期刊文献+

基于属性基加密的区块链隐私保护与访问控制方法 被引量:23

A Method of Privacy Preserving and Access Control in Blockchain Based on Attribute-based Encryption
下载PDF
导出
摘要 区块链中所有节点都保存相同样本,随着区块链技术的广泛应用,区块链隐私保护与访问控制问题日益突出。文章基于多授权中心的属性基加密算法提出了面向区块链的隐私保护与访问控制方案。多授权中心可以由区块链中的权威节点轮值担任,有效解决了单一授权中心权限过大的问题。采用该方案后,所有数据采用属性基加密算法加密后保存在区块链中,只有属性满足访问控制策略的用户才能成功解密数据,从而实现区块链中的隐私保护与访问控制。 All nodes in the blockchain keep the same information.With the wide application of blockchain technology,the problem of blockchain privacy protection and access control is becoming increasingly prominent.Based on multi-authority attribute-based encryption(MA-ABE),this paper proposes a privacy preserving and access control scheme for blockchain.The authorities are acted by the nodes in blockchain,which effectively solves the problem that the centralized authority is too large.By deploying the proposed scheme,data are encrypted by using MA-ABE and stored in the blockchain.Only users whose attributes meet the access control policy can decrypt the data successfully, which achieves the purpose of privacy preserving and access control in blockchain.
作者 汪金苗 谢永恒 王国威 李易庭 WANG Jinmiao;XIE Yongheng;WANG Guowei;LI Yiting(Run Technologies Co.,Ltd.Beijing,Beijing 100192,China;Beijing Cyberspace Data Analysis and Applied Engineering Technology Research Center,Beijing 100192,China;Beijing Municipal Bureau of Public Security,Beijing 100055,China)
出处 《信息网络安全》 CSCD 北大核心 2020年第9期47-51,共5页 Netinfo Security
基金 北京市青年骨干个人项目[201800002685XG357]。
关键词 访问控制 隐私保护 多授权中心 区块链 属性基加密 access control privacy preserving multi-authority blockchain attributebased encryption
  • 相关文献

参考文献4

二级参考文献47

  • 1SAHAIA,WATERS B.Fuzzy identity based encryption[A].Proc of the Eurocrypt 2005[C].Heidelberg:Springer-Verlag,2005.457-473.
  • 2GOYAL V,PANDEY O,et al.Attribute-based eneryption for free-grained access control of encrypted data[A].Proc of the 13th ACM CCS[C].New York,2006.89-98.
  • 3WATERS B.Ciphertext-policy attribute based encryption:an expres-sive,efficient and provably secure realization[A].Proc of the PKC 2011 [C].Heidelberg:Springer-Verlag,2011.53-70.
  • 4CHASE M.Multi-authority attribute based encryption[A].Proc of the TCC 2007[C].Heidelberg:Springer-Verlag,2007.515-534.
  • 5CHASE M,CHOW S.Improving privacy and security in multi-authority attribute-based encryption[A].Proc of the 16thACMCCS[C].New York,2009.121-130.
  • 6LEWKO A,WATERS B.Decentralizing attribute-based encryption[A].Proc of the Eurocrypt 2011[C].Heidelberg:Springer-Verlag,2011.568-588.
  • 7LEWKO A,WATERS B.New proof methods for attribute-based en-cryption:achieving full security through selective techniques[A].Proc of the Crypto 2012[C].Heidelberg:Springer-Verlag,2012.180-198.
  • 8HOHENBERGER S,et al.Attribute based encryptiun:with fast de-cryption[A].Proc of the PKC 2013[C].Heidelberg:Springer-Verlag,2013.162-179.
  • 9ANDERSON R.Two Remarks on Public Key Cryptology[R].Invited Lecture at the 4th ACM Conference on Computer and Communica-tions Security,1997.
  • 10BELLARE M,MINER S K.A forward-secure digital signature scheme[A].Proc of the Crypto 1999[C].Heidelberg:Springer-Verlag,1999.431-448.

共引文献55

同被引文献184

引证文献23

二级引证文献69

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部