享 SCHNORR签名 blockchain proxy re-encryption data sharing Schnorr algorithm
  • 相关文献

参考文献7

二级参考文献44

  • 1王飞跃.人工社会、计算实验、平行系统——关于复杂社会经济系统计算研究的讨论[J].复杂系统与复杂性科学,2004,1(4):25-35. 被引量:231
  • 2王飞跃.计算实验方法与复杂系统行为分析和决策评估[J].系统仿真学报,2004,16(5):893-897. 被引量:147
  • 3王飞跃,蒋正华,戴汝为.人口问题与人工社会方法:人工人口系统的设想与应用[J].复杂系统与复杂性科学,2005,2(1):1-9. 被引量:18
  • 4洪澄 张敏 冯登国.AB-ACCS一种云存储密文访问控制方法.计算机研究与发展,2010,47(1):259-265.
  • 5Amazon. Amazon Web Services (AWS) [ EB/OL]. [2013-07-22]. http://aws, amazon, com.
  • 6Google. Google app engine [ EB/OL]. [2013-07-22]. http://code google, com/appengine/.
  • 7IBM. IBM smart cloud [ EB/OL]. [2013-07-22]. http://www. ibm. corn/cloud-computing/.
  • 8MELL P, GRANCE T. The NIST definition of cloud computing (draft) [ EB/OL]. [2013-08-20]. http://csrc, nist. gov/publica- tions/nistpubs/800-145/SP800-145, pdf.
  • 9LIBERT B, VERGNAUD D. Unidirectional ehosen-eiphertext se- cure proxy re-encryption [ C]//PKC 2008: Proceedings of the 11 th International Workshop on Practice and Theory in Public-Key Cryp- tography. Berlin: Springer, 2008:360-379.
  • 10CANETTI R, HALEVI S, KATZ J. Chosen-ciphertext security from identity-based encryption [ C]//CRYPTO 2004: Proceedings of the 24th Annual International Cryptology Conference on Advances in Cryptology. Berlin: Springer, 2004:207-222.

共引文献2850

同被引文献197

引证文献22

二级引证文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部