Skip to main content

2024 | OriginalPaper | Buchkapitel

Verifiable Attribute-Based Proxy Re-encryption with Non-repudiation Based on Blockchain

verfasst von : Yaorui He, Ting Liang, Pei Huang, Zhe Xia

Erschienen in: Blockchain Technology and Emerging Applications

Verlag: Springer Nature Switzerland

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the development of Blockchain, cloud computing, and artificial intelligence, smart transportation is highly likely to drive urban transportation in the direction of intelligence and digitalization. However, when connected vehicle devices share data in edge networks, there are security and privacy issues, e.g. leakage of sensitive information will cause serious threats. The separation of user data ownership and physical control requires users to impose access control on the outsourced data. Existing privacy protection schemes still suffer from problems such as a lack of supervision of centralized third-party cloud servers, which face the challenge of data leakage. In this paper, Blockchain and proxy re-encryption techniques are used to address these challenges. To enable sharing of the outsourced data in a secure way, Attribute-Based Proxy Re-encryption (ABPRE) is a popular technique. At the same time, verifiability enables the shared user to verify that the re-encrypted ciphertext returned by the server is correct. In addition, the introduction of a decentralized Blockchain provides distributed storage and it is tamper-proof for enhancing the trustworthiness of the connected vehicle devices as well as the security of the communication between the entities. The security and performance analyses demonstrate that our proposed scheme can achieve the desirable security features and it is efficient for protecting data privacy.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inform. Syst. Secur. (TISSEC) 9(1), 1–30 (2006)CrossRef Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inform. Syst. Secur. (TISSEC) 9(1), 1–30 (2006)CrossRef
5.
Zurück zum Zitat Elagin, V., Spirkina, A., Buinevich, M., Vladyko, A.: Technological aspects of blockchain application for vehicle-to-network. Information 11(10), 465 (2020)CrossRef Elagin, V., Spirkina, A., Buinevich, M., Vladyko, A.: Technological aspects of blockchain application for vehicle-to-network. Information 11(10), 465 (2020)CrossRef
9.
Zurück zum Zitat Ge, C., Susilo, W., Baek, J., Liu, Z., Xia, J., Fang, L.: A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds. IEEE Trans. Dependable Secure Comput. 19(5), 2907–2919 (2021)CrossRef Ge, C., Susilo, W., Baek, J., Liu, Z., Xia, J., Fang, L.: A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds. IEEE Trans. Dependable Secure Comput. 19(5), 2907–2919 (2021)CrossRef
13.
Zurück zum Zitat Kenney, J.B.: Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE 99(7), 1162–1182 (2011)CrossRef Kenney, J.B.: Dedicated short-range communications (DSRC) standards in the United States. Proc. IEEE 99(7), 1162–1182 (2011)CrossRef
14.
Zurück zum Zitat Liang, X., Cao, Z., Lin, H., Shao, J.: Attribute based proxy re-encryption with delegating capabilities. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications security, pp. 276–286 (2009) Liang, X., Cao, Z., Lin, H., Shao, J.: Attribute based proxy re-encryption with delegating capabilities. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications security, pp. 276–286 (2009)
16.
Zurück zum Zitat Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized business review (2008) Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized business review (2008)
17.
Zurück zum Zitat Ohata, S., Kawai, Y., Matsuda, T., Hanaoka, G., Matsuura, K.: Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption. In: Nyberg, K. (ed.) Topics in Cryptology – CT-RSA 2015, pp. 410–428. Springer, Cham (2015)CrossRef Ohata, S., Kawai, Y., Matsuda, T., Hanaoka, G., Matsuura, K.: Re-encryption verifiability: how to detect malicious activities of a proxy in proxy re-encryption. In: Nyberg, K. (ed.) Topics in Cryptology – CT-RSA 2015, pp. 410–428. Springer, Cham (2015)CrossRef
18.
Zurück zum Zitat Panigrahy, S.K., Emany, H.: A survey and tutorial on network optimization for intelligent transport system using the internet of vehicles. Sensors 23(1), 555 (2023)CrossRef Panigrahy, S.K., Emany, H.: A survey and tutorial on network optimization for intelligent transport system using the internet of vehicles. Sensors 23(1), 555 (2023)CrossRef
20.
Zurück zum Zitat Xu, L., Wu, X., Zhang, X.: CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. pp. 87–88. ASIACCS 2012. Association for Computing Machinery, New York (2012). https://doi.org/10.1145/2414456.2414507 Xu, L., Wu, X., Zhang, X.: CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. pp. 87–88. ASIACCS 2012. Association for Computing Machinery, New York (2012). https://​doi.​org/​10.​1145/​2414456.​2414507
Metadaten
Titel
Verifiable Attribute-Based Proxy Re-encryption with Non-repudiation Based on Blockchain
verfasst von
Yaorui He
Ting Liang
Pei Huang
Zhe Xia
Copyright-Jahr
2024
DOI
https://doi.org/10.1007/978-3-031-60037-1_7

Premium Partner