Lattices-Inspired CP-ABE from LWE Scheme for Data Access and Sharing Based on Blockchain
نویسندگان
چکیده
To address the quantum attacks on number theory-based ciphertext policy attribute-based encryption (CP-ABE), and to avoid private key leakage problems by relying a trustworthy central authority, we propose lattice-inspired CP-ABE scheme for data access sharing based blockchain in this paper. Firstly, CP-ABE-based algorithm using learning with errors (LWE) assumption is constructed, which selective security under linear independence restriction random oracle model. Secondly, nodes can act as distributed management server offer control over master keys used generate different users that reflect their attributes through launching transactions system. Finally, develop smart contracts proving correctness of proxy re-encryption (PRE) provide auditability whole data-sharing process. Compared traditional algorithm, post-quantum significantly improve computation speed according result functional experimental analysis. Moreover, proposed blockchain-based provides not only multi-cryptography collaboration enhance but also reduces average transaction response time throughput.
منابع مشابه
Secure Multi Authority Cloud Storage Based on CP- ABE and Data Access Control
now a days, plenty of users area unit storing their data’s in cloud, as a result of it provides storage flexibility. However the most drawbacks in cloud are information security. Cipher text-Policy Attribute-based cryptography (CP-ABE) is thought to be one among the foremost appropriate technologies for information access management in cloud storage; as a result of it offers information house o...
متن کاملData Sharing Scheme Revisited in Cloud Computing Using Abe
Data sharing scheme by using attribute based to reduce the key escrow issue but also develops the expressiveness of attribute, because of that the resulting scheme is more user friendly to cloud computing. In this proposed work we are introducing an improved two-party key issuing protocol that can guarantee that neither key authority nor cloud service operator can compromise the whole secret ke...
متن کاملBlockchain Based Intelligent Vehicle Data sharing Framework
The Intelligent vehicle (IV) is experiencing revolu tionary growth in research and industry, but it still suf fers from many security vulnerabilities. Traditional se curity methods are incapable to provide secure IV dat a sharing. The major issues in IV data sharing are trus t, data accuracy and reliability of data sharing data in the communication channel. Blockchain technology works for the c...
متن کاملA Privacy Protection Method Based on CP-ABE and KP-ABE for Cloud Computing
Most of the existing ways for strengthening users’ confidence in uploading private data to a cloud platform stress too much on security. On the contrary, cloud computing must be open and distributed. Moreover, it should provide highly robust, secure, and quality services to users. Therefore, establishing a balance between the performance and the security of cloud platforms is necessary. In this...
متن کاملCircuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security
We construct an LWE-based key-policy attribute-based encryption (ABE) scheme that supports attributes of unbounded polynomial length. Namely, the size of the public parameters is a fixed polynomial in the security parameter and a depth bound, and with these fixed length parameters, one can encrypt attributes of arbitrary length. Similarly, any polynomial size circuit that adheres to the depth b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Applied sciences
سال: 2023
ISSN: ['2076-3417']
DOI: https://doi.org/10.3390/app13137765