Anonymous Attribute?Based Encryption Scheme with Verifiable Outsourcing Decryption in Blockchain
ZHUANG Chaoyuan, GUO Rui, YANG Geng
1.School of Cyberspace Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
2.National Engineering Laboratory for Wireless Security, Xi’an University of Posts and Telecommunications, Xi’an 710121, China
[1] SANDHU R S,SAMARATI P.Access control:Principle and practice[J].IEEE Communications Magazine,1994,32(9):40-48.
[2] BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//Proceedings of IEEE Symposium on Security & Privacy,2007:321-334.
[3] SAHAI A,WATERS B.Fuzzy identity-based encryption[C]//Proceedings of International Conference on Theory & Applications of Cryptographic Techniques,2005:457-473.
[4] GOYAL V,PANDEY O,SAHAIA,et al.Attribute-based encryption for fine-grained access control of encrypted data[C]//Proceedings of the 13th ACM Conference on Computer and Communications Security,2006:89-98.
[5] SI X L,WANG P P,ZHANG L W.KP-ABE based verifiable cloud access control scheme[C]//Proceedings of the 12th IEEE International Conference on Trust,Security and Privacy in Computing and Communications,2013:34-41.
[6] TOUATI L,CHALLAL Y.Collaborative KP-ABE for cloud-based internet of things applications[C]//Proceedings of the IEEE International Conference on Communications,2016:1-7.
[7] 闫玺玺,张棋超,汤永利,等.支持叛逆者追踪的密文策略属性基加密方案[J].信息网络安全,2019,19(5):47-53.
YAN X X,ZHANG Q C,TANG Y L,et al.Ciphertext policy attribute-based encryption scheme supporting traitor tracing[J].Netinfo Security,2019,19(5):47-53.
[8] ZHANG Y H,ZHENG D,CHEN X F,et al.Efficient attribute-based data sharing in mobile clouds[J].Pervasive and Mobile Computing,2016,28(1):135-149.
[9] WATERS B.Ciphertext-policy attribute-based encryption:An expressive,efficient,and erovablysecure realization[C]//Proceedings of the 14th International Conference on Practice and Theory in Public Key Cryptography Conference on Public Key Cryptography,2011:53-70.
[10] MALLUHI Q M,SHIKFA A,TRINH V C.A ciphertext-policy attribute-based encryption scheme with optimized ciphertext size and fast decryption[C]//Proceedings of the 2017 ACM Conference,2017:230-240.
[11] NISHIDE T,YONEYAMA K,OHTA K.Attribute-based encryption with partially hidden encryptor-specified access structures[C]//Proceedings of the International Conference on Applied Cryptography & Network Security,2008:111-129.
[12] ZHANG Y H,CHEN X F,LI J,et al.Anonymous attribute-based encryption supporting efficient decryption test[C]//Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communications Security,2013:511-516.
[13] ZHOU Z B,HUANG D J,WANG Z J.Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption[J].IEEE Transactions on Computers,2014,64(1):126-138.
[14] XIONG H,ZHAO Y N,PENG L,et al.Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing[J].Future Generation Computer Systems,2019,97:453-461.
[15] ZHANG L Y,HU G C,MU Y,et al.Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system[J].IEEE Access,2019,7:33202-33213.
[16] ZENG P,ZHANG Z T,LU R X,et al.Efficient policy-hiding and large universe attribute-based encryption with public traceability for internet of medical things[J].IEEE Internet of Things Journal,2021,1(1):99.
[17] LIU Y,DU R Z.Efficient partially policy-hidden with multi-authority for access control scheme in internet of things[C]//Proceedings of the 2020 International Conference on Networking and Network Applications,2020:357-380.
[18] GREEN M,HOHENBERGER S,WATERS B.Outsourcing the decryption of abe ciphertexts[C]//Proceedings of the 20th USENIX Conference on Security,2011:34.
[19] LAI J Z,DENG R H,GUAN C W,et al.Attribute-based encryption with verifiable outsourced decryption[J].IEEE Transactions on Information Forensics & Security,2013,8(8):1343-1354.
[20] QIN B D,DENG R H,LIU S L,et al.Attribute-based encryption with efficient verifiable outsourced decryption[J].IEEE Transactions on Information Forensics and Security,2015,10(7):1384-1393.
[21] 李聪,杨晓元,白平,等.可追责和完全可验证外包解CP-ABE方案[J].计算机应用,2018,38(8):2249-2255.
LI C,YANG X Y,BAI P,et al.Traceable and fully verifiable for outsourced decryption for CP-ABE[J].Journal of Computer Applications,2018,38(8):2249-2255.
[22] FAN K,XU H Y,GAO L X,et al.Efficient and privacy preserving access control scheme for fog-enabled IOT[J].Future Generation Computer Systems,2019,99:134-142.
[23] GUO R,ZHUANG C Y,SHI H X,et al.A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing[J].International Journal of Distributed Sensor Networks,2020,16(2):1-13.
[24] ZHAO J,ZENG P,CHOO K.An efficient access control scheme with outsourcing and attribute revocation for fog-enabled e-health[J].IEEE Access,2021,9:13789-13799.
[25] BEIMEL A.Secure schemes for secret sharing and key distribution[M].Haifa,Israel:Technion-Israel Institute of Technology,Faculty of Computer Science,1996.
[26] DAN B.The decision diffie-hellman problem[C]//Proceedings of the International Algorithmic Number Theory Symposium,1998:48-63.
[27] ANDROULAKI E,BARGER A,BORTNIKOV V,et al.Hyperledger fabric:A distributed operating system for permissioned blockchains[C]//Proceedings of the Thirteenth EuroSys Conference,2018:30.
[28] UNGER N.PBC go wrapper:Pairing based creyptography of golang wrapper[EB/OL].(2018-12-05).https://pkg.go.dev/github.com/Nik-U/pbc.com.