Advertisement

Efficient and privacy-preserving traceable attribute-based encryption in blockchain

  • Axin Wu
  • Yinghui Zhang
  • Xiaokun Zheng
  • Rui Guo
  • Qinglan Zhao
  • Dong Zheng
Article
  • 62 Downloads

Abstract

Attribute-based encryption, especially ciphertext-policy attribute-based encryption, plays an important role in the data sharing. In the process of data sharing, the secret key does not contain the specific information of users, who may share his secret key with other users for benefits without being discovered. In addition, the attribute authority can generate the secret key from any attribute set. If the secret key is abused, it is difficult to judge whether the abused private key comes from users or the attribute authority. Besides, the access control structure usually leaks sensitive information in a distributed network, and the efficiency of attribute-based encryption is a bottleneck of its applications. Fortunately, blockchain technology can guarantee the integrity and non-repudiation of data. In view of the above issues, an efficient and privacy-preserving traceable attribute-based encryption scheme is proposed. In the proposed scheme, blockchain technologies are used to guarantee both integrity and non-repudiation of data, and the ciphertext can be quickly generated by using the pre-encryption technology. Moreover, attributes are hidden in anonymous access control structures by using the attribute bloom filter. When a secret key is abused, the source of the abused secret key can be audited. Security and performance analysis show that the proposed scheme is secure and efficient.

Keywords

CP-ABE Fast ciphertext generation Hidden policies Public traceability 

Notes

Acknowledgements

This work is supported by National Key R&D Program of China (No. 2017YFB0802000), National Natural Science Foundation of China (No. 61772418, 61472472, 61402366), Natural Science Basic Research Plan in Shaanxi Province of China (No. 2018JZ6001, 2015JQ6236), and the Youth Innovation Team of Shaanxi Universities. Yinghui Zhang is supported by New Star Team of Xi’an University of Posts and Telecommunications (No. 2016-02).

References

  1. 1.
    Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: International conference on theory and applications of cryptographic techniques, pp 457–473Google Scholar
  2. 2.
    Zhang Y, Zheng D, Guo R, Zhao Q (2018) Fine-grained access control systems suitable for resource-constrained users in cloud computing. Computing and Informatics 37(2):327–348CrossRefGoogle Scholar
  3. 3.
    Zhang Y, Wu A, Zheng D (2018) Efficient and privacy-aware attribute-based data sharing in mobile cloud computing. J Ambient Intell Humaniz Comput 9(4):1039–1048CrossRefGoogle Scholar
  4. 4.
    Zheng D, Wu A, Zhang Y, Zhao Q (2018) Efficient and privacy-preserving medical data sharing in internet of things with limited computing power. IEEE Access 6:28019–28027CrossRefGoogle Scholar
  5. 5.
    Wu A, Zheng D, Zhang Y, Yang M (2018) Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing. Sensors(Basel, Switzerland) 18(7):1–17Google Scholar
  6. 6.
    Gaetani E, Aniello L, Baldoni R, Lombardi F, Margheri A, Sassone V (2017) Blockchain-based database to ensure data integrity in cloud computing environments. In: Italian conference on cybersecurityGoogle Scholar
  7. 7.
    Hari A, Lakshman TV (2016) The internet blockchain: a distributed, tamper-resistant transaction framework for the internet. In: ACM workshop on hot topics in networks, pp 204–210Google Scholar
  8. 8.
    Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: CCS 07 ACM conference on computer & communications security, pp 195–203Google Scholar
  9. 9.
    Li J, Chen X, Chow SSM, Huang Q, Wong DS, Liu Z (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96CrossRefGoogle Scholar
  10. 10.
    Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130–2145CrossRefGoogle Scholar
  11. 11.
    Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: ACM conference on computer and communications security, pp 89–98Google Scholar
  12. 12.
    Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of ABE ciphertexts. Usenix Conference on Security 2011(3):1–16Google Scholar
  13. 13.
    Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210CrossRefGoogle Scholar
  14. 14.
    Even S, Goldreich O, Micali S (1996) Online/offline digital signatures. J Cryptol 9(1):35–67CrossRefzbMATHGoogle Scholar
  15. 15.
    Hohenberger S, Waters B (2014) Online/Offline attribute-based encryption. In: International workshop on public key cryptography, pp 293–310Google Scholar
  16. 16.
    Zhang Y, Li J, Zheng D, Li P, Tian Y (2018) Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice. J Netw Comput Appl 122:50–60CrossRefGoogle Scholar
  17. 17.
    Zhang Y, Shu J, Liu X, Li J, Zheng D (2018) Security analysis of a large-scale concurrent data anonymous batch verification scheme for mobile healthcare crowd sensing. IEEE Internet of Things Journal.  https://doi.org/10.1109/JIOT.2018.2862381
  18. 18.
    Wang X, Zhang Y, Zhu H, Jiang L (2018) An identity-based signcryption on lattice without trapdoor. Journal of Universal Computer ScienceGoogle Scholar
  19. 19.
    Li T, Chen W, Tang Y, Yan H (2018) A homomorphic network coding signature scheme for multiple sources and its application in IoT. Security and Communication Networks, 2018.  https://doi.org/10.1155/2018/9641273
  20. 20.
    Zhang Y, Yang M, Zheng D, Lang P, Wu A, Chen C (2018) Efficient and secure big data storage system with leakage resilience in cloud computing. Soft Comput 22(23):7763–7772CrossRefzbMATHGoogle Scholar
  21. 21.
    Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437MathSciNetCrossRefzbMATHGoogle Scholar
  22. 22.
    Li J, Chen X, Li M, Li J, Lee PPC, Lou W (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625CrossRefGoogle Scholar
  23. 23.
    Gao C, Lv S, Wei Y, Wang Z, Liu Z, Cheng X (2018) M-SSE: an effective searchable symmetric encryption with enhanced security for mobile devices, vol 6Google Scholar
  24. 24.
    Zhang Y, Deng RH, Shu J, Yang K, Zheng D (2018) TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain. IEEE Access 6:31077–31087CrossRefGoogle Scholar
  25. 25.
    Nishide T, Yoneyama K, Ohta K (2008) Attribute-based encryption with partially hidden encryptor-specified access structures. In: International conference on applied cryptography and network security, pp 111–129Google Scholar
  26. 26.
    Lai J, Deng RH, Li Y (2011) Fully secure cipertext-policy hiding CP-ABE. In: International conference on information security practice and experience, pp 24–39Google Scholar
  27. 27.
    Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61CrossRefGoogle Scholar
  28. 28.
    Wang H, Zheng Z, Wu L, Li P (2017) New directly revocable attribute-based encryption scheme and its application in cloud storage environment. Clust Comput 20(3):2385–2392CrossRefGoogle Scholar
  29. 29.
    Zhang Y, Li J, Zheng D, Chen X, Li H (2017) Towards privacy protection and malicious behavior traceability in smart health. Pers Ubiquit Comput 21(5):815–830CrossRefGoogle Scholar
  30. 30.
    Li J, Ren K, Kim K (2009) A2BE: accountable attribute-based encryption for abuse free access control. IACR Cryptology ePrint Archive 2009:118Google Scholar
  31. 31.
    Liu Z, Cao Z, Wong DS (2013) White-Box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans Inf Forensics Secur 8(1):76–88CrossRefGoogle Scholar
  32. 32.
    Li J, Huang Q, Chen X, Chow SSM, Wong DS, Xie D (2011) Multi-authority ciphertext-policy attribute-based encryption with accountability. In: ACM symposium on information, computer and communications security, ASIACCS 2011, Hong Kong, China, March, pp 386–390Google Scholar
  33. 33.
    Yu G, Cao Z, Zeng G, Han W (2016) Accountable ciphertext-policy attribute-based encryption scheme supporting public verifiability and nonrepudiation. In: International conference on provable security, pp 3–18Google Scholar
  34. 34.
    Chen X, Li J, Weng J, Ma J, Lou W (2014) Verifiable computation over large database with incremental updates. In: European symposium on research in computer security, pp 148–162Google Scholar
  35. 35.
    Chen X, Li J, Huang X, Ma J, Lou W (2015) New publicly verifiable databases with efficient updates. IEEE Trans Dependable Secure Comput 12(5):546–556CrossRefGoogle Scholar
  36. 36.
    Meng W, Tischhauser EW, Wang Q, Wang Y, Han J (2018) When intrusion detection meets blockchain technology: a review. IEEE Access 6(99):10179–10188CrossRefGoogle Scholar
  37. 37.
    Zhang Y, Deng Rh, Liu X, Zheng D (2018) Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Transactions on Services Computing.  https://doi.org/10.1109/TSC.2018.2864191
  38. 38.
    Zhang Y, Deng Rh, Liu X, Zheng D (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277MathSciNetCrossRefGoogle Scholar
  39. 39.
    Bloom BH (1970) Space/time trade-offs in hash coding with allowable errors. Commun ACM 13(7):422–426CrossRefzbMATHGoogle Scholar
  40. 40.
    Yang K, Han Q, Li H, Zheng K, Su Z, Shen X (2017) An efficient and fine-grained big data access control scheme with privacy-preserving policy. IEEE Internet Things J 4(2):563–571CrossRefGoogle Scholar
  41. 41.
    Dong C, Chen L, Wen Z (2013) When private set intersection meets big data: an efficient and scalable protocol. In: ACM SIGSAC conference on computer & communications security, pp 789–800Google Scholar
  42. 42.
    Seo JH (2014) Short signatures from diffie-hellman, revisited: sublinear public key, CMA security, and tighter reduction. IACR Cryptology ePrint Archive 138:2014Google Scholar
  43. 43.
    Yuan C, Xu M, Si X, Li B (2017) Blockchain with accountable CP-ABE: how to effectively protect the electronic documents. In: 2017 IEEE 23rd international conference on parallel and distributed systems (ICPADS), pp 800–803.  https://doi.org/10.1109/ICPADS.2017.00111

Copyright information

© Institut Mines-Télécom and Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Axin Wu
    • 1
    • 2
  • Yinghui Zhang
    • 1
    • 2
  • Xiaokun Zheng
    • 1
    • 2
  • Rui Guo
    • 1
    • 2
  • Qinglan Zhao
    • 1
    • 2
  • Dong Zheng
    • 1
    • 2
  1. 1.National Engineering Laboratory for Wireless SecurityXi’an University of Posts and TelecommunicationsXi’anPeople’s Republic of China
  2. 2.Westone Cryptologic Research CenterBeijingChina

Personalised recommendations