Journal of Computer Applications ›› 2024, Vol. 44 ›› Issue (3): 811-818.DOI: 10.11772/j.issn.1001-9081.2023040430
• Cyber security • Previous Articles Next Articles
Gaimei GAO, Jin ZHANG(), Chunxia LIU, Weichao DANG, Shangwang BAI
Received:
2023-04-18
Revised:
2023-08-01
Accepted:
2023-08-07
Online:
2023-12-04
Published:
2024-03-10
Contact:
Jin ZHANG
About author:
GAO Gaimei, born in 1978, Ph. D., associate professor. Her research interests include blockchain, network security, cryptography.Supported by:
通讯作者:
张瑾
作者简介:
高改梅(1978—),女,山西吕梁人,副教授,博士,CCF会员,主要研究方向:区块链、网络安全、密码学基金资助:
CLC Number:
Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding[J]. Journal of Computer Applications, 2024, 44(3): 811-818.
高改梅, 张瑾, 刘春霞, 党伟超, 白尚旺. 基于区块链与CP-ABE策略隐藏的众包测试任务隐私保护方案[J]. 《计算机应用》唯一官方网站, 2024, 44(3): 811-818.
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.joca.cn/EN/10.11772/j.issn.1001-9081.2023040430
方案 | 私钥长度 | 密文长度 | 解密运算 | |||
---|---|---|---|---|---|---|
文献[ | 2+ | 0 | 1+ | 1+ | 1+ | 2+ |
CTTPP | 1+ | 0 | 2 | 1+ | 2 | 1+2 |
Tab. 1 Comparison of encryption and decryption storage and calculation overhead
方案 | 私钥长度 | 密文长度 | 解密运算 | |||
---|---|---|---|---|---|---|
文献[ | 2+ | 0 | 1+ | 1+ | 1+ | 2+ |
CTTPP | 1+ | 0 | 2 | 1+ | 2 | 1+2 |
方案 | 访问结构 | 群阶 | 复杂性假设 | 策略隐藏 |
---|---|---|---|---|
文献[ | LSSS | Composite order | Non-standard | Partial |
文献[ | LSSS | Prime order | K-Linear | Partial |
文献[ | Tree | Composite order | Non-standard | Partial |
CTTPP | Tree | Prime order | DBDH | Partial |
Tab. 2 Performance comparison of policy hiding schemes
方案 | 访问结构 | 群阶 | 复杂性假设 | 策略隐藏 |
---|---|---|---|---|
文献[ | LSSS | Composite order | Non-standard | Partial |
文献[ | LSSS | Prime order | K-Linear | Partial |
文献[ | Tree | Composite order | Non-standard | Partial |
CTTPP | Tree | Prime order | DBDH | Partial |
系统 属性数 | 本文方案的加密时间/s | 文献[ | ||||
---|---|---|---|---|---|---|
末端 节点1 | 末端 节点2 | 末端 节点3 | 末端 节点1 | 末端 节点2 | 末端 节点3 | |
5 | 0.110 | 0.322 | 0.550 | 0.153 | 0.410 | 0.600 |
10 | 0.120 | 0.335 | 0.558 | 0.187 | 0.417 | 0.632 |
15 | 0.131 | 0.345 | 0.561 | 0.205 | 0.436 | 0.642 |
20 | 0.125 | 0.329 | 0.563 | 0.235 | 0.451 | 0.672 |
25 | 0.142 | 0.331 | 0.564 | 0.250 | 0.453 | 0.691 |
30 | 0.126 | 0.332 | 0.563 | 0.260 | 0.473 | 0.709 |
35 | 0.125 | 0.343 | 0.562 | 0.265 | 0.479 | 0.731 |
40 | 0.111 | 0.330 | 0.558 | 0.279 | 0.481 | 0.756 |
45 | 0.124 | 0.341 | 0.560 | 0.305 | 0.496 | 0.771 |
50 | 0.125 | 0.349 | 0.570 | 0.320 | 0.510 | 0.791 |
Tab. 3 Comparison between encryption time and number of system attributes
系统 属性数 | 本文方案的加密时间/s | 文献[ | ||||
---|---|---|---|---|---|---|
末端 节点1 | 末端 节点2 | 末端 节点3 | 末端 节点1 | 末端 节点2 | 末端 节点3 | |
5 | 0.110 | 0.322 | 0.550 | 0.153 | 0.410 | 0.600 |
10 | 0.120 | 0.335 | 0.558 | 0.187 | 0.417 | 0.632 |
15 | 0.131 | 0.345 | 0.561 | 0.205 | 0.436 | 0.642 |
20 | 0.125 | 0.329 | 0.563 | 0.235 | 0.451 | 0.672 |
25 | 0.142 | 0.331 | 0.564 | 0.250 | 0.453 | 0.691 |
30 | 0.126 | 0.332 | 0.563 | 0.260 | 0.473 | 0.709 |
35 | 0.125 | 0.343 | 0.562 | 0.265 | 0.479 | 0.731 |
40 | 0.111 | 0.330 | 0.558 | 0.279 | 0.481 | 0.756 |
45 | 0.124 | 0.341 | 0.560 | 0.305 | 0.496 | 0.771 |
50 | 0.125 | 0.349 | 0.570 | 0.320 | 0.510 | 0.791 |
系统 属性数 | 本文方案的解密时间/s | 文献[ | ||||
---|---|---|---|---|---|---|
末端 节点1 | 末端 节点2 | 末端 节点3 | 末端 节点1 | 末端 节点2 | 末端 节点3 | |
5 | 0.183 | 0.374 | 0.550 | 0.220 | 0.418 | 0.630 |
10 | 0.185 | 0.384 | 0.556 | 0.222 | 0.420 | 0.632 |
15 | 0.188 | 0.385 | 0.559 | 0.231 | 0.419 | 0.642 |
20 | 0.198 | 0.387 | 0.580 | 0.233 | 0.430 | 0.645 |
25 | 0.205 | 0.397 | 0.582 | 0.234 | 0.429 | 0.660 |
30 | 0.210 | 0.398 | 0.600 | 0.245 | 0.439 | 0.665 |
35 | 0.208 | 0.397 | 0.600 | 0.250 | 0.448 | 0.682 |
40 | 0.221 | 0.410 | 0.610 | 0.252 | 0.450 | 0.682 |
45 | 0.230 | 0.420 | 0.625 | 0.260 | 0.469 | 0.685 |
50 | 0.232 | 0.423 | 0.626 | 0.265 | 0.470 | 0.690 |
Tab. 4 Comparison between decryption time and number of system attributes
系统 属性数 | 本文方案的解密时间/s | 文献[ | ||||
---|---|---|---|---|---|---|
末端 节点1 | 末端 节点2 | 末端 节点3 | 末端 节点1 | 末端 节点2 | 末端 节点3 | |
5 | 0.183 | 0.374 | 0.550 | 0.220 | 0.418 | 0.630 |
10 | 0.185 | 0.384 | 0.556 | 0.222 | 0.420 | 0.632 |
15 | 0.188 | 0.385 | 0.559 | 0.231 | 0.419 | 0.642 |
20 | 0.198 | 0.387 | 0.580 | 0.233 | 0.430 | 0.645 |
25 | 0.205 | 0.397 | 0.582 | 0.234 | 0.429 | 0.660 |
30 | 0.210 | 0.398 | 0.600 | 0.245 | 0.439 | 0.665 |
35 | 0.208 | 0.397 | 0.600 | 0.250 | 0.448 | 0.682 |
40 | 0.221 | 0.410 | 0.610 | 0.252 | 0.450 | 0.682 |
45 | 0.230 | 0.420 | 0.625 | 0.260 | 0.469 | 0.685 |
50 | 0.232 | 0.423 | 0.626 | 0.265 | 0.470 | 0.690 |
环境 | 配置 |
---|---|
软件环境 | IntelliJ IDEA 2021.3.2 |
Java 1.8 | |
VMware Workstation 15 Pro | |
Ubuntu 16.04 | |
Hyperledger Fabric 2.3.0 | |
Couch DB 2.3.1 | |
Golang 1.12.6 | |
Docker 20.10.1 | |
Docker-compose 1.27.3 | |
测试环境 | Hyperledger Caliper |
Tab. 5 Environmental configuration
环境 | 配置 |
---|---|
软件环境 | IntelliJ IDEA 2021.3.2 |
Java 1.8 | |
VMware Workstation 15 Pro | |
Ubuntu 16.04 | |
Hyperledger Fabric 2.3.0 | |
Couch DB 2.3.1 | |
Golang 1.12.6 | |
Docker 20.10.1 | |
Docker-compose 1.27.3 | |
测试环境 | Hyperledger Caliper |
1 | HOWE J. The rise of crowdsourcing [J]. Wired Magazine, 2006, 14(6): 1-4. |
2 | 冯剑红,李国良,冯建华.众包技术研究综述[J].计算机学报,2015, 38(9):1713-1726. 10.11897/SP.J.1016.2015.01713 |
FENG J H, LI G L, FENG J H. A survey on crowdsourcing [J]. Chinese Journal of Computers, 2015, 38(9): 1713-1726. 10.11897/SP.J.1016.2015.01713 | |
3 | 阳真,黄松,郑长友.基于区块链与改进CP-ABE的众测知识产权保护技术研究[J].计算机科学,2022,49(5):325-332. 10.11896/jsjkx.210900075 |
YANG Z, HUANG S, ZHENG C Y. Study on crowdsourced testing intellectual property protection technology based on blockchain and improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. 10.11896/jsjkx.210900075 | |
4 | BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption [C]// Proceedings of the 2007 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2007: 321-334. 10.1109/sp.2007.11 |
5 | YIN H, ZHANG L, CUI Y. Improving security in ciphertext-policy attribute-based encryption with hidden access policy and testing[J]. KSII Transactions on Internet and Information Systems, 2019, 13(5): 2768-2780. 10.3837/tiis.2019.05.029 |
6 | QIU S, LIU J, SHI Y, et al. Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack [J]. SCIENCE CHINA Information Sciences, 2017, 60: 052105. 10.1007/s11432-015-5449-9 |
7 | GAO S, PIAO G R, ZHU J, et al. TrustAccess: a trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain [J]. IEEE Transactions on Vehicular Technology, 2020, 69(6): 5784-5798. 10.1109/tvt.2020.2967099 |
8 | 宋衍,韩臻,刘凤梅,等.基于访问树的策略隐藏属性加密方案[J].通信学报,2015,36(9):119-126. |
SONG Y, HAN Z, LIU F M, et al. Attribute-based encryption with hidden policies in the access tree [J]. Journal on Communications, 2015, 36(9): 119-126. | |
9 | 李新,彭长根,牛翠翠.隐藏树型访问结构的属性加密方案[J].密码学报,2016,3(5):471-479. |
LI X, PENG C G, NIU C C. Attribute-based encryption scheme with hidden tree access structures [J]. Journal of Cryptologic Research, 2016, 3(5): 471-479. | |
10 | LI F, LIU K, ZHANG L, et al. EHRChain: a blockchain-based ehr system using attribute-based and homomorphic cryptosystem[J]. IEEE Transactions on Services Computing, 2021, 15(5): 2755-2765. 10.1109/tsc.2021.3078119 |
11 | GAN T, LIAO Y, LIANG Y, et al. Partial policy hiding attribute-based encryption in vehicular fog computing [J]. Soft Computing, 2021, 25: 10543-10559. 10.1007/s00500-021-05996-8 |
12 | WANG H, LIANG J, DING Y, et al. Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health [J]. Computer Standards & Interfaces, 2022, 84: 103696. 10.1016/j.csi.2022.103696 |
13 | YIN H, XIONG Y, DENG T, et al. A privacy-preserving and identity-based personalized recommendation scheme for encrypted tasks in crowdsourcing [J]. IEEE Access, 2019, 7: 138857-138871. 10.1109/access.2019.2943114 |
14 | CAO L, KANG Y, WU Q, et al. Searchable encryption cloud storage with dynamic data update to support efficient policy hiding[J]. China Communications, 2020, 17(6): 153-163. 10.23919/jcc.2020.06.013 |
15 | HAN D, PAN N, LI K-C. A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection [J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(1): 316-327. 10.1109/tdsc.2020.2977646 |
16 | ZHANG W, ZHANG Z, XIONG H, et al. PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 13: 613-627. 10.1007/s12652-021-02922-6 |
17 | 刘敖迪,杜学绘,王娜,等.基于区块链的大数据访问控制机制[J].软件学报,2019,30(9):2636-2654. |
LIU A D, DU X H, WANG N, et al. Blockchain-based access control mechanism for big data [J]. Journal of Software, 2019, 30(9): 2636-2654. | |
18 | 杜瑞忠,刘妍,田俊峰.物联网中基于智能合约的访问控制方法[J].计算机研究与发展,2019,56(10):2287-2298. 10.7544/issn1000-1239.2019.20190416 |
DU R Z, LIU Y, TIAN J F. An access control method using smart contract for internet of things [J]. Journal of Computer Research and Development, 2019, 56(10): 2287- 2298. 10.7544/issn1000-1239.2019.20190416 | |
19 | CHATTERJEE S, MENEZES A. On cryptographic protocols employing asymmetric pairings — the role of Ψ revisited [J]. Discrete Applied Mathematics, 2011, 159(13): 1311-1322. 10.1016/j.dam.2011.04.021 |
20 | KATZ J, LINDELL Y. Introduction to Modern Cryptography [M]. Boca Ranton: Chapman & Hall/CRC Press, 2007: 3-18. 10.1201/9781420010756 |
21 | WATERS B. Efficient identity-based encryption without random oracles [C]// Proceedings of the 2005 Conference on Advances in Cryptology — EUROCRYPT 2005. Cham: Springer, 2005: 114-127. 10.1007/11426639_7 |
22 | LYNN B. The Pairing-Based Cryptography (PBC) library[DB/OL]. [2023-04-01]. . |
23 | BETHENCOURT J, SAHAI A, WATERS B. The cpabe toolkit. [DB/OL]. [2023-02-19]. . 10.1109/sp.2007.11 |
[1] | Lipeng ZHAO, Bing GUO. Blockchain consensus improvement algorithm based on BDLS [J]. Journal of Computer Applications, 2024, 44(4): 1139-1147. |
[2] | Meihong CHEN, Lingyun YUAN, Tong XIA. Data classified and graded access control model based on master-slave multi-chain [J]. Journal of Computer Applications, 2024, 44(4): 1148-1157. |
[3] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. |
[4] | Hui ZHOU, Yuling CHEN, Xuewei WANG, Yangwen ZHANG, Jianjiang HE. Deep shadow defense scheme of federated learning based on generative adversarial network [J]. Journal of Computer Applications, 2024, 44(1): 223-232. |
[5] | Juangui NING, Guofang DONG. Blockchain-based vehicle-to-infrastructure fast handover authentication scheme in VANET [J]. Journal of Computer Applications, 2024, 44(1): 252-260. |
[6] | Li LI, Chunyan YANG, Jiangwen ZHU, Ronglei HU. User plagiarism identification scheme in social network under blockchain [J]. Journal of Computer Applications, 2024, 44(1): 242-251. |
[7] | Haiying MA, Jinzhou LI, Jikun YANG. Blockchain-based decentralized attribute-based encryption scheme for revocable attributes [J]. Journal of Computer Applications, 2023, 43(9): 2789-2797. |
[8] | Shuo HUANG, Yanhui LI, Jianqiu CAO. PrivSPM: frequent sequential pattern mining algorithm under local differential privacy [J]. Journal of Computer Applications, 2023, 43(7): 2057-2064. |
[9] | Wanzhen CHEN, En ZHANG, Leiyong QIN, Shuangxi HONG. Privacy-preserving federated learning algorithm based on blockchain in edge computing [J]. Journal of Computer Applications, 2023, 43(7): 2209-2216. |
[10] | Luyu CHEN, Xiaofeng MA, Jing HE, Shengzhi GONG, Jian GAO. Blockchain smart contract privacy authorization method based on TrustZone [J]. Journal of Computer Applications, 2023, 43(6): 1969-1978. |
[11] | Ran ZHAI, Xuebin CHEN, Guopeng ZHANG, Langtao PEI, Zheng MA. Improved K-anonymity privacy protection algorithm based on different sensitivities [J]. Journal of Computer Applications, 2023, 43(5): 1497-1503. |
[12] | Meng CAO, Sunjie YU, Hui ZENG, Hongzhou SHI. Hierarchical access control and sharing system of medical data based on blockchain [J]. Journal of Computer Applications, 2023, 43(5): 1518-1526. |
[13] | Chunyong YIN, Rui QU. Federated learning algorithm based on personalized differential privacy [J]. Journal of Computer Applications, 2023, 43(4): 1160-1168. |
[14] | Yihan WANG, Chen TANG, Lan ZHANG. Anti-fraud and anti-tampering online trading mechanism for bulk stock [J]. Journal of Computer Applications, 2023, 43(4): 1309-1317. |
[15] | Juncheng TONG, Bo ZHAO. Review on blockchain smart contract vulnerability detection and automatic repair [J]. Journal of Computer Applications, 2023, 43(3): 785-793. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||