Abstract
Blockchain has been widely used in many fields because it can solve the problem of information asymmetry and enable users who do not trust each other to collaborate without the participation of third-party intermediaries. Existing blockchain access control schemes usually use attribute-based encryption, but most of them adopt traditional single-attribute authority for attribute authorization, which has the problem that the authority is overburdened and must be fully credible. This paper proposes a blockchain access control scheme based on multi-authority attribute-based encryption by improving the existing blockchain privacy protection method. Autonomous identity management is performed through the blockchain to complete the initialization of user identity and the issuance of attribute certificates. Attribute authorities are selected using the reputation proof consensus mechanism. The distributed key generation protocol is used to generate keys, and the linear secret sharing scheme is improved. The hierarchical relationship of the access structure is used to encrypt and access control the private data that need to be uploaded to the blockchain. According to the comparison with other blockchain access control schemes, the scheme proposed in this paper has been improved in terms of security and efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
He, P., Yu, G., Zhang, Y., Bao, Y.: Survey on blockchain technology and its application prospect. Comput. Sci. 44(04), 1–7+15 (2017)
Zhu, Y., Gan, G., Deng, D., Ji, F.F., Chen, A.: Security architecture and key technologies of blockchain. J. Inf. Secur. Res. 2(12), 1090–1097 (2016)
Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48329-2_40
Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27
Su, J.S., Cao, D., Wang, X.F., Sun, Y.P., Hu, Q.L.: Attribute-based encryption schemes. J. Softw. 22(6), 1299–1315 (2011)
Rahulamathavan, Y., Phan, R.C.W., Misra, S., et al.: Privacy-preserving blockchain-based IoT ecosystem using attribute-based encryption. In: IEEE International Conference on Advanced Networks and Telecommunications Systems(ANTS), Bhubaneswar, India. NJ, 17–20 December 2017, pp. 1–6. IEEE (2017)
Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (eds.) TCC 2007. LNCS, vol. 4392, pp. 515–534. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_28
Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20465-4_31
Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (eds.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20465-4_31
Ma, Z.: Research on Distributed Authentication and Access Control Based on Blockchain. Chongqing University of Posts and Telecommunications (2020)
Yang, X., Zhou, Q., Yang, M., Liu, T., Wang, C.: Muti-authority ABE without central authority for access control scheme in cloud storage. J. Chin. Comput. Syst. 38(04), 826–829 (2017)
Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20(1), 51–83 (2007)
Pan, Q.: Research on Shared Data Access Control Based on Blockchain. Nanjing University of Posts and Telecommunications (2020)
Lu, X., Fu, S.: A trusted data access control scheme combining attribute-based encryption and blockchain. Netinfo Secur. 21(03), 7–14 (2021)
Wang, J., Xie, Y., Wang, G., Li, Y.: A methond of privacy preserving and access control in blockchain based on attribute-based encryption. Netinfo Secur. 20(09), 47–51 (2020)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, Berkeley, USA. New York, 20 May 2007, pp. 321–334. IEEE (2007)
Li, J., Huang, Q., Chen, X., et al.: Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 386–390 (2011)
Li, F., Rahulamathavan, Y., Rajarajan, M., et al.: Low complexity multi-authority attribute based encryption scheme for mobile cloud computing. In: 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering, pp. 573–577. IEEE (2013)
Rouselakis, Y., Waters, B.: Efficient statically-secure large-universe multi-authority attribute-based encryption. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 315–332. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-47854-7_19
Zhong, H., Zhu, W., Xu, Y., et al.: Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft. Comput. 22(1), 243–251 (2018)
Acknowledgment
This work is supported by the Emerging Interdisciplinary Project of CUFE, the National Natural Science Foundation of China (No. 61906220) and Ministry of Education of Humanities and Social Science project (No. 19YJCZH178).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Li, Y., Qi, B., Wang, M., Zhu, J., Wang, X. (2022). Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption. In: Wang, Y., Zhu, G., Han, Q., Zhang, L., Song, X., Lu, Z. (eds) Data Science. ICPCSEE 2022. Communications in Computer and Information Science, vol 1629. Springer, Singapore. https://doi.org/10.1007/978-981-19-5209-8_8
Download citation
DOI: https://doi.org/10.1007/978-981-19-5209-8_8
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-5208-1
Online ISBN: 978-981-19-5209-8
eBook Packages: Computer ScienceComputer Science (R0)