期刊文献+

基于区块链与属性密码体制的匿名数据共享访问控制 被引量:2

Anonymous Data Sharing and Access Control Based on Blockchain and Attribute-Based Cryptography
下载PDF
导出
摘要 信息安全和隐私保护是大数据时代的重要需求。基于身份的公钥密码体制解决了传统公钥基础设施体制的密钥管理问题,但会泄漏签名者的身份信息。传统基于属性的访问控制方案实现了主体的动态扩展和对客体的细粒度访问,但存在中心化的授权机构。为了解决上述问题,提出一种基于区块链与去中心化属性密码体制的匿名数据共享访问控制方案。利用属性签名的匿名性,在存储数据前无须已知用户身份信息即可验证数据来源的可靠性,通过属性加密实现细粒度的访问控制。采用分布式属性密码体制,使用户合作构建属性授权机构,当且仅当超过指定阈值的机构用户同意时才可进行机构创建和密钥分发。实验结果表明,该方案能抵抗合谋和重放攻击,在并发请求数为1 000~5 000和属性数为10~30的条件下,系统总响应时间不超过120 ms,最大吞吐量可达62 T/s,满足实际应用需求。 Information security and privacy protection are critical requirements in the era of big data.Identity-based cryptography is a type of public-key cryptography that solves the main management problem of the traditional public key infrastructure.However,it will leak the identity information of the signer.The traditional attribute-based access control schemes achieve the dynamic expansion of subjects and fine-grained access to objects,but a centralized authority exists.This study proposes an anonymous data sharing and access control scheme based on blockchain and Attribute-Based Cryptography(ABC)to solve the above problems.Using the anonymity of Attribute-Based Signature(ABS),the reliability of data sources can be verified without knowing the user identity information before storing the data,and fine-grained access control is achieved through Attribute-Based Encryption(ABE).The distributed ABC system is used to enable users to cooperate in building an attribute authority.Authority creation and key distribution can only be performed when the users exceed a specified threshold.The experimental results show that the scheme can resist collusion and replay attacks.Under the condition that the number of concurrent requests is 1000-5000 and the number of attributes is 10-30,the total response time of the system does not exceed 120 ms,and the maximum throughput can reach 62 T/s,which satisfy the requirements of the actual environment.
作者 王静怡 刘百祥 方宁 彭凌祺 WANG Jingyi;LIU Baixiang;FANG Ning;PENG Lingqi(School of Computer Science,Fudan University,Shanghai 200433,China;Shanghai Engineering Research Center of Blockchain,Shanghai 200433,China;Yiwu Research Institute,Fudan University,Yiwu 322000,Zhejiang,China;Shanghai Huahong Jitong Smart System Co.,Ltd.,Shanghai 201206,China)
出处 《计算机工程》 CAS CSCD 北大核心 2023年第10期41-52,共12页 Computer Engineering
基金 国家重点研发计划(2019YFB2101702) 国家自然科学基金(62272107,U19A2066) 广东省重点领域研发计划(2020B0101090001) 上海市科委科技创新行动计划(20222420800,20511102200)。
关键词 区块链 属性密码体制 访问控制 身份认证 隐私保护 blockchain Attribute-Based Cryptography(ABC) access control identity authentication privacy protection
  • 相关文献

参考文献9

二级参考文献63

  • 1徐锋,王远,张林,吕建.一个开放环境中信任链发现算法的设计与分析[J].计算机研究与发展,2006,43(z2):72-77. 被引量:2
  • 2XIE Qi 1,2, YU Xiu-yuan 3 1.Department of Mathematics, Zhejiang University, Hangzhou 310027, Zhejiang,China,2.School of Information and Engineering, Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China,3.Hangzhou Teachers College, Hangzhou 310012, Zhejiang, China.A New (t, n) Threshold Signature Scheme Withstanding the Conspiracy Attack[J].Wuhan University Journal of Natural Sciences,2005,10(1):107-110. 被引量:13
  • 3沈海波,洪帆.访问控制模型研究综述[J].计算机应用研究,2005,22(6):9-11. 被引量:87
  • 4张文芳,何大可,王宏霞,王小敏.具有可追查性的抗合谋攻击(t,n)门限签名方案[J].西南交通大学学报,2007,42(4):461-467. 被引量:16
  • 5DESMEDT Y, FRANKEL Y. Shared generation of authentications and signature [ C ] // Proc of Advances in Cryptology- Crypto'91. Berlin: Springer-Verlag, 1991:457-469.
  • 6SHAMIR A. How to share a secret[J]. Communications of the ACM, 1979, 22(11) : 612-613.
  • 7L! Chuan-ming, HWANG T, LEE N Y. Remark on the threshold RSA signature scheme [ C ] // Proc of Advances in Cryptology-Crypto'93. Berlin : Springer-Verlag, 1994 : 413-420.
  • 8HARN L. Group-oriented (t, n) threshold signature scheme and digital multi-signature [J]. IEE Proceedings of Computers and Digital Technique, 1994, 141 (5) : 307-313.
  • 9ELGAMAL T. A public key cryptosystem and a signature scheme based on discrete logarithms [ J]. IEEE Transaction on Information Theory, 1985, IT-31 (4) : 469-472.
  • 10AGNEW G B, MULIN R C, van STONE S A. Improved digital signature scheme based on discrete exponentiation[ J] Electronics Letters, 1990, 26 (14) : 1024-1025.

共引文献384

同被引文献36

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部