Netinfo Security ›› 2022, Vol. 22 ›› Issue (5): 84-93.doi: 10.3969/j.issn.1671-1122.2022.05.010
Previous Articles Next Articles
CUI Haoyu1,2, MA Limin1,2, WANG Jiahui3, ZHANG Wei2()
Received:
2022-03-09
Online:
2022-05-10
Published:
2022-06-02
Contact:
ZHANG Wei
E-mail:zhwei@bistu.edu.cn
CLC Number:
CUI Haoyu, MA Limin, WANG Jiahui, ZHANG Wei. Research on the Security Model of Multi-Authority for Attribute Encryption Based on Blockchain[J]. Netinfo Security, 2022, 22(5): 84-93.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2022.05.010
[1] |
LIU Chilun. Cloud Service Access Control System Based on Ontologies[J]. Advances in Engineering Software, 2014, 69: 26-36.
doi: 10.1016/j.advengsoft.2013.12.006 URL |
[2] | CHEN Danwei, HUANG Xiuli, REN Xunyi. Access Control of Cloud Service Based on UCON[C]// Springer. Proceedings of the 1st International Conference on Cloud Computing. Heidelberg: Springer, 2009: 559-564. |
[3] | BELLARE M, DESAI A, JOKIPII E, et al. A Concrete Security Treatment of Symmetric Encryption[C]// IEEE. Proceedings of the 38th Annual Symposium on Foundations of Computer Science. Washington, DC: IEEE, 1997: 394-403. |
[4] | CURTMOLA R, GARAY J, KAMARA S, et al. Searchable Symmetric Encryption: Improved Definitions and Efficient Constructions[C]// ACM. Proceedings of the 13th ACM Conference on Computer and Communications Security. New York: ACM, 2006: 79-88. |
[5] |
CRAMER R, SHOUP V. Design and Analysis of Practical Public-Key Encryption Schemes Secure Against Adaptive Chosen Ciphertext Attack[J]. Siam Journal on Computing, 2004, 33(1): 167-226.
doi: 10.1137/S0097539702403773 URL |
[6] |
BALDI M, BIANCHI M, CHIARALUCE F, et al. Enhanced Public Key Security for the McEliece Cryptosystem[J]. Journal of Cryptology, 2016, 29(1): 1-27.
doi: 10.1007/s00145-014-9187-8 URL |
[7] | SAHAI A, WATERS B. Fuzzy Identity-Based Encryption[C]// Springer. Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques. Heidelberg: Springer, 2005: 457-473. |
[8] | DAN B, FRANKLIN M. Identity-Based Encryption from the Weil Pairing[C]// Springer. Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology. Heidelberg: Springer, 2001: 213-229. |
[9] | SUN Li. Research and Application of Information Protection Mechanism for Online Education Resource Alliance[J]. Netinfo Security, 2021, 21(9): 32-39. |
孙力. 区块链+在线教育资源联盟信息保护机制研究与应用[J]. 信息网络安全, 2021, 21(9):32-39. | |
[10] | CAO Lei. Cloud Outsourcing Attribute Base Encryption for Hidden Structure in Mobile Medical Service[D]. Xi'an: Xidian University, 2015. |
[11] | CHASE M. Multi-Authority Attribute Based Encryption[C]// Springer. Proceedings of the 4th Theory of Cryptography Conference Amsterdam. Heidelberg: Springer, 2007: 515-534. |
[12] | CHASE M, CHOW S. Improving Privacy and Security in Multi-Authority Attribute-Based Encryption[C]// ACM. Proceedings of the 16th ACM conference onComputer and communications security. New York: ACM, 2009: 121-130. |
[13] | LEWKO A, WATERS B. Decentralizing Attribute-Based Encryption[C]// Springer. Proceedings of the 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Heidelberg: Springer, 2011: 568-588. |
[14] | YUAN Chao, XU Mixue, SI Xueming, et al. Blockchain with Accountable CP-ABE: How to Effectively Protect the Electronic Documents[C]// IEEE. Proceedings of the 2017 IEEE 23rd International Conference on Parallel and Distributed Systems. Washington: IEEE, 2017: 800-803. |
[15] | ZHENG Lianghan, HE Heng, TONG Qian, et al. Multi-Authority Access Control Scheme in Cloud Environment[J]. Journal of Frontiers of Computer Science and Technology, 2020, 14(11): 1865-1878. |
郑良汉, 何亨, 童潜, 等. 云环境中的多授权机构访问控制方案[J]. 计算机科学与探索, 2020, 14(11):1865-1878. | |
[16] | BEIMEL A. Secure Schemes for Secret Sharing and Key Distribution[D]. Haifa: Israel Institute of Technology, 1996. |
[17] | WANG Jinmiao, XIE Yongheng, WANG Guowei, et al. A Method of Privacy Preserving and Access Control in Blockchain Based on Attribute-Based Encryption[J]. Netinfo Security, 2020, 20(9): 47-51. |
汪金苗, 谢永恒, 王国威, 等. 基于属性基加密的区块链隐私保护与访问控制方法[J]. 信息网络安全, 2020, 20(9):47-51. | |
[18] | YU Shucheng, WANG Cong, REN Kui, et al. Achieving Secure, Scalable, and Fine-Grained Data Access Control in Cloud Computing[C]// IEEE. Proceedings of the Infocom 2010. New York: IEEE, 2010: 1-9. |
[19] | YU Jingang, ZHANG Hong, LI Shu, et al. Data Sharing Model for Internet of Things Based on Blockchain[J]. Journal of Chinese Mini-Micro Computer Systems, 2019, 40 (11): 2324-2329. |
[20] | LI Jiguo, SHI Yuerong, ZHANG Yichen. Searchable Ciphertext-Policy Attribute-Based Encryption with Revocation in Cloud Storage[J]. International Journal of Communication Systems, 2017, 30(1): 2942-2955. |
[21] | TIAN Youliang, YANG Kedi, WANG Zuan, et al. Algorithm of Blockchain Data Provenance Based on ABE[J]. Journal on Communications, 2019, 40 (11): 101-111. |
田有亮, 杨科迪, 王缵, 等. 基于属性加密的区块链数据溯源算法[J]. 通信学报, 2019, 40(11):101-111. | |
[22] | YAN Xixi, YUAN Xiaohan, TANG Yongli, et al. Verifiable Attribute-Based Searchable Encryption Scheme Based on Blockchain[J]. Journal on Communications, 2020, 41(2): 187-198. |
闫玺玺, 原笑含, 汤永利, 等. 基于区块链且支持验证的属性基搜索加密方案[J]. 通信学报, 2020, 41(2):187-198. | |
[23] | WATERS B. Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization[C]// Springer. Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography. Heidelberg: Springer, 2011: 53-70. |
[24] | JUNG T, LI Xiangyang, WAN Zhiguo, et al. Privacy Preserving Cloud Data Access with Multi-Authorities[C]// IEEE. Proceedings of the Infocom 2013. New York: IEEE, 2013: 2625-2633. |
[1] | FENG Jingyu, ZHANG Qi, HUANG Wenhua, HAN Gang. A Cyber Threat Intelligence Sharing Scheme Based on Cross-Chain Interaction [J]. Netinfo Security, 2022, 22(5): 21-29. |
[2] | LIU Jiawei, MA Zhaofeng, WANG Shushuang, LUO Shoushan. Research on the Restricted Sharing Technology of Private Credit Data Based on Blockchain [J]. Netinfo Security, 2022, 22(5): 54-63. |
[3] | SHI Runhua, WANG Shuhao, LI Kunchang. A Lightweight Cross-domain Mutual Authentication Scheme in V2G Networks [J]. Netinfo Security, 2022, 23(3): 20-28. |
[4] | CHEN Binjie, WEI Fushan, GU Chunxiang. Blockchain Abnormal Transaction Detection with Privacy-preserving Based on KNN [J]. Netinfo Security, 2022, 23(3): 78-84. |
[5] | WANG Jian, ZHANG Yunjia, LIU Jiqiang, CHEN Zhihao. Blockchain-based Mechanism for Judicial Data Management and Electronic Evidence Storage [J]. Netinfo Security, 2022, 22(2): 21-31. |
[6] | LIU Feng, YANG Chengyi, YU Xincheng, QI Jiayin. Spectral Graph Convolutional Neural Network for Decentralized Dual Differential Privacy [J]. Netinfo Security, 2022, 22(2): 39-46. |
[7] | HOU Yutong, MA Zhaofeng, LUO Shoushan. Research and Implementation of Data Security Sharing and Controlled Distribution Technology Based on Blockchain [J]. Netinfo Security, 2022, 22(2): 55-63. |
[8] | LIU Xin, WANG Jiayin, YANG Haorui, ZHANG Ruisheng. An Internet of Vehicles Authentication Protocol Based on Blockchain and secGear Framework [J]. Netinfo Security, 2022, 22(1): 27-36. |
[9] | FENG Jingyu, WANG Tao, YU Tingting, ZHANG Wenbo. A Secure Medical Data Sharing Scheme Based on Multi-clouds and Multi-chains Collaboration [J]. Netinfo Security, 2022, 22(1): 9-18. |
[10] | SUN Li. Research and Application of Information Protection Mechanism for Online Education Resource Alliance [J]. Netinfo Security, 2021, 21(9): 32-39. |
[11] | CHEN Kaijie, XIONG Yan, HUANG Wenchao, WU Jianshuang. A Formal Analysis Method of PoS Consensus Protocol Based on Byzantine Fault Tolerance [J]. Netinfo Security, 2021, 21(8): 35-42. |
[12] | REN Tao, JIN Ruochen, LUO Yongmei. Network Intrusion Detection Algorithm Integrating Blockchain and Federated Learning [J]. Netinfo Security, 2021, 21(7): 27-34. |
[13] | WU Yi, ZHONG Sheng. Research on Raft Consensus Algorithm for Blockchain [J]. Netinfo Security, 2021, 21(6): 36-44. |
[14] | LI Peng, ZHENG Tiantian, XU He, ZHU Feng. RFID Security Authentication Protocol Based on Blockchain Technology [J]. Netinfo Security, 2021, 21(5): 1-11. |
[15] | ZHOU Yousheng, ZHONG Tianqi. Blockchain-based Fair Exchange Scheme [J]. Netinfo Security, 2021, 21(5): 19-30. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||