skip to main content
10.1145/3617184.3623447acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccsieConference Proceedingsconference-collections
research-article

Access Control Management of Information System based on Homomorphism and Blockchain Technology

Published: 28 December 2023 Publication History

Abstract

In the centralized user rights management scheme, the information system is faced with the threat of overstep access and malicious tampering of sensitive data such as key operation records, and it is difficult to ensure the auditability. At the same time, although encryption can be adopted to ensure the security of sensitive data, it will cause difficulties in data operation and access. This paper presents a method to build a user rights management scheme using blockchain, and combined with the research of identity-based homomorphic encryption, proposes an information system access control management scheme based on homomorphism and blockchain technology and a method to build a sensitive information storage scheme to improve the storage and operation security of sensitive data. To achieve unified and standardized management of information system user operation behaviors, complete the decentralized, untampered, traceable user rights and operation data recording mode.

References

[1]
Ajtai M, Dwork C. 1997.A public-key cryptosystem with worst-case/ average-case equivalence. Proceedings of the twenty-ninth annual ACM symposium on Theory of computing. ACM, 284-293.
[2]
Hoffstein, J., Pipher, J. and Silverman, J.H. 1998. NTRU: A Ring Based Public Key Cryptosystem. In: Buhler, J.P., Ed., Algorithmic Number Theory, Lecture Notes in Computer Science, Vol. 1423, Springer, Berlin, 267-288.
[3]
Oded Regev. 2005.On Lattices, Learning with Errors, Random Linear Codes, and Cryptography in STOC, 84–93.
[4]
V. Lyubashevsky, C. Peikert, O. Regev. 2013. On Ideal Lattices and Learning with Errors over Rings. J. ACM, 60(6):43:1–43:35.
[5]
R. Rivest, L. Adleman, and M. Dertouzos. 1978. On data banks and privacy homomorphisms. In Foundations of Secure Computation, 169-177. Academic Press.
[6]
C. Gentry. 2009. A fully homomorphic encryption scheme. PhD thesis, Stanford University.
[7]
Zvika Brakerski, Craig Gentry, and Vinod Vaikuntanathan. 2012. (leveled) fully homomorphic encryption without bootstrapping. ITCS. See also http://eprint.iacr.org/2011/277.
[8]
Zvika Brakerski and Vinod Vaikuntanathan. 2021. Efficient fully homomorphic encryption from (standard) lwe. Manuscript, presented on May 10, 2011 at MIT CSAIL TOC Colloqium.
[9]
Zvika Brakerski, Graig Gentry and Vindo Vaikuntanathan. 2012. Fully homomorphic encryption without bootstrapping. In Innovations in Theoretical Computer Science (ITCS'12).
[10]
Z. Brakerski, C. Gentry, V. Vaikuntanathan. 2012.(Leveled) Fully Homomorphic Encryption without Bootstrappin. S. Goldwasser. ITCS 2012. ACM, 309–325.
[11]
Craig Gentry, Amit Sahai, and Brent Waters. 2013. Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based. In CRYPTO, 75–92.
[12]
Chen H, Dai W, Kim M, 2019. Efficient multi-key homomorphic encryption with packed ciphertexts with application to oblivious neural network inference//Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 395-412.
[13]
Liu Y, Pan Y, Gu L, 2021.Attribute-based fully homomorphic encryption scheme from lattices with short ciphertext. Mathematical Problems in Engineering, 2021(1):1-10.
[14]
Li N, Zhou T, Yang X, 2019. Efficient multi-key FHE with short extended ciphertexts and directed decryption protocol. IEEE Access, 7: 56724-56732.
[15]
SHAMI R A.1984.Identity-based cryptosystems and signature schemes. Proceedings of CRYPTO 84 on Advances in Cryptology. Berlin: Springer, 47-53.
[16]
GENTRY C, HALEVI S, VAIKUNTANATHAN V. 2010. A simple BGN-type cryptosystem from LWE . EUROCRYPT’ 10 Proceedings of the 29th Annual International Conference on Theory and Applications of Cryptographic Techniques. Berlin: Springer, 506-522.
[17]
CLEAR M, HUGHES A, TEWARI H. 2013. Homomorphic encryption with access policies: characterization and new constructions. AFRICACRYPT 2013: Proceedings of the 6th International Conference on Cryptology in Africa. Berlin: Springer, 61-87.
[18]
COCKS C. 2001. An identity based encryption scheme based on quadratic residues. Proceedings of the 8th IMA International Conference on Cryptography and Coding. Berlin: Springer, 360-363.

Index Terms

  1. Access Control Management of Information System based on Homomorphism and Blockchain Technology

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCSIE '23: Proceedings of the 8th International Conference on Cyber Security and Information Engineering
    September 2023
    370 pages
    ISBN:9798400708800
    DOI:10.1145/3617184
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 28 December 2023

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. access control
    2. blockchain
    3. encrypted data
    4. homomorphic encryption
    5. user rights management

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCSIE 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 18
      Total Downloads
    • Downloads (Last 12 months)15
    • Downloads (Last 6 weeks)1
    Reflects downloads up to 17 Feb 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media