Journal of Xidian University ›› 2022, Vol. 49 ›› Issue (1): 1-16.doi: 10.19665/j.issn1001-2400.2022.01.001
• Special Issue on Privacy Computing and Data Security • Next Articles
LI Xuelian1(),ZHANG Xiachuan1(),GAO Juntao2(),XIANG Dengmei1()
Received:
2021-08-05
Online:
2022-02-20
Published:
2022-04-27
CLC Number:
LI Xuelian,ZHANG Xiachuan,GAO Juntao,XIANG Dengmei. Blockchain data sharing scheme supporting attribute and proxy re-encryption[J].Journal of Xidian University, 2022, 49(1): 1-16.
[1] |
BUTPHENG C, YEH K H, XIONG H. Security and Privacy in Iot-Cloud-Based E-Health Systems-A Comprehensive Review[J]. Symmetry, 2020, 12(7):1191.
doi: 10.3390/sym12071191 |
[2] |
HATHALIYA J J, TANWAR S. An Exhaustive Survey on Security and Privacy Issues in Healthcare 4.0[J]. Computer Communications, 2020, 153:311-335.
doi: 10.1016/j.comcom.2020.02.018 |
[3] |
XU Y, DING L, CUI J, et al. PP-CSA:A Privacy-Preserving Cloud Storage Auditing Scheme for Data Sharing[J]. IEEE Systems Journal, 2021, 15(3):3730-3739.
doi: 10.1109/JSYST.2020.3018692 |
[4] |
WANG S L, LIANG K T, LIU J K, et al. Attribute-Based Data Sharing Scheme Revisited in Cloud Computing[J]. IEEE Transactions on Information Forensics and Security, 2016, 11(8):1661-1673.
doi: 10.1109/TIFS.2016.2549004 |
[5] |
ZHANG L Y, YE Y D, MU Y. Multi-Authority Access Control with Anonymous Authentication for Personal Health Record[J]. IEEE Internet of Things Journal, 2020, 8(1):156-167.
doi: 10.1109/JIOT.2020.3000775 |
[6] |
SHAHID F, ASHRAF H, GHANI A, et al. PSDS-Proficient Security over Distributed Storage:A Method for Data Transmission in Cloud[J]. IEEE Access, 2020, 8:118285-118298.
doi: 10.1109/ACCESS.2020.3004433 |
[7] | ZICHICHI M, FERRETTI S, D'ANGELO G. A Distributed Ledger Based Infrastructure for Smart Transportation System and Social Good[C]// 2020 IEEE 17th Annual Consumer Communications & Networking Conference.Piscataway:IEEE, 2020:1-6. |
[8] | 于金霞, 何旭, 闫玺玺. 机构可验证的密文策略属性基加密方案[J]. 西安电子科技大学学报, 2019, 46(4):49-57. |
YU Jinxia, HE Xu, YAN Xixi. Ciphertext-Policy Attribute-Based Encryption Scheme with Verifiability on Authority[J]. Journal of Xidian University, 2019, 46(4):49-57. | |
[9] | GUO H, MEAMARI E, SHEN CC. Multi-Authority Attribute-Based Access Control with Smart Contract[C]// Proceedings of the 2019 International Conference on Blockchain Technology. New York: ACM, 2019:6-11. |
[10] | ZUO Y T, KANG ZZ, XU J, et al. BCAS:A Blockchain-Based Ciphertext-Policy Attribute-Based Encryption Scheme for Cloud Data Security Sharing[J]. International Journal of Distributed Sensor Networks, 2021, 17(3):1-16. |
[11] |
WANG H, SONG Y J. Secure Cloud-Based Ehr System Using Attribute-Based Cryptosystem and Blockchain[J]. Journal of Medical Systems, 2018, 42(8):152-164.
doi: 10.1007/s10916-018-0994-6 |
[12] |
WANG S P, ZHANG Y L, ZHANG Y L. A Blockchain-Based Framework for Data Sharing with Fine-Grained Access Control in Decentralized Storage Systems[J]. IEEE Access, 2018, 6:38437-38450.
doi: 10.1109/ACCESS.2018.2851611 |
[13] |
XIA Q I, SIFAH E B, ASAMOAH K O, et al. Medshare:Trust-Less Medical Data Sharing Among Cloud Service Providers Via Blockchain[J]. IEEE Access, 2017, 5:14757-14767.
doi: 10.1109/ACCESS.2017.2730843 |
[14] | 杨颜博, 张嘉伟, 马建峰. 一种使用区块链保护车联网数据隐私的方法[J]. 西安电子科技大学学报, 2021, 48(3):21-30. |
YANG Yanbo, ZHANG Jiawei, MA Jianfeng. Method for Using The Blockchain to Protect Data Privacy of Iov[J]. Journal of Xidian University, 2021, 48(3):21-30. | |
[15] | 李莉, 曾庆贤, 文义红, 等. 基于区块链与代理重加密的数据共享方案[J]. 信息网络安全, 2020(8):16-24. |
LI Li, ZENG Qingxian, WEN Yihong, et al. Data Sharing Scheme Based on the Blockchain and the Proxy Re-Encryption[J]. Netinfo Security, 2020, 20(8):16-24. | |
[16] | 翟社平, 汪一景, 陈思吉. 区块链技术在电子病历共享的应用研究[J]. 西安电子科技大学学报, 2020, 47(5):103-112. |
ZHAI Sheping, WANG Yijing, CHEN Siji. Research on the Application of Blockchain Technology in the Sharing of Electronic Medical Records[J]. Journal of Xidian University, 2020, 47(5):103-112. | |
[17] |
POURNAGHI S M, BAYAT M, FARJAMIY. Medsba:A Novel and Secure Scheme to Share Medical Data Based on Blockchain Technology and Attribute-Based Encryption[J]. Journal of Ambient Intelligence and Humanized Computing, 2020, 11(11):4613-4641.
doi: 10.1007/s12652-020-01710-y |
[18] |
SHAMSHAD S, MAHMOOD K, KUMARI S, et al. A Secure Blockchain-Based E-Health Records Storage and Sharing Scheme[J]. Journal of Information Security and Applications, 2020, 55:102590.
doi: 10.1016/j.jisa.2020.102590 |
[19] |
ZHANG L Y, HU G C, Mu Yi, et al. Hidden Ciphertext Policy Attribute-Based Encryption with Fast Decryption for Personal Health Record System[J]. IEEE Access, 2019, 7:33202-33213.
doi: 10.1109/ACCESS.2019.2902040 |
[20] | YING Z B, SI Y P, MA J F, et al. FHPT:Fine-Grained EHR Sharing in E-Healthcare Cloud with Hidden Policy and Traceability[C]// GLOBECOM 2020-2020 IEEE Global Communications Conference.Piscataway:IEEE, 2020:1-6. |
[21] |
HU G, ZHANG L Y, MU Y, et al. An Expressive “Test-Decrypt-Verify” Attribute-Based Encryption Scheme with Hidden Policy for Smart Medical Cloud[J]. IEEE Systems Journal, 2021, 15(1):365-376.
doi: 10.1109/JSYST.2020.2996216 |
[22] | CUI H, DENG R H, WU G W, et al. An Efficient and Expressive Ciphertext-Policy Attribute-Based Encryption Scheme with Partially Hidden Access Structures[C]// International Conference on Provable Security.Berlin:Springer, 2016:19-38. |
[23] | 闫玺玺, 刘媛, 李子臣, 等. 策略半隐藏且支持更新的多机构属性加密方案[J]. 西安电子科技大学学报, 2018, 45(2):122-128. |
YAN Xixi, LIU Yuan, LI Zichen, et al. Multi-Authority Attribute-Based Encryption Scheme with Policy Semi-Hidden and Dynamic Updating[J]. Journal of Xidian University, 2018, 45(2):122-128. | |
[24] | HONG H, SUN Z. Towards Secure Data Sharing in Cloud Computing Using Attribute Based Proxy Re-Encryption with Keyword Search[C]// IEEE International Conference on Cloud Computing & Big Data Analysis.Piscataway:IEEE, 2017:218-223. |
[25] | 张小红, 孙岚岚. 属性代理重加密的区块链密文云存储共享研究[J]. 系统仿真学报, 2020, 32(6):1009-1020. |
ZHANG Xiaohong, SUN Lanlan. Attribute Proxy Re-Encryption for Ciphertext Storage Sharing Scheme on Blockchain[J]. Journal of System Simulation, 2020, 32(6):1009-1020. | |
[26] | MAO X, LI X, WU X, et al. Anonymous Attribute-Based Conditional Proxy Re-Encryption[C]// International Conference on Network and System Security.Berlin:Springer, 2018:95-110. |
[27] |
DENG H, QIN Z, WU Q, et al. Flexible Attribute-Based Proxy Re-Encryption for Efficient Data Sharing[J]. Information Sciences, 2020, 511:94-113.
doi: 10.1016/j.ins.2019.09.052 |
[1] | DU Ruizhong,WANG Yi,TIAN Junfeng. Support dynamic and verifiable scheme for ciphertext retrieval [J]. Journal of Xidian University, 2022, 49(1): 35-46. |
[2] | YANG Yanbo,ZHANG Jiawei,MA Jianfeng. Method for using the blockchain to protect data privacy of IoV [J]. Journal of Xidian University, 2021, 48(3): 21-30. |
[3] | LI Jinze,WANG Zhonghao,LI Mengheng,QIN Tuanfa. Spectrum sharing management method for the small-area-blockchain based on district partition [J]. Journal of Xidian University, 2020, 47(6): 122-130. |
[4] | ZHAI Sheping,WANG Yijing,CHEN Siji. Research on the application of blockchain technology in the sharing of electronic medical records [J]. Journal of Xidian University, 2020, 47(5): 103-112. |
[5] | ZHANG Yinghao,LIU Xiaofan. Preliminary research on the blockchain protocol in satellite broadcasting network environment [J]. Journal of Xidian University, 2020, 47(5): 11-18. |
[6] | LI Han,ZHANG Chen,HUANG Hejiao,GUO Yu. Algorithm for encrypted search with forward secure updates and verification [J]. Journal of Xidian University, 2020, 47(5): 48-56. |
[7] | DING Yong,XIANG Hengkui,LUO Decun,ZOU Xiuqing,LIANG Hai. Scheme for electronic certificate storage by combining Fabric technology [J]. Journal of Xidian University, 2020, 47(5): 113-121. |
[8] | ZHAO Zijun,YING Zuobin,YANG Zhao,LIU Ximeng,MA Jianfeng. Recommendation of platoon members by combining the blockchain and vehicular social network [J]. Journal of Xidian University, 2020, 47(5): 122-129. |
[9] | SI Chengxiang,GAO Feng,ZHU Liehuang,GONG Guopeng,ZHANG Can,CHEN Zhuo,LI Ruiguang. Covert data transmission mechanism based on dynamic label in blockchain [J]. Journal of Xidian University, 2020, 47(5): 94-102. |
[10] | LAN Yiqin,ZHANG Fangguo,TIAN Haibo. Using Monero to realize covert communication [J]. Journal of Xidian University, 2020, 47(5): 19-27. |
[11] | WANG Hui,WANG Licheng,BAI Xue,LIU Qinghua,SHEN Xiaoying. Research on key technology of blockchain privacy protection and scalability [J]. Journal of Xidian University, 2020, 47(5): 28-39. |
[12] | WANG Jiaheng,LE Yuwei,ZHANG Bowen,GUO Ruiwei,GAO Zheng,WANG Ziyue,LING Xintong. Blockchain radio access network:a new architecture for future mobile communications [J]. Journal of Xidian University, 2020, 47(5): 3-10. |
[13] | LIU Naian,CHEN Zhihao,LIU Guokun,LI Yang. Mechanism for proof-of-reputation consensus for blockchain validator nodes [J]. Journal of Xidian University, 2020, 47(5): 57-62. |
[14] | MA Shiyang,DONG Xuewen,QUAN Yining,TONG Wei,YANG Lingxiao. Method for evaluation of web services compatibility based on the blockchain’s consensus algorithm [J]. Journal of Xidian University, 2020, 47(5): 63-69. |
[15] | XIE Yixi,JI Lixin. Blockchain-based bio-inspired distributed detection approach [J]. Journal of Xidian University, 2020, 47(5): 70-76. |
|