Netinfo Security ›› 2026, Vol. 26 ›› Issue (2): 315-324.doi: 10.3969/j.issn.1671-1122.2026.02.011

Previous Articles     Next Articles

Hierarchical Role-Based Encryption Scheme Based on Trusted Execution Environment

ZHAO Jia1(), WANG Yanchun1, MA Hongliang2, LI Qi3   

  1. 1. Intelligent Trafic Data Security and Privacy Protection Technology Laboratory, Beijing Jiaotong University, Beijing 100044, China
    2. Xinjiang Production and Construction Corps Key Laboratory of Computing Intelligence and Network Information Security, Shihezi 832003, China
    3. Institute of Computing Technologies, China Academy of Railway Sciences Group Co., Ltd., Beijing 100081, China
  • Received:2025-04-23 Online:2026-02-10 Published:2026-02-23

Abstract:

This paper proposed a hierarchical role-based encryption scheme based on trusted execution environment to address the shortcomings of existing encryption technologies in data sensitivity protection and runtime security. The scheme combined hierarchical role-based encryption with trusted computing, dynamically matching data access permissions and sensitivity requirements by selecting different levels of role public keys for encryption based on data sensitivity. For general data, encryption was performed using keys from deeper-level nodes, while for highly sensitive data, keys from shallow-level nodes closer to the root were used. Furthermore, encryption operations and key management were carried out within the trusted execution environment, ensuring that encryption keys and sensitive data were not compromised or tampered with during processing, effectively addressing the shortcomings of conventional encryption schemes in runtime protection. Additionally, by leveraging the hardware isolation characteristics of trusted execution environment and hierarchical role-based encryption, the system enhanced its resistance to attacks and implemented more refined access control management. Experimental results demonstrate that the proposed scheme not only ensures data security but also offers high efficiency.

Key words: data encryption, identity-based encryption, trusted execution environment, Intel SGX

CLC Number: