4.7 Article

TrustAccess: A Trustworthy Secure Ciphertext-Policy and Attribute Hiding Access Control Scheme Based on Blockchain

Journal

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY
Volume 69, Issue 6, Pages 5784-5798

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TVT.2020.2967099

Keywords

Access control; Blockchain; Privacy; Smart contracts; Encryption; Blockchain; access control; CP-ABE; security; privacy

Funding

  1. Nature Key Research and Development Program of China [2017YFB1400700]
  2. National Natural Science Foundation of China [61602537, U1509214, 61902290]
  3. Beijing Social Science Foundation [16XCC023]
  4. Science and Technology Development Center of Ministry of Education [2019J02022]
  5. Central University of Finance and Economics program for the Youth Talent Support Plan [QYP1808]
  6. China Postdoctoral Science Foundation [2018M640962]
  7. National Natural Science Foundation of Shaanxi Province [2019JM-109]
  8. Fundamental Research Funds for the Central Universities [JB191508]

Ask authors/readers for more resources

Ciphertext-policy attribute-based encryption (CP-ABE) is widely used in fine-grained access control to achieve the secure data sharing. However, most of the existing CP-ABE access control schemes involve intermediary entities, which might suffer from a high trust-building cost, single point of failure and so on. Due to the decentralization and transparency of blockchain, some blockchain-based access control schemes are proposed to address these problems, but bring new challenges, such as the privacy leakage of access policy or attribute. In this paper, we propose a new trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain, named TrustAccess, to achieve trustworthy access while guaranteeing the privacy of policy and attribute. For one thing, to make the existing hidden policy CP-ABE more efficient and scalable for blockchain, we propose an optimized hidden policy CP-ABE, named OHP-CP-ABE, to ensure policy privacy while satisfying the large universe access requirement. For another thing, we use the multiplicative homomorphic ElGamal cryptosystem to ensure the attribute privacy during authorization validation. Finally, we theoretically prove the security of our TrustAccess from the aspects of blockchain operations and OHP-CP-ABE. Comprehensive comparisons and extensive experiments are conducted to demonstrate the advantages of our TrustAccess.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available