Skip to main content

Verifiable Attribute-Based Proxy Re-encryption with Non-repudiation Based on Blockchain

  • Conference paper
  • First Online:
Blockchain Technology and Emerging Applications (BlockTEA 2023)

Abstract

With the development of Blockchain, cloud computing, and artificial intelligence, smart transportation is highly likely to drive urban transportation in the direction of intelligence and digitalization. However, when connected vehicle devices share data in edge networks, there are security and privacy issues, e.g. leakage of sensitive information will cause serious threats. The separation of user data ownership and physical control requires users to impose access control on the outsourced data. Existing privacy protection schemes still suffer from problems such as a lack of supervision of centralized third-party cloud servers, which face the challenge of data leakage. In this paper, Blockchain and proxy re-encryption techniques are used to address these challenges. To enable sharing of the outsourced data in a secure way, Attribute-Based Proxy Re-encryption (ABPRE) is a popular technique. At the same time, verifiability enables the shared user to verify that the re-encrypted ciphertext returned by the server is correct. In addition, the introduction of a decentralized Blockchain provides distributed storage and it is tamper-proof for enhancing the trustworthiness of the connected vehicle devices as well as the security of the communication between the entities. The security and performance analyses demonstrate that our proposed scheme can achieve the desirable security features and it is efficient for protecting data privacy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 64.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inform. Syst. Secur. (TISSEC) 9(1), 1–30 (2006)

    Article  Google Scholar 

  2. Baker, T., Asim, M., Samwini, H., Shamim, N., Alani, M.M., Buyya, R.: A blockchain-based fog-oriented lightweight framework for smart public vehicular transportation systems. Comput. Netw. 203, 108676 (2022). https://doi.org/10.1016/j.comnet.2021.108676

    Article  Google Scholar 

  3. Bao, Y., Qiu, W., Cheng, X., Sun, J.: Fine-grained data sharing with enhanced privacy protection and dynamic users group service for the IoV. IEEE Trans. Intell. Transp. Syst. 1–15 (2022). https://doi.org/10.1109/TITS.2022.3187980

  4. Blaze, Matt, Bleumer, Gerrit, Strauss, Martin: Divertible protocols and atomic proxy cryptography. In: Nyberg, Kaisa (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054122

    Chapter  Google Scholar 

  5. Elagin, V., Spirkina, A., Buinevich, M., Vladyko, A.: Technological aspects of blockchain application for vehicle-to-network. Information 11(10), 465 (2020)

    Article  Google Scholar 

  6. Feng, T., Wang, D., Gong, R.: A blockchain-based efficient and verifiable attribute-based proxy re-encryption cloud sharing scheme. Information 14(5) (2023). https://doi.org/10.3390/info14050281

  7. Gao, Y., Chen, Y., Hu, X., Lin, H., Liu, Y., Nie, L.: Blockchain based IIoT data sharing framework for SDN-enabled pervasive edge computing. IEEE Trans. Industr. Inf. 17(7), 5041–5049 (2021). https://doi.org/10.1109/TII.2020.3012508

    Article  Google Scholar 

  8. Ge, C., Liu, Z., Xia, J., Fang, L.: Revocable identity-based broadcast proxy re-encryption for data sharing in clouds. IEEE Trans. Dependable Secure Comput. 18(3), 1214–1226 (2021). https://doi.org/10.1109/TDSC.2019.2899300

    Article  Google Scholar 

  9. Ge, C., Susilo, W., Baek, J., Liu, Z., Xia, J., Fang, L.: A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds. IEEE Trans. Dependable Secure Comput. 19(5), 2907–2919 (2021)

    Article  Google Scholar 

  10. Green, Matthew, Ateniese, Giuseppe: Identity-based proxy re-encryption. In: Katz, Jonathan, Yung, Moti (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–306. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72738-5_19

    Chapter  Google Scholar 

  11. Hanaoka, G., et al.: Generic construction of chosen ciphertext secure proxy re-encryption. In: Dunkelman, Orr (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 349–364. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-27954-6_22

    Chapter  Google Scholar 

  12. Karthikeyan, H., Usha, G.: Real-time DDoS flooding attack detection in intelligent transportation systems. Comput. Electr. Eng. 101, 107995 (2022). https://doi.org/10.1016/j.compeleceng.2022.107995

    Article  Google Scholar 

  13. Kenney, J.B.: Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE 99(7), 1162–1182 (2011)

    Article  Google Scholar 

  14. Liang, X., Cao, Z., Lin, H., Shao, J.: Attribute based proxy re-encryption with delegating capabilities. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications security, pp. 276–286 (2009)

    Google Scholar 

  15. Liu, J., Zhang, L., Li, C., Bai, J., Lv, H., Lv, Z.: Blockchain-based secure communication of intelligent transportation digital twins system. IEEE Trans. Intell. Transp. Syst. 23(11), 22630–22640 (2022). https://doi.org/10.1109/TITS.2022.3183379

    Article  Google Scholar 

  16. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized business review (2008)

    Google Scholar 

  17. Ohata, S., Kawai, Y., Matsuda, T., Hanaoka, G., Matsuura, K.: Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption. In: Nyberg, K. (ed.) Topics in Cryptology – CT-RSA 2015, pp. 410–428. Springer, Cham (2015)

    Chapter  Google Scholar 

  18. Panigrahy, S.K., Emany, H.: A survey and tutorial on network optimization for intelligent transport system using the internet of vehicles. Sensors 23(1), 555 (2023)

    Article  Google Scholar 

  19. Shao, J.: Anonymous id-based proxy re-encryption, pp. 364–375 (2012). https://doi.org/10.1007/978-3-642-31448-3_27

  20. Xu, L., Wu, X., Zhang, X.: CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. pp. 87–88. ASIACCS 2012. Association for Computing Machinery, New York (2012). https://doi.org/10.1145/2414456.2414507

  21. Zavvos, E., Gerding, E.H., Yazdanpanah, V., Maple, C., Stein, S., Schraefel, M.: Privacy and trust in the internet of vehicles. IEEE Trans. Intell. Transp. Syst. 23(8), 10126–10141 (2022). https://doi.org/10.1109/TITS.2021.3121125

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhe Xia .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

He, Y., Liang, T., Huang, P., Xia, Z. (2024). Verifiable Attribute-Based Proxy Re-encryption with Non-repudiation Based on Blockchain. In: Chen, J., Xia, Z. (eds) Blockchain Technology and Emerging Applications. BlockTEA 2023. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 577. Springer, Cham. https://doi.org/10.1007/978-3-031-60037-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-60037-1_7

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-60036-4

  • Online ISBN: 978-3-031-60037-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics