Lattices-Inspired CP-ABE from LWE Scheme for Data Access and Sharing Based on Blockchain

نویسندگان

چکیده

To address the quantum attacks on number theory-based ciphertext policy attribute-based encryption (CP-ABE), and to avoid private key leakage problems by relying a trustworthy central authority, we propose lattice-inspired CP-ABE scheme for data access sharing based blockchain in this paper. Firstly, CP-ABE-based algorithm using learning with errors (LWE) assumption is constructed, which selective security under linear independence restriction random oracle model. Secondly, nodes can act as distributed management server offer control over master keys used generate different users that reflect their attributes through launching transactions system. Finally, develop smart contracts proving correctness of proxy re-encryption (PRE) provide auditability whole data-sharing process. Compared traditional algorithm, post-quantum significantly improve computation speed according result functional experimental analysis. Moreover, proposed blockchain-based provides not only multi-cryptography collaboration enhance but also reduces average transaction response time throughput.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control

now a days, plenty of users area unit storing their data’s in cloud, as a result of it provides storage flexibility. However the most drawbacks in cloud are information security. Cipher text-Policy Attribute-based cryptography (CP-ABE) is thought to be one among the foremost appropriate technologies for information access management in cloud storage; as a result of it offers information house o...

متن کامل

Data Sharing Scheme Revisited in Cloud Computing Using Abe

Data sharing scheme by using attribute based to reduce the key escrow issue but also develops the expressiveness of attribute, because of that the resulting scheme is more user friendly to cloud computing. In this proposed work we are introducing an improved two-party key issuing protocol that can guarantee that neither key authority nor cloud service operator can compromise the whole secret ke...

متن کامل

Blockchain Based Intelligent Vehicle Data sharing Framework

The Intelligent vehicle (IV) is experiencing revolu tionary growth in research and industry, but it still suf fers from many security vulnerabilities. Traditional se curity methods are incapable to provide secure IV dat a sharing. The major issues in IV data sharing are trus t, data accuracy and reliability of data sharing data in the communication channel. Blockchain technology works for the c...

متن کامل

A Privacy Protection Method Based on CP-ABE and KP-ABE for Cloud Computing

Most of the existing ways for strengthening users’ confidence in uploading private data to a cloud platform stress too much on security. On the contrary, cloud computing must be open and distributed. Moreover, it should provide highly robust, secure, and quality services to users. Therefore, establishing a balance between the performance and the security of cloud platforms is necessary. In this...

متن کامل

Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security

We construct an LWE-based key-policy attribute-based encryption (ABE) scheme that supports attributes of unbounded polynomial length. Namely, the size of the public parameters is a fixed polynomial in the security parameter and a depth bound, and with these fixed length parameters, one can encrypt attributes of arbitrary length. Similarly, any polynomial size circuit that adheres to the depth b...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Applied sciences

سال: 2023

ISSN: ['2076-3417']

DOI: https://doi.org/10.3390/app13137765