Skip to main content

Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption

  • Conference paper
  • First Online:
Data Science (ICPCSEE 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1629))

  • 865 Accesses

Abstract

Blockchain has been widely used in many fields because it can solve the problem of information asymmetry and enable users who do not trust each other to collaborate without the participation of third-party intermediaries. Existing blockchain access control schemes usually use attribute-based encryption, but most of them adopt traditional single-attribute authority for attribute authorization, which has the problem that the authority is overburdened and must be fully credible. This paper proposes a blockchain access control scheme based on multi-authority attribute-based encryption by improving the existing blockchain privacy protection method. Autonomous identity management is performed through the blockchain to complete the initialization of user identity and the issuance of attribute certificates. Attribute authorities are selected using the reputation proof consensus mechanism. The distributed key generation protocol is used to generate keys, and the linear secret sharing scheme is improved. The hierarchical relationship of the access structure is used to encrypt and access control the private data that need to be uploaded to the blockchain. According to the comparison with other blockchain access control schemes, the scheme proposed in this paper has been improved in terms of security and efficiency.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. He, P., Yu, G., Zhang, Y., Bao, Y.: Survey on blockchain technology and its application prospect. Comput. Sci. 44(04), 1–7+15 (2017)

    Google Scholar 

  2. Zhu, Y., Gan, G., Deng, D., Ji, F.F., Chen, A.: Security architecture and key technologies of blockchain. J. Inf. Secur. Res. 2(12), 1090–1097 (2016)

    Google Scholar 

  3. Fiat, A., Naor, M.: Broadcast encryption. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 480–491. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48329-2_40

    Chapter  Google Scholar 

  4. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985). https://doi.org/10.1007/3-540-39568-7_5

    Chapter  Google Scholar 

  5. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  6. Su, J.S., Cao, D., Wang, X.F., Sun, Y.P., Hu, Q.L.: Attribute-based encryption schemes. J. Softw. 22(6), 1299–1315 (2011)

    Article  MathSciNet  Google Scholar 

  7. Rahulamathavan, Y., Phan, R.C.W., Misra, S., et al.: Privacy-preserving blockchain-based IoT ecosystem using attribute-based encryption. In: IEEE International Conference on Advanced Networks and Telecommunications Systems(ANTS), Bhubaneswar, India. NJ, 17–20 December 2017, pp. 1–6. IEEE (2017)

    Google Scholar 

  8. Chase, M.: Multi-authority attribute based encryption. In: Vadhan, S.P. (eds.) TCC 2007. LNCS, vol. 4392, pp. 515–534. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_28

  9. Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20465-4_31

    Chapter  Google Scholar 

  10. Lewko, A., Waters, B.: Decentralizing attribute-based encryption. In: Paterson, K.G. (eds.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 568–588. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-20465-4_31

  11. Ma, Z.: Research on Distributed Authentication and Access Control Based on Blockchain. Chongqing University of Posts and Telecommunications (2020)

    Google Scholar 

  12. Yang, X., Zhou, Q., Yang, M., Liu, T., Wang, C.: Muti-authority ABE without central authority for access control scheme in cloud storage. J. Chin. Comput. Syst. 38(04), 826–829 (2017)

    Google Scholar 

  13. Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20(1), 51–83 (2007)

    Google Scholar 

  14. Pan, Q.: Research on Shared Data Access Control Based on Blockchain. Nanjing University of Posts and Telecommunications (2020)

    Google Scholar 

  15. Lu, X., Fu, S.: A trusted data access control scheme combining attribute-based encryption and blockchain. Netinfo Secur. 21(03), 7–14 (2021)

    Google Scholar 

  16. Wang, J., Xie, Y., Wang, G., Li, Y.: A methond of privacy preserving and access control in blockchain based on attribute-based encryption. Netinfo Secur. 20(09), 47–51 (2020)

    Google Scholar 

  17. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, Berkeley, USA. New York, 20 May 2007, pp. 321–334. IEEE (2007)

    Google Scholar 

  18. Li, J., Huang, Q., Chen, X., et al.: Multi-authority ciphertext-policy attribute-based encryption with accountability. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, pp. 386–390 (2011)

    Google Scholar 

  19. Li, F., Rahulamathavan, Y., Rajarajan, M., et al.: Low complexity multi-authority attribute based encryption scheme for mobile cloud computing. In: 2013 IEEE Seventh International Symposium on Service-Oriented System Engineering, pp. 573–577. IEEE (2013)

    Google Scholar 

  20. Rouselakis, Y., Waters, B.: Efficient statically-secure large-universe multi-authority attribute-based encryption. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 315–332. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-47854-7_19

  21. Zhong, H., Zhu, W., Xu, Y., et al.: Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft. Comput. 22(1), 243–251 (2018)

    Article  Google Scholar 

Download references

Acknowledgment

This work is supported by the Emerging Interdisciplinary Project of CUFE, the National Natural Science Foundation of China (No. 61906220) and Ministry of Education of Humanities and Social Science project (No. 19YJCZH178).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yang Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, Y., Qi, B., Wang, M., Zhu, J., Wang, X. (2022). Blockchain Access Control Scheme Based on Multi-authority Attribute-Based Encryption. In: Wang, Y., Zhu, G., Han, Q., Zhang, L., Song, X., Lu, Z. (eds) Data Science. ICPCSEE 2022. Communications in Computer and Information Science, vol 1629. Springer, Singapore. https://doi.org/10.1007/978-981-19-5209-8_8

Download citation

  • DOI: https://doi.org/10.1007/978-981-19-5209-8_8

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-19-5208-1

  • Online ISBN: 978-981-19-5209-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics