Netinfo Security ›› 2025, Vol. 25 ›› Issue (1): 98-109.doi: 10.3969/j.issn.1671-1122.2025.01.009
Previous Articles Next Articles
ZHANG Xinyou, LIU Qingfu(), FENG Li, XING Huanlai
Received:
2024-09-15
Online:
2025-01-10
Published:
2025-02-14
Contact:
LIU Qingfu
E-mail:qfliu_caly@163.com
CLC Number:
ZHANG Xinyou, LIU Qingfu, FENG Li, XING Huanlai. Smart Grid Data Security Sharing Model Based on Multi-Authority Attribute-Based Encryption[J]. Netinfo Security, 2025, 25(1): 98-109.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2025.01.009
方案 | AA密钥 生成开销 | 用户密钥 生成开销 | DO加密开销 | DU解密开销 |
---|---|---|---|---|
本文 方案 | UExp+UMap | 2GUExp+ GUMul+ UHash | (1+2GU)+(2Exp+ Mul)+Map | GU(2Map+Exp)+ (1+2GU)Mul |
文献[ 方案 | SmaxUExp+ AUMap | GUSmax(Exp+ Mul)-GUMul | GUSmaxMul+(1+ GU(2Smax+ 3))Exp+Map | (2GU+1)Mul+GuExp+ GuSmaxMap |
文献[ 方案 | (2AU+U)Exp+ UHash | — | (GU+AU)Mul+ (4GU+1)Exp | (AU+GU+1)Exp+ (2GU+1)Mul) |
文献[ 方案 | UMul+(2U+ 3AU)Exp+ Map+UHash | (AU+GU)Mul+ (3AU+3GU)Exp+ GUHash | (AU+GU)Mul+ (AU+4GU+3)Exp+ GUMap+GUHash | (2GU+AU+1)Mul+ (GU+1)Exp+(AU+ 4GU)Map |
[1] | POWELL J, MCCAFFERTY-LEROUX A, HILAL W, et al. Smart Grids: A Comprehensive Survey of Challenges, Industry Applications, and Future Trends[J]. Energy Reports, 2024, 11: 5760-5785. |
[2] | QIN Sihang, DAI Weiqi, ZENG Haiyan, et al. Secure Sharing of Power Application Data Based on Blockchain[J]. Netinfo Security, 2023, 23(8): 52-65. |
覃思航, 代炜琦, 曾海燕, 等. 基于区块链的电力应用数据安全共享研究[J]. 信息网络安全, 2023, 23(8): 52-65. | |
[3] | ZHANG Ming, LIU Yutong, CHENG Qian, et al. Smart Grid Security Based on Blockchain and Smart Contract[J]. Peer-to-Peer Networking and Applications, 2024, 17(4): 2167-2184. |
[4] | MOLLAH M B, ZHAO Jun, NIYATO D, et al. Blockchain for Future Smart Grid: A Comprehensive Survey[J]. IEEE Internet of Things Journal, 2021, 8(1): 18-43. |
[5] | CHEN Ningyu, LI Jiguo, ZHANG Yichen, et al. Efficient CP-ABE Scheme with Shared Decryption in Cloud Storage[J]. IEEE Transactions on Computers, 2022, 71(1): 175-184. |
[6] | MU Tianshi, LAI Yuyang, FENG Guocong, et al. A User-Friendly Attribute-Based Data Access Control Scheme for Smart Grids[J]. Alexandria Engineering Journal, 2023, 67: 209-217. |
[7] |
YANG Wenti, GUAN Zhitao, WU Longfei, et al. Secure Data Access Control with Fair Accountability in Smart Grid Data Sharing: An Edge Blockchain Approach[J]. IEEE Internet of Things Journal, 2021, 8(10): 8632-8643.
doi: 10.1109/JIOT.2020.3047640 |
[8] | XIA Zhe, LUO Bin, XU Guibin, et al. Privacy-Preserving Data Aggregation with Fine Grained Access Control for Smart Grid[J]. Netinfo Security, 2021, 21(11): 28-39. |
夏喆, 罗宾, 徐桂彬, 等. 智能电网中支持细粒度访问控制的隐私保护数据聚合方案[J]. 信息网络安全, 2021, 21(11): 28-39. | |
[9] | SAHAI A, WATERS B. Fuzzy Identity-Based Encryption[C]// Springer. Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques. Heidelberg: Springer, 2005: 457-473. |
[10] | ZHOU Zhibin, HUANG Dijiang, WANG Zhijie. Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption[J]. IEEE Transactions on Computers, 2015, 64(1): 126-138. |
[11] | YANG Dan, WAGN Baocang, BAN Xuehua. Fully Secure Non-Monotonic Access Structure CP-ABE Scheme[J]. KSII Transactions on Internet and Information Systems, 2018, 12(3): 1315-1329. |
[12] |
DING Sheng, CAO Jin, LI Hui. Efficient Pairing-Free CP-ABE Based on Ordered Binary Decision Diagram[J]. Journal on Communications, 2019, 40(12): 1-8.
doi: 10.11959/j.issn.1000-436x.2019234 |
丁晟, 曹进, 李晖. 基于OBDD访问结构的无配对CP-ABE方案[J]. 通信学报, 2019, 40(12): 1-8.
doi: 10.11959/j.issn.1000-436x.2019234 |
|
[13] | LEWKO A, WATERS B. Decentralizing Attribute-Based Encryption[C]// Springer. Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Heidelberg: Springer, 2011: 568-588. |
[14] | DATTA P, KOMARGODSKI I, WATERS B. Decentralized Multi-Authority ABE for NC^1 from BDH[J]. Journal of Cryptology, 2023, 36(2): 1432-1378. |
[15] | SUN Keshuo, GAO Haiying, SONG Yang. Multi-Authority Attribute-Based Encryption Scheme for Private Blockchain over Public Blockchain[EB/OL]. (2024-03-04)[2024-05-08]. http://kns.cnki.net/kcms/detail/51.1307.TP.20240229.1614.006.html. |
孙科硕, 高海英, 宋杨. 面向公有区块链上的私有区块链的多权威属性加密方案[EB/OL]. (2024-03-04)[2024-05-08]. http://kns.cnki.net/kcms/detail/51.1307.TP.20240229.1614.006.html. | |
[16] | CHRISTIDIS K, DEVETSIKIOTIS M. Blockchains and Smart Contracts for the Internet of Things[J]. IEEE Access, 2016, 4: 2292-2303. |
[17] | ZHENG Hui, SHAO Jun, WEI Guiyi. Attribute-Based Encryption with Outsourced Decryption in Blockchain[J]. Peer-to-Peer Networking and Applications, 2020, 13(5): 1643-1655. |
[18] | LI Jian, QI Yong. Blockchain Data Access Control Method with Revocable Attribute Encryption[J]. Computer Engineering and Design, 2024, 45(2): 348-355. |
李健, 戚湧. 可撤销属性加密的区块链数据访问控制方法[J]. 计算机工程与设计, 2024, 45(2): 348-355. | |
[19] | MENG Bo, WANG Yibing, ZHAO Can, et al. Survey on Crosschain Protocols of Blockchain[J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(10): 2177-2192. |
[20] | BEIMEL A. Secure Schemes for Secret Sharing and Key Distribution[D]. Haifa: Technion-Israel Institute of Technology, 1996. |
[21] | GENCER A E, BASU S, EYAL I, et al. Decentralization in Bitcoin and Ethereum Networks[EB/OL]. (2018-01-11)[2024-05-08]. https://arxiv.org/abs/1801.03998v2. |
[22] | YU Keping, TAN Liang, ALOQAILY M, et al. Blockchain-Enhanced Data Sharing with Traceable and Direct Revocation in IIoT[J]. IEEE Transactions on Industrial Informatics, 2021, 17(11): 7669-7678. |
[23] | WATERS B. Ciphertext-Policy Attribute-Based Encryption:An Expressive, and Provably Secure Realization[C]// Springer. Lecture Notes in Computer Science. Heidelberg: Springer, 2011: 53-70. |
[24] | ZHENG Zibin, XIE Shaoan, DAI Hongning, et al. An Overview on Smart Contracts: Challenges, Advances and Platforms[J]. Future Generation Computer Systems, 2020, 105: 475-491. |
[25] | LING Zhi, YANG Ming, YU Jiangyin,. Research on Power Security Trading Platform Based on IPFS and Blockchain Technology[J]. Netinfo Security, 2024, 24(6): 968-976. |
凌治, 杨明, 余江银. 基于IPFS和区块链技术的电力安全交易平台研究[J]. 信息网络安全, 2024, 24(6): 968-976. | |
[26] | MING Yang, HE Baokang, WANG Chenhao. Efficient Revocable Multi-Authority Attribute-Based Encryption for Cloud Storage[J]. IEEE Access, 2021, 9: 42593-42603. |
[27] |
MING Yang, HE Baokang. Attribute Revocation and Verifiable Outsourcing Supported Multi-Authority Attribute-Based Encryption Scheme[J]. Journal of Computer Applications, 2019, 39(12): 3556-3562.
doi: 10.11772/j.issn.1001-9081.2019061019 |
明洋, 何宝康. 支持属性撤销的可验证外包的多授权属性加密方案[J]. 计算机应用, 2019, 39(12): 3556-3562.
doi: 10.11772/j.issn.1001-9081.2019061019 |
|
[28] | BUTERIN V. Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform[EB/OL]. [2024-05-08]. https://blockchainlab.com/pdf/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalik-buterin.pdf. |
[29] | CHOI W, HONG J W K. Performance Evaluation of Ethereum Private and Testnet Networks Using Hyperledger Caliper[C]// IEEE. 2021 the 22nd Asia-Pacific Network Operations and Management Symposium (APNOMS). New York: IEEE, 2021: 325-329. |
[30] | GUO Zhenzhen, WANG Gaoli, DUNKELMAN O, et al. Tweakable SM4: How to Tweak SM4 into Tweakable Block Ciphers?[EB/OL]. (2022-10-20)[2024-05-08]. https://doi.org/10.1016/j.jisa.2022.103406. |
[1] | LYU Qiuyun, ZHOU Lingfei, REN Yizhi, ZHOU Shifei, SHENG Chunjie. A Lifecycle-Manageable Public Data Sharing Scheme [J]. Netinfo Security, 2024, 24(8): 1291-1305. |
[2] | GUO Rui, YANG Xin, WANG Junming. Verifiable and Revocable Attribute Encryption Scheme Based on Blockchain [J]. Netinfo Security, 2024, 24(6): 863-878. |
[3] | WANG Wei, HU Yongtao, LIU Qingtao, WANG Kailun. Research on Softwaization Techniques for ERT Trusted Root Entity in Railway Operation Environment [J]. Netinfo Security, 2024, 24(5): 794-801. |
[4] | ZHOU Quan, CHEN Minhui, WEI Kaijun, ZHENG Yulong. Blockchain Access Control Scheme with SM9-Based Attribute Encryption [J]. Netinfo Security, 2023, 23(9): 37-46. |
[5] | QIN Sihang, DAI Weiqi, ZENG Haiyan, GU Xianjun. Secure Sharing of Power Application Data Based on Blockchain [J]. Netinfo Security, 2023, 23(8): 52-65. |
[6] | SHI Runhua, XIE Chenlu. Verifiable Outsourcing EMR Scheme with Attribute-Based Encryption in Cloud-Edge Environments [J]. Netinfo Security, 2023, 23(7): 9-21. |
[7] | ZHANG Xiaoxu, SHI Runhua. An Access Control Scheme for Verifying the Correctness of Outsourcing Encrypted Data in EHR System [J]. Netinfo Security, 2023, 23(5): 85-94. |
[8] | LIU Changjie, SHI Runhua. A Smart Grid Intrusion Detection Model for Secure and Efficient Federated Learning [J]. Netinfo Security, 2023, 23(4): 90-101. |
[9] | ZHU Yixin, MIAO Zhangwang, GAN Jinghong, MA Cunqing. Design of Ransomware Defense System Based on Fine-Grained Access Control Scheme [J]. Netinfo Security, 2023, 23(10): 31-38. |
[10] | JIN Zhigang, LIU Kai, WU Xiaodong. A Review of IDS Research in Smart Grid AMI Field [J]. Netinfo Security, 2023, 23(1): 1-8. |
[11] | WANG Jian, HUANG Jun. Smart Contract-Based Log Secure Storage and Fair Access Method [J]. Netinfo Security, 2022, 22(7): 27-36. |
[12] | YU Kechen, GUO Li, YIN Hongwei, YAN Xuesong. The High-Value Data Sharing Model Based on Blockchain and Game Theory for Data Centers [J]. Netinfo Security, 2022, 22(6): 73-85. |
[13] | GUO Baoxia, WANG Jiahui, MA Limin, ZHANG Wei. Research on Dynamic Access Control Model of Sensitive Data Based on Zero Trust [J]. Netinfo Security, 2022, 22(6): 86-93. |
[14] | LIU Jiawei, MA Zhaofeng, WANG Shushuang, LUO Shoushan. Research on the Restricted Sharing Technology of Private Credit Data Based on Blockchain [J]. Netinfo Security, 2022, 22(5): 54-63. |
[15] | FENG Jingyu, SHI Yifei, WANG Teng. Crowd Spectrum Sensing Reinforcement Scheme Against Primary-secondary Collusive Attack in Smart Grid [J]. Netinfo Security, 2022, 22(3): 1-9. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||