期刊文献+

基于CPABE的分布式数据访问控制与共享方案 被引量:2

Distributed Data Access Control and Sharing Scheme Based on CPABE
下载PDF
导出
摘要 目前“区块链+密文属性加密”数据共享方案仍通过一个或多个权威机构进行密钥生成、管理和分发工作,易造成授权机构审计难、加/解密开销大和密钥滥用的可能。针对以上问题,提出基于CPABE的分布式数据访问控制与共享方案,实现无授权机构参与下的可证明数据安全共享及其隐私保护技术。通过代理密钥封装技术对CP-ABE算法主密钥进行基于区块链的分布式管理,并采用区块链双链模型,实现了代理密钥封装机制(PKEM)与CP-ABE的算法功能安全隔离,提高系统运行效率和安全性;设计区块结构与数据格式规范,实现PKEM-CPABE算法的全过程管理和操作行为可追溯的链上监管。仿真实验分析表明,所改进的算法在保护数据隐私的同时,实现了高效率的安全共享机制。 At present,the data sharing scheme with blockchain & CP-ABE(ciphertext-policy attribute-based encryption)still uses one or more authority organizations to generate,manage and distribute keys,which is easy to cause single point failure of authorization agencies,high algorithm overhead and the possibility of secret keys leakage of node users.Therefore,this paper proposes a distributed data access control and sharing scheme based on decentralized CP-ABE to realize privacy protection and its provable data security.First of all,the master key(MSK)of the CPABE based on the block chain is distributed through the proxy key encapsulation mechanism,and in order to improve the efficiency and security of the system,the dual-chain model is adopted to realize the security isolation for the proxy key encapsulation mechanism(PKEM)and CP-ABE algorithm.Secondly,this paper designs the block structure and data format specification to manage the whole processes of PKEM-CPABE algorithm and the audible traceability operation behavior.Finally,the security and experimental analytics shows that the proposed algorithm not only protects data privacy,but also implements an efficient security sharing mechanism.
作者 张晓东 陈韬伟 余益民 ZHANG Xiaodong;CHEN Taowei;YU Yimin(School of Information,Yunnan University of Finance and Economics,Kunming 650221,China;Yunnan Key Laboratory of Blockchain Application Technology,Kunming 650221,China;Intelligent Application Research Institute,Yunnan University of Finance and Economics,Kunming 650221,China)
出处 《计算机工程与应用》 CSCD 北大核心 2023年第23期254-262,共9页 Computer Engineering and Applications
基金 国家自然科学基金(71964037) 云南省区块链应用技术重点实验室开放课题(YNB202108) 中央引导地方科技发展专项资金(202007AD110001) 电子政务建模仿真国家工程实验室开放课题(MEL-18-03)。
关键词 区块链 属性基加密 代理密钥封装 数据共享 访问控制 blockchain attribute-based encryption proxy key encapsulation mechanism data sharing access control
  • 相关文献

参考文献6

二级参考文献66

  • 1Fiat A, Naor M. Broadcast encryption. In: Stinson DR, ed. Advances in Cryptology-CRYPTO'93. Berlin, Heidelberg: Springer- Verlag, 1994. 480-491.
  • 2Naor D, Naor M, Lotspiech J. Revocation and tracing schemes for stateless receivers. In: Kilian J, ed. Advances in Cryptology- CRYPTO 2001. Berlin, Heidelberg: Springer-Verlag, 2001.41-62.
  • 3Boneh D, Gentry C, Waters B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In: Shoup V, ed. Advances in Crytology-CRYPTO 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 258-275. [doi: 10.1007/11535218_16].
  • 4Shamir A. Identity-Based cryptosystems and signature schemes. In: Blakley GR, Chaum D, eds. Advances in Cryptology- CRYPTO'84. Berlin, Heidelberg: Springer-Verlag, 1984.47-53.
  • 5Boneh D, Franklin M. Identity-Based encryption from the weil pairing. In: Kilian J, ed. Advances in Cryptology-CRYPTO 2001. LNCS 2139, Berlin, Heidelberg: Springer-Verlag, 2001. 213-229. [doi: 10.1007/3-540-44647-8_13].
  • 6Sahai A, Waters B. Fuzzy identity-based encryption. In: Cramer R, ed. Advances in Cryptology-EUROCRYPT 2005. Berlin, Heidelberg: Springer-Verlag, 2005. 457-473.
  • 7Goyal V, Pandey O, Sahai A, Waters B. Attribute-Based encryption for fine-grained access control of encrypted data. In: Proc. of the 13th ACM Conf. on Computer and Communications Security. New York: ACM Press, 2006. 89-98. [doi: 10.1145/1180405. 1180418].
  • 8Yu SC, Ren K, Lou WJ. Attribute-Based content distribution with hidden policy. In: Proc. of the 4th Workshop on Secure Network Protocols (NPSec). Orlando: IEEE Computer Society, 2008.39-44. [doi: 10.1109/NPSEC.2008.4664879].
  • 9Traynor P, Butler K, Enck W, Mcdaniel P. Realizing massive-scale conditional access systems through attribute-based cryptosystems. In: Proc. of the 15th Annual Network and Distributed System Security Symp. (NDSS 2008). San Diego: USENIX Association, 2008.1-13.
  • 10Cheung L, Newport C. Provably secure ciphertext policy ABE. In: Proc. of the ACM Conf. on Computer and Communications Security. New York: ACM Press, 2007.456-465. [doi: 10.1145/1315245.1315302].

共引文献203

同被引文献18

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部