Paper
20 October 2023 Blockchain-based ciphertext access control for data sharing
Wenli Wu, Jinyi Zhao, Taowei Chen, Yimin Yu
Author Affiliations +
Proceedings Volume 12916, Third International Conference on Signal Image Processing and Communication (ICSIPC 2023); 129162E (2023) https://doi.org/10.1117/12.3004867
Event: Third International Conference on Signal Image Processing and Communication (ICSIPC 2023), 2023, Kunming, China
Abstract
Currently, with the continuous in-depth research and application of blockchain access control, security issues on the blockchain have become a focus of attention. Based on CPABE, this paper proposes a trusted and secure blockchain access control scheme based on ciphertext policy. Firstly, a decentralized attribute-based encryption algorithm (DABE) is adopted to achieve distributed calculation of user attribute private keys, effectively solving the problems of high trust cost and single point of failure caused by the key center generating private keys in traditional CPABE. At the same time, a private key consensus verification protocol based on zero-knowledge proof is designed to ensure the correctness and security of user attribute private keys without leaking private key information. Through the analysis of on-chain security and experimental simulation, the results show that this scheme has better performance while maintaining high security and is more suitable for distributed access control with large attribute scales.
(2023) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Wenli Wu, Jinyi Zhao, Taowei Chen, and Yimin Yu "Blockchain-based ciphertext access control for data sharing", Proc. SPIE 12916, Third International Conference on Signal Image Processing and Communication (ICSIPC 2023), 129162E (20 October 2023); https://doi.org/10.1117/12.3004867
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Blockchain

Grazing incidence

Computer security

Symmetric-key encryption

Data storage

Matrices

Data privacy

Back to Top