Journal of Xidian University ›› 2022, Vol. 49 ›› Issue (1): 1-16.doi: 10.19665/j.issn1001-2400.2022.01.001
• Special Issue on Privacy Computing and Data Security • Next Articles
LI Xuelian1(),ZHANG Xiachuan1(
),GAO Juntao2(
),XIANG Dengmei1(
)
Received:
2021-08-05
Online:
2022-02-20
Published:
2022-04-27
CLC Number:
LI Xuelian,ZHANG Xiachuan,GAO Juntao,XIANG Dengmei. Blockchain data sharing scheme supporting attribute and proxy re-encryption[J].Journal of Xidian University, 2022, 49(1): 1-16.
[1] |
BUTPHENG C, YEH K H, XIONG H. Security and Privacy in Iot-Cloud-Based E-Health Systems-A Comprehensive Review[J]. Symmetry, 2020, 12(7):1191.
doi: 10.3390/sym12071191 |
[2] |
HATHALIYA J J, TANWAR S. An Exhaustive Survey on Security and Privacy Issues in Healthcare 4.0[J]. Computer Communications, 2020, 153:311-335.
doi: 10.1016/j.comcom.2020.02.018 |
[3] |
XU Y, DING L, CUI J, et al. PP-CSA:A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing[J]. IEEE Systems Journal, 2021, 15(3):3730-3739.
doi: 10.1109/JSYST.2020.3018692 |
[4] |
WANG S L, LIANG K T, LIU J K, et al. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(8):1661-1673.
doi: 10.1109/TIFS.2016.2549004 |
[5] |
ZHANG L Y, YE Y D, MU Y. Multi-Authority Access Control with Anonymous Authentication for Personal Health Record[J]. IEEE Internet of Things Journal, 2020, 8(1):156-167.
doi: 10.1109/JIOT.2020.3000775 |
[6] |
SHAHID F, ASHRAF H, GHANI A, et al. PSDS-Proficient Security over Distributed Storage:A Method for Data Transmission in Cloud[J]. IEEE Access, 2020, 8:118285-118298.
doi: 10.1109/ACCESS.2020.3004433 |
[7] | ZICHICHI M, FERRETTI S, D'ANGELO G. A Distributed Ledger Based Infrastructure for Smart Transportation System and Social Good[C]// 2020 IEEE 17th Annual Consumer Communications & Networking Conference.Piscataway:IEEE, 2020:1-6. |
[8] | 于金霞, 何旭, 闫玺玺. 机构可验证的密文策略属性基加密方案[J]. 西安电子科技大学学报, 2019, 46(4):49-57. |
YU Jinxia, HE Xu, YAN Xixi. Ciphertext-Policy Attribute-Based Encryption Scheme with Verifiability on Authority[J]. Journal of Xidian University, 2019, 46(4):49-57. | |
[9] | GUO H, MEAMARI E, SHEN CC. Multi-Authority Attribute-Based Access Control with Smart Contract[C]// Proceedings of the 2019 International Conference on Blockchain Technology. New York: ACM, 2019:6-11. |
[10] | ZUO Y T, KANG ZZ, XU J, et al. BCAS:A Blockchain-Based Ciphertext-Policy Attribute-Based Encryption Scheme for Cloud Data Security Sharing[J]. International Journal of Distributed Sensor Networks, 2021, 17(3):1-16. |
[11] |
WANG H, SONG Y J. Secure Cloud-Based Ehr System Using Attribute-Based Cryptosystem and Blockchain[J]. Journal of Medical Systems, 2018, 42(8):152-164.
doi: 10.1007/s10916-018-0994-6 |
[12] |
WANG S P, ZHANG Y L, ZHANG Y L. A Blockchain-Based Framework for Data Sharing with Fine-Grained Access Control in Decentralized Storage Systems[J]. IEEE Access, 2018, 6:38437-38450.
doi: 10.1109/ACCESS.2018.2851611 |
[13] |
XIA Q I, SIFAH E B, ASAMOAH K O, et al. Medshare:Trust-Less Medical Data Sharing Among Cloud Service Providers Via Blockchain[J]. IEEE Access, 2017, 5:14757-14767.
doi: 10.1109/ACCESS.2017.2730843 |
[14] | 杨颜博, 张嘉伟, 马建峰. 一种使用区块链保护车联网数据隐私的方法[J]. 西安电子科技大学学报, 2021, 48(3):21-30. |
YANG Yanbo, ZHANG Jiawei, MA Jianfeng. Method for Using The Blockchain to Protect Data Privacy of Iov[J]. Journal of Xidian University, 2021, 48(3):21-30. | |
[15] | 李莉, 曾庆贤, 文义红, 等. 基于区块链与代理重加密的数据共享方案[J]. 信息网络安全, 2020(8):16-24. |
LI Li, ZENG Qingxian, WEN Yihong, et al. Data Sharing Scheme Based on the Blockchain and the Proxy Re-Encryption[J]. Netinfo Security, 2020, 20(8):16-24. | |
[16] | 翟社平, 汪一景, 陈思吉. 区块链技术在电子病历共享的应用研究[J]. 西安电子科技大学学报, 2020, 47(5):103-112. |
ZHAI Sheping, WANG Yijing, CHEN Siji. Research on the Application of Blockchain Technology in the Sharing of Electronic Medical Records[J]. Journal of Xidian University, 2020, 47(5):103-112. | |
[17] |
POURNAGHI S M, BAYAT M, FARJAMIY. Medsba:A Novel and Secure Scheme to Share Medical Data Based on Blockchain Technology and Attribute-Based Encryption[J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11(11):4613-4641.
doi: 10.1007/s12652-020-01710-y |
[18] |
SHAMSHAD S, MAHMOOD K, KUMARI S, et al. A Secure Blockchain-Based E-Health Records Storage and Sharing Scheme[J]. Journal of Information Security and Applications, 2020, 55:102590.
doi: 10.1016/j.jisa.2020.102590 |
[19] |
ZHANG L Y, HU G C, Mu Yi, et al. Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System[J]. IEEE Access, 2019, 7:33202-33213.
doi: 10.1109/ACCESS.2019.2902040 |
[20] | YING Z B, SI Y P, MA J F, et al. FHPT:Fine-Grained EHR Sharing in E-Healthcare Cloud with Hidden Policy and Traceability[C]// GLOBECOM 2020-2020 IEEE Global Communications Conference.Piscataway:IEEE, 2020:1-6. |
[21] |
HU G, ZHANG L Y, MU Y, et al. An Expressive “Test-Decrypt-Verify” Attribute-Based Encryption Scheme with Hidden Policy for Smart Medical Cloud[J]. IEEE Systems Journal, 2021, 15(1):365-376.
doi: 10.1109/JSYST.2020.2996216 |
[22] | CUI H, DENG R H, WU G W, et al. An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures[C]// International Conference on Provable Security.Berlin:Springer, 2016:19-38. |
[23] | 闫玺玺, 刘媛, 李子臣, 等. 策略半隐藏且支持更新的多机构属性加密方案[J]. 西安电子科技大学学报, 2018, 45(2):122-128. |
YAN Xixi, LIU Yuan, LI Zichen, et al. Multi-Authority Attribute-Based Encryption Scheme with Policy Semi-Hidden and Dynamic Updating[J]. Journal of Xidian University, 2018, 45(2):122-128. | |
[24] | HONG H, SUN Z. Towards Secure Data Sharing in Cloud Computing Using Attribute Based Proxy Re-Encryption with Keyword Search[C]// IEEE International Conference on Cloud Computing & Big Data Analysis.Piscataway:IEEE, 2017:218-223. |
[25] | 张小红, 孙岚岚. 属性代理重加密的区块链密文云存储共享研究[J]. 系统仿真学报, 2020, 32(6):1009-1020. |
ZHANG Xiaohong, SUN Lanlan. Attribute Proxy Re-Encryption for Ciphertext Storage Sharing Scheme on Blockchain[J]. Journal of System Simulation, 2020, 32(6):1009-1020. | |
[26] | MAO X, LI X, WU X, et al. Anonymous Attribute-Based Conditional Proxy Re-Encryption[C]// International Conference on Network and System Security.Berlin:Springer, 2018:95-110. |
[27] |
DENG H, QIN Z, WU Q, et al. Flexible Attribute-Based Proxy Re-Encryption for Efficient Data Sharing[J]. Information Sciences, 2020, 511:94-113.
doi: 10.1016/j.ins.2019.09.052 |
[1] | ZHAI Sheping, CAO Yongqiang, YANG Rui, ZHANG Ruiting. Algorithm for byzantine fault-tolerant consensus to support dynamic feedback decision-making [J]. Journal of Xidian University, 2024, 51(6): 132-148. |
[2] | ZHOU Hao, SHAO Shiyun, MA Yong, LIU Zhiquan, GUAN Quanlong, WANG Xiaoming. Machine learning-assisted trust evaluation scheme for emergency messages in VANETs [J]. Journal of Xidian University, 2024, 51(6): 194-203. |
[3] | LI Xiaohan, YANG Yanbo, ZHANG Jiawei, LI Baoshan, MA Jianfeng. Graph neural network vulnerability detection for ethernet smart contracts [J]. Journal of Xidian University, 2024, 51(4): 139-150. |
[4] | ZHAI Sheping, ZHANG Ruiting, YANG Rui, CAO Yongqiang. Blockchain searchable encryption scheme for multi-user environment [J]. Journal of Xidian University, 2024, 51(4): 151-169. |
[5] | CAO Laicheng, HOU Yangning, FENG Tao, GUO Xian. K-anonymity privacy-preserving data sharing for a dynamic game scheme [J]. Journal of Xidian University, 2024, 51(4): 170-179. |
[6] | PENG Yongxiang, MA Yong, LIU Zhiquan, WANG Libo, WU Yongdong, CHEN Ning, TANG Yong. Efficient smart contract testing scheme supporting transactions filtering [J]. Journal of Xidian University, 2024, 51(3): 194-202. |
[7] | ZHAI Sheping, LU Xianjing, HUO Yuanyuan, YANG Rui. Improved data sharing scheme based on conditional broadcast proxy re-encryptionn [J]. Journal of Xidian University, 2024, 51(2): 224-238. |
[8] | GUO Qing, TIAN Youliang. Medicaldata privacy protection scheme supporting controlled sharing [J]. Journal of Xidian University, 2024, 51(1): 165-176. |
[9] | PENG Yongxiang, LIU Zhiquan, WANG Libo, WU Yongdong, MA Jianfeng, CHEN Ning. Contract vulnerability repair scheme supporting inline data processing [J]. Journal of Xidian University, 2024, 51(1): 178-186. |
[10] | ZHOU Hao,MA Jianfeng,LIU Zhiquan,WANG Libo,WU Yongdong,FAN Wenjie. Blockchain-assisted solution for emergency message trust evaluation in the VANET [J]. Journal of Xidian University, 2023, 50(4): 148-156. |
[11] | LIU Yuanzhen, YANG Yanbo, ZHANG Jiawei, LI Baoshan, MA Jianfeng. Blockchain scheme for anti malicious nodes in distributed machine learning [J]. Journal of Xidian University, 2023, 50(2): 178-187. |
[12] | REN Yanli,ZHAI Mengjuan,HU Mingqi. Fair redactable blockchain supporting malicious punishment [J]. Journal of Xidian University, 2023, 50(1): 203-212. |
[13] | HE Yu,TIAN Youliang,WAN Liang,YANG Li. Multi-server dynamic searchable encryption scheme supporting result verification [J]. Journal of Xidian University, 2022, 49(5): 189-200. |
[14] | ZHANG Haibo,BIAN Xia,XU Yongjun,XIANG Shengting,HE Xiaofan. Blockchain-assisted vehicle reputation management method for VANET [J]. Journal of Xidian University, 2022, 49(4): 49-59. |
[15] | ZENG Huixiang,XI Ning,XIE Qingqing,LV Jing,CUI Zhihao,MA Jianfeng. Decentralized ciphertext sharing based on blockchain [J]. Journal of Xidian University, 2022, 49(2): 135-145. |
|