期刊文献+

一种基于LWE‐CPABE的区块链数据共享方案 被引量:4

A Blockchain Data Sharing Scheme Based on LWE-CPABE
下载PDF
导出
摘要 为应对量子计算对区块链上基于数论的隐私保护技术所带来的威胁,将区块链技术与格属性基加密算法有效融合,提出一种基于格的后量子CPABE区块链数据共享方案。将容错学习(LWE)作为方案的困难问题假设,构造一种基于格的密文策略属性基加密算法LWE-CPABE,抵御量子计算对公钥密码安全的攻击,实现数据的安全共享。设计算法参数的标准格式化交易结构,以满足LWE-CPABE算法的可追责性。在此基础上,给出交易生成与交易验证智能合约,以实现交易的自动验证与共识。功能性分析与仿真实验结果表明,该方案在算法初始化、加解密以及密钥生成的计算效率方面均优于传统的基于双线性映射理论的CPABE方案,可实现区块链上数据的高效、安全、动态共享与隐私保护,明显提高区块链数据共享安全性。 To solve the threat that quantum computing poses to the privacy protection technology using number theory applied to blockchains,a post-quantum Ciphertext-Policy Attribute-Based Encryption(CPABE)blockchain data sharing scheme based on lattice theory is proposed in this paper by effectively integrating blockchain technology and a lattice-based attribute-based encryption algorithm.First,using the Learning With Errors(LWE)problem,a lattice-based LWE-CPABE algorithm is constructed,which can effectively resist quantum computing attacks on public key cryptography to realize secure data sharing.Second,the standard formatted transaction structure of the algorithm parameters is designed to satisfy the accountability requirements associated with the LWE-CPABE algorithm.Finally,an intelligent contract for transaction generation and transaction verification is designed to realize the automatic verification and consensus of a transaction.Functional analysis and simulation results demonstrate that the initialized encryption as well as the key generation efficiency using the proposed algorithm is superior to the traditional CPABE scheme based on bilinear mapping theory.The proposed LWE-CPABE achieves higher efficiency and improves privacy protection in blockchain dynamic data sharing scenarios.
作者 张晓东 陈韬伟 余益民 ZHANG Xiaodong;CHEN Taowei;YU Yimin(School of Information,Yunnan University of Finance and Economics,Kunming 650221,China;Intelligent Application Research Institute,Yunnan University of Finance and Economics,Kunming 650221,China)
出处 《计算机工程》 CAS CSCD 北大核心 2022年第10期158-168,175,共12页 Computer Engineering
基金 国家自然科学基金(71964037) 中央引导地方科技发展专项资金(202007AD110001) 电子政务建模仿真国家工程实验室开放课题项目(MEL-18-03)。
关键词 后量子密码 区块链 属性基加密 数据共享 隐私保护 post-quantum cryptography blockchain Attribute-Based Encryption(ABE) data sharing privacy protection
  • 相关文献

参考文献9

二级参考文献58

  • 1Goyal V, Pandey O, Sahai A, et al. "Attribute-based encryption for fine-grained access control of encrypted data," Proc. Thirteenth ACM Conference on Computer and Communications Security, pp. 89-98, 2006.
  • 2Bethencourt J, Sahai A, and Waters B, "Ciphertext- policy attribute-based encryption", Proc. IEEE Symp. Security and Privacy (SP'07), pp. 321-334, May. 2007, doi:i0.1109/SR2007.11.
  • 3Waters B, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," Public Key Cryptography-- Fourteenth International Conference on Practice and Theory in Public Key Cryptography, D. Catalano, N. Fazio, R. Gennaro and A. Nicolosi, eds., Lecture Notes in Computer Science F6571, International Association for Cryptologic Research, pp. 53-70 2011.
  • 4Emura K, Miyaji A, and Nomura A, "A ciphertext- policy attribute-based encryption scheme with constant ciphertext length," Information Security Practice and Experience--Fifth International Conference, F. Bao, H. Li and G. Wang, eds., Lecture Notes in Computer Science F5451, Berlin: Springer-Heidelberg, pp. 13-23, 2009.
  • 5Herranz J, Laguillaumie F, and Rafols C, "Constant size ciphertexts in threshold attribute- based encryption," Public Key Cryptography-- Thirteenth International Conference on Practice and Theory in Public Key Cryptography, P.Q. Nguyen and D. Pointcheval, eds., Lecture Notes in Computer Science F6056, International Association for Cryptologic Research, pp. 19-34 2010.
  • 6Attrapadung N, Libert B, and Panafieu E.D, "Expressive key-policy attribute-based encryption with constant-size ciphertexts," Public Key Cryptography--Fourteenth International Conference on Practice and Theory in Public Key Cryptography, D. Catalano, N. Fazio, R. Gennaro and A. Nicolosi, eds., Lecture Notes in Computer Science F6571, International Association for Cryptologic Research, pp. 90-108 2011.
  • 7Chen Cheng, Zhang Zhenfeng, and Feng Dengguo, "Efficient ciphertext policy attribute- based encryption with constant-size ciphertext and constant computation-cost," Provable Security--Fifth International Conference, X. Boyen, and X. Chen, eds., Lecture Notes in Computer Science F6980, GmbH Berlin: Springer-Verlag, pp. 84-101 2011.
  • 8Cheung Land Newport C, "Provably secure ciphertext policy ABE," Proc. Fourteenth ACM Conference on Computer and Communications Security(CCS '07), pp. 456-465, 2007, doi:i0.i145/1315245.1315302.
  • 9Doshi N and Jinwala D, "Constant Ciphertext Length in CP-ABE," IACR Cryptoiogy ePrint Archive, 2012, 2012: 500.
  • 10Ge Aijun, Zhang Rui, and Chen Cheng, "Threshold ciphertext policy attribute-based encryption with constant size ciphertexts,"Information Security and Privacy--Seventeenth Australasian Conference, pp. 336-349, 2012, doi:10.1007/978- 3-642-31448-3_25.

共引文献197

同被引文献35

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部