Journal of Computer Applications ›› 2024, Vol. 44 ›› Issue (2): 485-489.DOI: 10.11772/j.issn.1001-9081.2023020173

• Cyber security • Previous Articles    

Attribute-based encryption scheme for blockchain privacy protection

Haifeng MA1(), Yuxia LI1, Qingshui XUE1, Jiahai YANG2, Yongfu GAO1   

  1. 1.School of Computer Science & Information Engineering,Shanghai Institute of Technology,Shanghai 201418,China
    2.Institute of Network Science and Cyberspace,Tsinghua University,Beijing 100084,China
  • Received:2023-02-23 Revised:2023-03-30 Accepted:2023-04-03 Online:2024-02-22 Published:2024-02-10
  • Contact: Haifeng MA
  • About author:LI Yuxia, born in 1996, M. S. candidate. Her research interests include blockchain, privacy protection.
    XUE Qingshui, born in 1971, Ph. D., professor. His research interests include cyberspace security.
    YANG Jiahai, born in 1966, Ph. D., professor. His research interests include Internet management, network measurement and security.
    GAO Yongfu, born in 1998, M. S. candidate. His research interests include blockchain, privacy protection.
  • Supported by:
    State Grid Project(SGHAXTOOWWJS2200033)


马海峰1(), 李玉霞1, 薛庆水1, 杨家海2, 高永福1   

  1. 1.上海应用技术大学 计算机科学与信息工程学院,上海 201418
    2.清华大学 网络科学与网络空间研究院,北京 100084
  • 通讯作者: 马海峰
  • 作者简介:李玉霞(1996—),女,河南漯河人,硕士研究生,主要研究方向:区块链、隐私保护
  • 基金资助:


To solve the security problems caused by the disclosure of blockchain ledgers, the key lies in the hiding of private information. An attribute-based encryption scheme with multiple authorities was proposed for privacy protection of blockchain data. Compared to single authority, multiple authorities are decentralized and avoid any single point of failure. First, the key component generation algorithm was modified, where each authority used the user identity as a parameter to generate private key components, preventing collusion between nodes to access unauthorized data. Then, identity-based signature technology was modified to establish a connection between user identities and wallet addresses, making the blockchain policeable and the illegal users traceable. Finally, based on the DBDH (Decisional Bilinear Diffie-Hellman) hypothesis, the safety of the proposed scheme was proved in random oracle model. The experimental results show that, compared with the blockchain privacy protection scheme based on the ring signature based on the elliptic curve and the blockchain privacy protection scheme supporting keyword forgetting search, the proposed scheme takes the least amount of time and is more feasible, when generating the same number of blocks.

Key words: blockchain, privacy protection, policeable, attribute-based encryption, on-chain data



关键词: 区块链, 隐私保护, 可监管, 属性基加密, 链上数据

CLC Number: