Skip to main content
Log in

Efficient and privacy-preserving traceable attribute-based encryption in blockchain

  • Published:
Annals of Telecommunications Aims and scope Submit manuscript

Abstract

Attribute-based encryption, especially ciphertext-policy attribute-based encryption, plays an important role in the data sharing. In the process of data sharing, the secret key does not contain the specific information of users, who may share his secret key with other users for benefits without being discovered. In addition, the attribute authority can generate the secret key from any attribute set. If the secret key is abused, it is difficult to judge whether the abused private key comes from users or the attribute authority. Besides, the access control structure usually leaks sensitive information in a distributed network, and the efficiency of attribute-based encryption is a bottleneck of its applications. Fortunately, blockchain technology can guarantee the integrity and non-repudiation of data. In view of the above issues, an efficient and privacy-preserving traceable attribute-based encryption scheme is proposed. In the proposed scheme, blockchain technologies are used to guarantee both integrity and non-repudiation of data, and the ciphertext can be quickly generated by using the pre-encryption technology. Moreover, attributes are hidden in anonymous access control structures by using the attribute bloom filter. When a secret key is abused, the source of the abused secret key can be audited. Security and performance analysis show that the proposed scheme is secure and efficient.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

References

  1. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: International conference on theory and applications of cryptographic techniques, pp 457–473

  2. Zhang Y, Zheng D, Guo R, Zhao Q (2018) Fine-grained access control systems suitable for resource-constrained users in cloud computing. Computing and Informatics 37(2):327–348

    Article  Google Scholar 

  3. Zhang Y, Wu A, Zheng D (2018) Efficient and privacy-aware attribute-based data sharing in mobile cloud computing. J Ambient Intell Humaniz Comput 9(4):1039–1048

    Article  Google Scholar 

  4. Zheng D, Wu A, Zhang Y, Zhao Q (2018) Efficient and privacy-preserving medical data sharing in internet of things with limited computing power. IEEE Access 6:28019–28027

    Article  Google Scholar 

  5. Wu A, Zheng D, Zhang Y, Yang M (2018) Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing. Sensors(Basel, Switzerland) 18(7):1–17

    Google Scholar 

  6. Gaetani E, Aniello L, Baldoni R, Lombardi F, Margheri A, Sassone V (2017) Blockchain-based database to ensure data integrity in cloud computing environments. In: Italian conference on cybersecurity

  7. Hari A, Lakshman TV (2016) The internet blockchain: a distributed, tamper-resistant transaction framework for the internet. In: ACM workshop on hot topics in networks, pp 204–210

  8. Ostrovsky R, Sahai A, Waters B (2007) Attribute-based encryption with non-monotonic access structures. In: CCS 07 ACM conference on computer & communications security, pp 195–203

  9. Li J, Chen X, Chow SSM, Huang Q, Wong DS, Liu Z (2018) Multi-authority fine-grained access control with accountability and its application in cloud. J Netw Comput Appl 112:89–96

    Article  Google Scholar 

  10. Zhang Y, Zheng D, Deng RH (2018) Security and privacy in smart health: efficient policy-hiding attribute-based access control. IEEE Internet Things J 5(3):2130–2145

    Article  Google Scholar 

  11. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: ACM conference on computer and communications security, pp 89–98

  12. Green M, Hohenberger S, Waters B (2011) Outsourcing the decryption of ABE ciphertexts. Usenix Conference on Security 2011(3):1–16

    Google Scholar 

  13. Li J, Huang X, Li J, Chen X, Xiang Y (2014) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210

    Article  Google Scholar 

  14. Even S, Goldreich O, Micali S (1996) Online/offline digital signatures. J Cryptol 9(1):35–67

    Article  MATH  Google Scholar 

  15. Hohenberger S, Waters B (2014) Online/Offline attribute-based encryption. In: International workshop on public key cryptography, pp 293–310

  16. Zhang Y, Li J, Zheng D, Li P, Tian Y (2018) Privacy-preserving communication and power injection over vehicle networks and 5G smart grid slice. J Netw Comput Appl 122:50–60

    Article  Google Scholar 

  17. Zhang Y, Shu J, Liu X, Li J, Zheng D (2018) Security analysis of a large-scale concurrent data anonymous batch verification scheme for mobile healthcare crowd sensing. IEEE Internet of Things Journal. https://doi.org/10.1109/JIOT.2018.2862381

  18. Wang X, Zhang Y, Zhu H, Jiang L (2018) An identity-based signcryption on lattice without trapdoor. Journal of Universal Computer Science

  19. Li T, Chen W, Tang Y, Yan H (2018) A homomorphic network coding signature scheme for multiple sources and its application in IoT. Security and Communication Networks, 2018. https://doi.org/10.1155/2018/9641273

  20. Zhang Y, Yang M, Zheng D, Lang P, Wu A, Chen C (2018) Efficient and secure big data storage system with leakage resilience in cloud computing. Soft Comput 22(23):7763–7772

    Article  MATH  Google Scholar 

  21. Li J, Li J, Chen X, Jia C, Lou W (2015) Identity-based encryption with outsourced revocation in cloud computing. IEEE Trans Comput 64(2):425–437

    Article  MathSciNet  MATH  Google Scholar 

  22. Li J, Chen X, Li M, Li J, Lee PPC, Lou W (2014) Secure deduplication with efficient and reliable convergent key management. IEEE Trans Parallel Distrib Syst 25(6):1615–1625

    Article  Google Scholar 

  23. Gao C, Lv S, Wei Y, Wang Z, Liu Z, Cheng X (2018) M-SSE: an effective searchable symmetric encryption with enhanced security for mobile devices, vol 6

  24. Zhang Y, Deng RH, Shu J, Yang K, Zheng D (2018) TKSE: Trustworthy keyword search over encrypted data with two-side verifiability via blockchain. IEEE Access 6:31077–31087

    Article  Google Scholar 

  25. Nishide T, Yoneyama K, Ohta K (2008) Attribute-based encryption with partially hidden encryptor-specified access structures. In: International conference on applied cryptography and network security, pp 111–129

  26. Lai J, Deng RH, Li Y (2011) Fully secure cipertext-policy hiding CP-ABE. In: International conference on information security practice and experience, pp 24–39

  27. Zhang Y, Chen X, Li J, Wong DS, Li H, You I (2017) Ensuring attribute privacy protection and fast decryption for outsourced data security in mobile cloud computing. Inf Sci 379:42–61

    Article  Google Scholar 

  28. Wang H, Zheng Z, Wu L, Li P (2017) New directly revocable attribute-based encryption scheme and its application in cloud storage environment. Clust Comput 20(3):2385–2392

    Article  Google Scholar 

  29. Zhang Y, Li J, Zheng D, Chen X, Li H (2017) Towards privacy protection and malicious behavior traceability in smart health. Pers Ubiquit Comput 21(5):815–830

    Article  Google Scholar 

  30. Li J, Ren K, Kim K (2009) A2BE: accountable attribute-based encryption for abuse free access control. IACR Cryptology ePrint Archive 2009:118

    Google Scholar 

  31. Liu Z, Cao Z, Wong DS (2013) White-Box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans Inf Forensics Secur 8(1):76–88

    Article  Google Scholar 

  32. Li J, Huang Q, Chen X, Chow SSM, Wong DS, Xie D (2011) Multi-authority ciphertext-policy attribute-based encryption with accountability. In: ACM symposium on information, computer and communications security, ASIACCS 2011, Hong Kong, China, March, pp 386–390

  33. Yu G, Cao Z, Zeng G, Han W (2016) Accountable ciphertext-policy attribute-based encryption scheme supporting public verifiability and nonrepudiation. In: International conference on provable security, pp 3–18

  34. Chen X, Li J, Weng J, Ma J, Lou W (2014) Verifiable computation over large database with incremental updates. In: European symposium on research in computer security, pp 148–162

  35. Chen X, Li J, Huang X, Ma J, Lou W (2015) New publicly verifiable databases with efficient updates. IEEE Trans Dependable Secure Comput 12(5):546–556

    Article  Google Scholar 

  36. Meng W, Tischhauser EW, Wang Q, Wang Y, Han J (2018) When intrusion detection meets blockchain technology: a review. IEEE Access 6(99):10179–10188

    Article  Google Scholar 

  37. Zhang Y, Deng Rh, Liu X, Zheng D (2018) Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Transactions on Services Computing. https://doi.org/10.1109/TSC.2018.2864191

  38. Zhang Y, Deng Rh, Liu X, Zheng D (2018) Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf Sci 462:262–277

    Article  MathSciNet  Google Scholar 

  39. Bloom BH (1970) Space/time trade-offs in hash coding with allowable errors. Commun ACM 13(7):422–426

    Article  MATH  Google Scholar 

  40. Yang K, Han Q, Li H, Zheng K, Su Z, Shen X (2017) An efficient and fine-grained big data access control scheme with privacy-preserving policy. IEEE Internet Things J 4(2):563–571

    Article  Google Scholar 

  41. Dong C, Chen L, Wen Z (2013) When private set intersection meets big data: an efficient and scalable protocol. In: ACM SIGSAC conference on computer & communications security, pp 789–800

  42. Seo JH (2014) Short signatures from diffie-hellman, revisited: sublinear public key, CMA security, and tighter reduction. IACR Cryptology ePrint Archive 138:2014

    Google Scholar 

  43. Yuan C, Xu M, Si X, Li B (2017) Blockchain with accountable CP-ABE: how to effectively protect the electronic documents. In: 2017 IEEE 23rd international conference on parallel and distributed systems (ICPADS), pp 800–803. https://doi.org/10.1109/ICPADS.2017.00111

Download references

Acknowledgements

This work is supported by National Key R&D Program of China (No. 2017YFB0802000), National Natural Science Foundation of China (No. 61772418, 61472472, 61402366), Natural Science Basic Research Plan in Shaanxi Province of China (No. 2018JZ6001, 2015JQ6236), and the Youth Innovation Team of Shaanxi Universities. Yinghui Zhang is supported by New Star Team of Xi’an University of Posts and Telecommunications (No. 2016-02).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dong Zheng.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wu, A., Zhang, Y., Zheng, X. et al. Efficient and privacy-preserving traceable attribute-based encryption in blockchain. Ann. Telecommun. 74, 401–411 (2019). https://doi.org/10.1007/s12243-018-00699-y

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12243-018-00699-y

Keywords

Navigation