Journal of Xidian University ›› 2022, Vol. 49 ›› Issue (2): 135-145.doi: 10.19665/j.issn1001-2400.2022.02.016
• Computer Science and Technology & Cyberspace Security • Previous Articles Next Articles
ZENG Huixiang1(),XI Ning1(),XIE Qingqing2(),LV Jing1(),CUI Zhihao1(),MA Jianfeng1()
Received:
2022-01-06
Online:
2022-04-20
Published:
2022-05-31
Contact:
Ning XI
E-mail:hxzeng_20@stu.xidian.edu.cn;nxi@xidian.edu.cn;xieqq@ujs.edu.cn;lvj@stu.xidian.edu.cn;cuizhihao3@qq.com;jfma@mail.xidian.edu.cn
CLC Number:
ZENG Huixiang,XI Ning,XIE Qingqing,LV Jing,CUI Zhihao,MA Jianfeng. Decentralized ciphertext sharing based on blockchain[J].Journal of Xidian University, 2022, 49(2): 135-145.
[1] |
ALAM M R, REAZ M B I, ALI M A M. A Review of Smart Homes-Past,Present,and Future[J]. IEEE Transactions on Systems,Man,and Cybernetics:Part C (Applications and Reviews), 2012, 42(6):1190-1203.
doi: 10.1109/TSMCC.2012.2189204 |
[2] |
ZUNGERU A M, GABOITAOLELWE J, DIARRA B, et al. A Secured Smart Home Switching System based on Wireless Communications and Self-Energy Harvesting[EB/OL].[2021-12-20]. DOI: 10.1109/ACCESS.2019.2900305.
doi: 10.1109/ACCESS.2019.2900305 |
[3] |
HANUMANTHAIAH A, ARIUN D, LIVA M L, et al. Integrated Cloud based Smart Home with Automation and Remote Controllability[C/OL].[2021-12-24].DOI: 10.1109/ICCES45898.2019.9002245.
doi: 10.1109/ICCES45898.2019.9002245 |
[4] |
FADHIL J A, OMAR O A, SARHAN Q I. A Survey on the Applications of Smart Home Systems[C/OL].[2021-12-22].DOI: 10.1109/CSASE48920.2020.9142103.
doi: 10.1109/CSASE48920.2020.9142103 |
[5] |
GOYAL V, PANDEY O, SAHAI A, et al. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data[C/OL].[2021-12-25].DOI: 10.1145/1180405.1180418.
doi: 10.1145/1180405.1180418 |
[6] | BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-Policy Attribute- Based Encryption[C]// Proceedings of IEEE Symposium Security Privacy.Piscataway:IEEE, 2007:321-334. |
[7] | LEWKO A, WATERS B. Decentralizing Attribute-Based Encryption[C]// Advances in Cryptology (Lecture Notes in Computer Science):vol.6632.Heidelberg:Springer-Verlag, 2011:568-588. |
[8] | HAN J, SUSILO W, MU Y, et al. Improving Privacy and Security in Decentralized Ciphertext-Policy Attribute-Based Encryption[J]. IEEE Transactions on Information Forensics & Security, 2017, 10(3):665-678. |
[9] | JEMEL M, SERHROUCHNI A. Decentralized Access Control Mechanism with Temporal Dimension Based on Blockchain[C]// 2017 IEEE 14th International Conference on e-Business Engineering (ICEBE).Piscataway:IEEE, 2017:177-182. |
[10] | GAO S, PIAO G, ZHU J, et al. TrustAccess:A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme based on Blockchain[J]. IEEE Transactions on Vehicular Technology, 2020(99):1. |
[11] | 邱云翔, 张红霞, 曹琪, 等. 基于CP-ABE算法的区块链数据访问控制方案[J]. 网络与信息安全学报, 2020, 6(3):88-98. |
QIU Yunxiang, ZHANG Hongxia, CAO Qi, et al. Blockchain Data Access Control Scheme based on CP-ABE Algorithm[J]. Chinese Journal of Network and Information Security, 2020, 6(3):88-98. | |
[12] |
FAN K, PAN Q, ZHANG K, et al. A Secure and Verifiable Data Sharing Scheme Based on Blockchain in Vehicular Social Networks[J]. IEEE Transactions on Vehicular Technology, 2020, 69(6):5826-5835.
doi: 10.1109/TVT.2020.2968094 |
[13] | 牛淑芬, 杨平平, 谢亚亚, 等. 区块链上基于云辅助的密文策略属性基数据共享加密方案[J]. 电子与信息学报, 2021, 43(7):1864-1871. |
NIU Shufen, YANG Pingping, XIE Yaya, et al. Cloud-Assisted Ciphertext Policy Attribute Based Encryption Data Sharing Encryption Scheme based on Block Chain[J]. Journal of Electronics & Information Technology, 2021, 43(7):1864-1871. | |
[14] | 尚松超, 陈勃翰, 颜光伟, 等. 基于区块链的数据共享访问控制模型[J]. 通信技术, 2021, 54(12):2666-2673. |
SHANG Songchao, CHEN Bohan, YAN Guangwei, et al. Model for Data Sharing and Access Control based on Bolocechain[J]. Communications Technology, 2021, 54(12):2666-2673. | |
[15] | DAN B, FRANKLIN M. Identity-Based Encryption from the Weil Pairing[C]// Proceedings of Advances Cryptology.Heidelberg:Springer, 2001:213-229. |
[16] |
GRAMOLI V. From Blockchain Consensus Back to Byzantine Consensus[J]. Future Generation Computer Systems, 2020, 107:760-769.
doi: 10.1016/j.future.2017.09.023 |
[17] |
GAO S, YU T, ZHU J, et al. T-PBFT:An Eigentrust-Based Practical Byzantine Fault Tolerance Consensus Algorithm[J]. China Communications, 2019, 16(12):111-123.
doi: 10.23919/JCC.2019.12.008 |
[1] | PAN Senshan,XU Lamei. DorChain:Utilization of dormant coins to improve the transaction verification efficiency [J]. Journal of Xidian University, 2022, 49(2): 182-189. |
[2] | LI Xuelian,ZHANG Xiachuan,GAO Juntao,XIANG Dengmei. Blockchain data sharing scheme supporting attribute and proxy re-encryption [J]. Journal of Xidian University, 2022, 49(1): 1-16. |
[3] | DU Ruizhong,WANG Yi,TIAN Junfeng. Support dynamic and verifiable scheme for ciphertext retrieval [J]. Journal of Xidian University, 2022, 49(1): 35-46. |
[4] | YAN Xixi,ZHAO Qiang,TANG Yongli,LI Yingying,LI Jingran. Multi-keyword search encryption scheme supporting flexible access control [J]. Journal of Xidian University, 2022, 49(1): 55-66. |
[5] | YANG Yanbo,ZHANG Jiawei,MA Jianfeng. Method for using the blockchain to protect data privacy of IoV [J]. Journal of Xidian University, 2021, 48(3): 21-30. |
[6] | LI Jinze,WANG Zhonghao,LI Mengheng,QIN Tuanfa. Spectrum sharing management method for the small-area-blockchain based on district partition [J]. Journal of Xidian University, 2020, 47(6): 122-130. |
[7] | ZHANG Yinghao,LIU Xiaofan. Preliminary research on the blockchain protocol in satellite broadcasting network environment [J]. Journal of Xidian University, 2020, 47(5): 11-18. |
[8] | ZHAI Sheping,WANG Yijing,CHEN Siji. Research on the application of blockchain technology in the sharing of electronic medical records [J]. Journal of Xidian University, 2020, 47(5): 103-112. |
[9] | DING Yong,XIANG Hengkui,LUO Decun,ZOU Xiuqing,LIANG Hai. Scheme for electronic certificate storage by combining Fabric technology [J]. Journal of Xidian University, 2020, 47(5): 113-121. |
[10] | ZHAO Zijun,YING Zuobin,YANG Zhao,LIU Ximeng,MA Jianfeng. Recommendation of platoon members by combining the blockchain and vehicular social network [J]. Journal of Xidian University, 2020, 47(5): 122-129. |
[11] | LAN Yiqin,ZHANG Fangguo,TIAN Haibo. Using Monero to realize covert communication [J]. Journal of Xidian University, 2020, 47(5): 19-27. |
[12] | WANG Hui,WANG Licheng,BAI Xue,LIU Qinghua,SHEN Xiaoying. Research on key technology of blockchain privacy protection and scalability [J]. Journal of Xidian University, 2020, 47(5): 28-39. |
[13] | WANG Jiaheng,LE Yuwei,ZHANG Bowen,GUO Ruiwei,GAO Zheng,WANG Ziyue,LING Xintong. Blockchain radio access network:a new architecture for future mobile communications [J]. Journal of Xidian University, 2020, 47(5): 3-10. |
[14] | LI Han,ZHANG Chen,HUANG Hejiao,GUO Yu. Algorithm for encrypted search with forward secure updates and verification [J]. Journal of Xidian University, 2020, 47(5): 48-56. |
[15] | LIU Naian,CHEN Zhihao,LIU Guokun,LI Yang. Mechanism for proof-of-reputation consensus for blockchain validator nodes [J]. Journal of Xidian University, 2020, 47(5): 57-62. |
|