Journal of Computer Applications ›› 2024, Vol. 44 ›› Issue (3): 811-818.DOI: 10.11772/j.issn.1001-9081.2023040430
Special Issue: 网络空间安全
• Cyber security • Previous Articles Next Articles
Gaimei GAO, Jin ZHANG(), Chunxia LIU, Weichao DANG, Shangwang BAI
Received:
2023-04-18
Revised:
2023-08-01
Accepted:
2023-08-07
Online:
2023-12-04
Published:
2024-03-10
Contact:
Jin ZHANG
About author:
GAO Gaimei, born in 1978, Ph. D., associate professor. Her research interests include blockchain, network security, cryptography.Supported by:
通讯作者:
张瑾
作者简介:
高改梅(1978—),女,山西吕梁人,副教授,博士,CCF会员,主要研究方向:区块链、网络安全、密码学基金资助:
CLC Number:
Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding[J]. Journal of Computer Applications, 2024, 44(3): 811-818.
高改梅, 张瑾, 刘春霞, 党伟超, 白尚旺. 基于区块链与CP-ABE策略隐藏的众包测试任务隐私保护方案[J]. 《计算机应用》唯一官方网站, 2024, 44(3): 811-818.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2023040430
方案 | 私钥长度 | 密文长度 | 解密运算 | |||
---|---|---|---|---|---|---|
文献[ | 2+ | 0 | 1+ | 1+ | 1+ | 2+ |
CTTPP | 1+ | 0 | 2 | 1+ | 2 | 1+2 |
Tab. 1 Comparison of encryption and decryption storage and calculation overhead
方案 | 私钥长度 | 密文长度 | 解密运算 | |||
---|---|---|---|---|---|---|
文献[ | 2+ | 0 | 1+ | 1+ | 1+ | 2+ |
CTTPP | 1+ | 0 | 2 | 1+ | 2 | 1+2 |
方案 | 访问结构 | 群阶 | 复杂性假设 | 策略隐藏 |
---|---|---|---|---|
文献[ | LSSS | Composite order | Non-standard | Partial |
文献[ | LSSS | Prime order | K-Linear | Partial |
文献[ | Tree | Composite order | Non-standard | Partial |
CTTPP | Tree | Prime order | DBDH | Partial |
Tab. 2 Performance comparison of policy hiding schemes
方案 | 访问结构 | 群阶 | 复杂性假设 | 策略隐藏 |
---|---|---|---|---|
文献[ | LSSS | Composite order | Non-standard | Partial |
文献[ | LSSS | Prime order | K-Linear | Partial |
文献[ | Tree | Composite order | Non-standard | Partial |
CTTPP | Tree | Prime order | DBDH | Partial |
系统 属性数 | 本文方案的加密时间/s | 文献[ | ||||
---|---|---|---|---|---|---|
末端 节点1 | 末端 节点2 | 末端 节点3 | 末端 节点1 | 末端 节点2 | 末端 节点3 | |
5 | 0.110 | 0.322 | 0.550 | 0.153 | 0.410 | 0.600 |
10 | 0.120 | 0.335 | 0.558 | 0.187 | 0.417 | 0.632 |
15 | 0.131 | 0.345 | 0.561 | 0.205 | 0.436 | 0.642 |
20 | 0.125 | 0.329 | 0.563 | 0.235 | 0.451 | 0.672 |
25 | 0.142 | 0.331 | 0.564 | 0.250 | 0.453 | 0.691 |
30 | 0.126 | 0.332 | 0.563 | 0.260 | 0.473 | 0.709 |
35 | 0.125 | 0.343 | 0.562 | 0.265 | 0.479 | 0.731 |
40 | 0.111 | 0.330 | 0.558 | 0.279 | 0.481 | 0.756 |
45 | 0.124 | 0.341 | 0.560 | 0.305 | 0.496 | 0.771 |
50 | 0.125 | 0.349 | 0.570 | 0.320 | 0.510 | 0.791 |
Tab. 3 Comparison between encryption time and number of system attributes
系统 属性数 | 本文方案的加密时间/s | 文献[ | ||||
---|---|---|---|---|---|---|
末端 节点1 | 末端 节点2 | 末端 节点3 | 末端 节点1 | 末端 节点2 | 末端 节点3 | |
5 | 0.110 | 0.322 | 0.550 | 0.153 | 0.410 | 0.600 |
10 | 0.120 | 0.335 | 0.558 | 0.187 | 0.417 | 0.632 |
15 | 0.131 | 0.345 | 0.561 | 0.205 | 0.436 | 0.642 |
20 | 0.125 | 0.329 | 0.563 | 0.235 | 0.451 | 0.672 |
25 | 0.142 | 0.331 | 0.564 | 0.250 | 0.453 | 0.691 |
30 | 0.126 | 0.332 | 0.563 | 0.260 | 0.473 | 0.709 |
35 | 0.125 | 0.343 | 0.562 | 0.265 | 0.479 | 0.731 |
40 | 0.111 | 0.330 | 0.558 | 0.279 | 0.481 | 0.756 |
45 | 0.124 | 0.341 | 0.560 | 0.305 | 0.496 | 0.771 |
50 | 0.125 | 0.349 | 0.570 | 0.320 | 0.510 | 0.791 |
系统 属性数 | 本文方案的解密时间/s | 文献[ | ||||
---|---|---|---|---|---|---|
末端 节点1 | 末端 节点2 | 末端 节点3 | 末端 节点1 | 末端 节点2 | 末端 节点3 | |
5 | 0.183 | 0.374 | 0.550 | 0.220 | 0.418 | 0.630 |
10 | 0.185 | 0.384 | 0.556 | 0.222 | 0.420 | 0.632 |
15 | 0.188 | 0.385 | 0.559 | 0.231 | 0.419 | 0.642 |
20 | 0.198 | 0.387 | 0.580 | 0.233 | 0.430 | 0.645 |
25 | 0.205 | 0.397 | 0.582 | 0.234 | 0.429 | 0.660 |
30 | 0.210 | 0.398 | 0.600 | 0.245 | 0.439 | 0.665 |
35 | 0.208 | 0.397 | 0.600 | 0.250 | 0.448 | 0.682 |
40 | 0.221 | 0.410 | 0.610 | 0.252 | 0.450 | 0.682 |
45 | 0.230 | 0.420 | 0.625 | 0.260 | 0.469 | 0.685 |
50 | 0.232 | 0.423 | 0.626 | 0.265 | 0.470 | 0.690 |
Tab. 4 Comparison between decryption time and number of system attributes
系统 属性数 | 本文方案的解密时间/s | 文献[ | ||||
---|---|---|---|---|---|---|
末端 节点1 | 末端 节点2 | 末端 节点3 | 末端 节点1 | 末端 节点2 | 末端 节点3 | |
5 | 0.183 | 0.374 | 0.550 | 0.220 | 0.418 | 0.630 |
10 | 0.185 | 0.384 | 0.556 | 0.222 | 0.420 | 0.632 |
15 | 0.188 | 0.385 | 0.559 | 0.231 | 0.419 | 0.642 |
20 | 0.198 | 0.387 | 0.580 | 0.233 | 0.430 | 0.645 |
25 | 0.205 | 0.397 | 0.582 | 0.234 | 0.429 | 0.660 |
30 | 0.210 | 0.398 | 0.600 | 0.245 | 0.439 | 0.665 |
35 | 0.208 | 0.397 | 0.600 | 0.250 | 0.448 | 0.682 |
40 | 0.221 | 0.410 | 0.610 | 0.252 | 0.450 | 0.682 |
45 | 0.230 | 0.420 | 0.625 | 0.260 | 0.469 | 0.685 |
50 | 0.232 | 0.423 | 0.626 | 0.265 | 0.470 | 0.690 |
环境 | 配置 |
---|---|
软件环境 | IntelliJ IDEA 2021.3.2 |
Java 1.8 | |
VMware Workstation 15 Pro | |
Ubuntu 16.04 | |
Hyperledger Fabric 2.3.0 | |
Couch DB 2.3.1 | |
Golang 1.12.6 | |
Docker 20.10.1 | |
Docker-compose 1.27.3 | |
测试环境 | Hyperledger Caliper |
Tab. 5 Environmental configuration
环境 | 配置 |
---|---|
软件环境 | IntelliJ IDEA 2021.3.2 |
Java 1.8 | |
VMware Workstation 15 Pro | |
Ubuntu 16.04 | |
Hyperledger Fabric 2.3.0 | |
Couch DB 2.3.1 | |
Golang 1.12.6 | |
Docker 20.10.1 | |
Docker-compose 1.27.3 | |
测试环境 | Hyperledger Caliper |
1 | HOWE J. The rise of crowdsourcing [J]. Wired Magazine, 2006, 14(6): 1-4. |
2 | 冯剑红,李国良,冯建华.众包技术研究综述[J].计算机学报,2015, 38(9):1713-1726. 10.11897/SP.J.1016.2015.01713 |
FENG J H, LI G L, FENG J H. A survey on crowdsourcing [J]. Chinese Journal of Computers, 2015, 38(9): 1713-1726. 10.11897/SP.J.1016.2015.01713 | |
3 | 阳真,黄松,郑长友.基于区块链与改进CP-ABE的众测知识产权保护技术研究[J].计算机科学,2022,49(5):325-332. 10.11896/jsjkx.210900075 |
YANG Z, HUANG S, ZHENG C Y. Study on crowdsourced testing intellectual property protection technology based on blockchain and improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. 10.11896/jsjkx.210900075 | |
4 | BETHENCOURT J, SAHAI A, WATERS B. Ciphertext-policy attribute-based encryption [C]// Proceedings of the 2007 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2007: 321-334. 10.1109/sp.2007.11 |
5 | YIN H, ZHANG L, CUI Y. Improving security in ciphertext-policy attribute-based encryption with hidden access policy and testing[J]. KSII Transactions on Internet and Information Systems, 2019, 13(5): 2768-2780. 10.3837/tiis.2019.05.029 |
6 | QIU S, LIU J, SHI Y, et al. Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack [J]. SCIENCE CHINA Information Sciences, 2017, 60: 052105. 10.1007/s11432-015-5449-9 |
7 | GAO S, PIAO G R, ZHU J, et al. TrustAccess: a trustworthy secure ciphertext-policy and attribute hiding access control scheme based on blockchain [J]. IEEE Transactions on Vehicular Technology, 2020, 69(6): 5784-5798. 10.1109/tvt.2020.2967099 |
8 | 宋衍,韩臻,刘凤梅,等.基于访问树的策略隐藏属性加密方案[J].通信学报,2015,36(9):119-126. |
SONG Y, HAN Z, LIU F M, et al. Attribute-based encryption with hidden policies in the access tree [J]. Journal on Communications, 2015, 36(9): 119-126. | |
9 | 李新,彭长根,牛翠翠.隐藏树型访问结构的属性加密方案[J].密码学报,2016,3(5):471-479. |
LI X, PENG C G, NIU C C. Attribute-based encryption scheme with hidden tree access structures [J]. Journal of Cryptologic Research, 2016, 3(5): 471-479. | |
10 | LI F, LIU K, ZHANG L, et al. EHRChain: a blockchain-based ehr system using attribute-based and homomorphic cryptosystem[J]. IEEE Transactions on Services Computing, 2021, 15(5): 2755-2765. 10.1109/tsc.2021.3078119 |
11 | GAN T, LIAO Y, LIANG Y, et al. Partial policy hiding attribute-based encryption in vehicular fog computing [J]. Soft Computing, 2021, 25: 10543-10559. 10.1007/s00500-021-05996-8 |
12 | WANG H, LIANG J, DING Y, et al. Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health [J]. Computer Standards & Interfaces, 2022, 84: 103696. 10.1016/j.csi.2022.103696 |
13 | YIN H, XIONG Y, DENG T, et al. A privacy-preserving and identity-based personalized recommendation scheme for encrypted tasks in crowdsourcing [J]. IEEE Access, 2019, 7: 138857-138871. 10.1109/access.2019.2943114 |
14 | CAO L, KANG Y, WU Q, et al. Searchable encryption cloud storage with dynamic data update to support efficient policy hiding[J]. China Communications, 2020, 17(6): 153-163. 10.23919/jcc.2020.06.013 |
15 | HAN D, PAN N, LI K-C. A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection [J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(1): 316-327. 10.1109/tdsc.2020.2977646 |
16 | ZHANG W, ZHANG Z, XIONG H, et al. PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 13: 613-627. 10.1007/s12652-021-02922-6 |
17 | 刘敖迪,杜学绘,王娜,等.基于区块链的大数据访问控制机制[J].软件学报,2019,30(9):2636-2654. |
LIU A D, DU X H, WANG N, et al. Blockchain-based access control mechanism for big data [J]. Journal of Software, 2019, 30(9): 2636-2654. | |
18 | 杜瑞忠,刘妍,田俊峰.物联网中基于智能合约的访问控制方法[J].计算机研究与发展,2019,56(10):2287-2298. 10.7544/issn1000-1239.2019.20190416 |
DU R Z, LIU Y, TIAN J F. An access control method using smart contract for internet of things [J]. Journal of Computer Research and Development, 2019, 56(10): 2287- 2298. 10.7544/issn1000-1239.2019.20190416 | |
19 | CHATTERJEE S, MENEZES A. On cryptographic protocols employing asymmetric pairings — the role of Ψ revisited [J]. Discrete Applied Mathematics, 2011, 159(13): 1311-1322. 10.1016/j.dam.2011.04.021 |
20 | KATZ J, LINDELL Y. Introduction to Modern Cryptography [M]. Boca Ranton: Chapman & Hall/CRC Press, 2007: 3-18. 10.1201/9781420010756 |
21 | WATERS B. Efficient identity-based encryption without random oracles [C]// Proceedings of the 2005 Conference on Advances in Cryptology — EUROCRYPT 2005. Cham: Springer, 2005: 114-127. 10.1007/11426639_7 |
22 | LYNN B. The Pairing-Based Cryptography (PBC) library[DB/OL]. [2023-04-01]. . |
23 | BETHENCOURT J, SAHAI A, WATERS B. The cpabe toolkit. [DB/OL]. [2023-02-19]. . 10.1109/sp.2007.11 |
[1] | Tingwei CHEN, Jiacheng ZHANG, Junlu WANG. Random validation blockchain construction for federated learning [J]. Journal of Computer Applications, 2024, 44(9): 2770-2776. |
[2] | Xiaoling SUN, Danhui WANG, Shanshan LI. Dynamic ciphertext sorting and retrieval scheme based on blockchain [J]. Journal of Computer Applications, 2024, 44(8): 2500-2505. |
[3] | He HUANG, Yu JIN. Cloud data auditing scheme based on voting and Ethereum smart contracts [J]. Journal of Computer Applications, 2024, 44(7): 2093-2101. |
[4] | Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG. Consortium blockchain modification method based on chameleon hash and verifiable secret sharing [J]. Journal of Computer Applications, 2024, 44(7): 2087-2092. |
[5] | Xuebin CHEN, Zhiqiang REN, Hongyang ZHANG. Review on security threats and defense measures in federated learning [J]. Journal of Computer Applications, 2024, 44(6): 1663-1672. |
[6] | Jiao LI, Xiushan ZHANG, Yuanhang NING. Blockchain sharding method for reducing cross-shard transaction proportion [J]. Journal of Computer Applications, 2024, 44(6): 1889-1896. |
[7] | Peiqian LIU, Shuilian WANG, Zihao SHEN, Hui WANG. Location privacy protection algorithm based on trajectory perturbation and road network matching [J]. Journal of Computer Applications, 2024, 44(5): 1546-1554. |
[8] | Lipeng ZHAO, Bing GUO. Blockchain consensus improvement algorithm based on BDLS [J]. Journal of Computer Applications, 2024, 44(4): 1139-1147. |
[9] | Meihong CHEN, Lingyun YUAN, Tong XIA. Data classified and graded access control model based on master-slave multi-chain [J]. Journal of Computer Applications, 2024, 44(4): 1148-1157. |
[10] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. |
[11] | Yifan WANG, Shaofu LIN, Yunjiang LI. Highway free-flow tolling method based on blockchain and zero-knowledge proof [J]. Journal of Computer Applications, 2024, 44(12): 3741-3750. |
[12] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[13] | Jing LIANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Traceability storage model of charity system oriented to master-slave chain [J]. Journal of Computer Applications, 2024, 44(12): 3751-3758. |
[14] | Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity authentication scheme based on certificate-less signcryption [J]. Journal of Computer Applications, 2024, 44(12): 3731-3740. |
[15] | Keshuo SUN, Haiying GAO, Yang SONG. Multi-authority attribute-based encryption scheme for private blockchain over public blockchain [J]. Journal of Computer Applications, 2024, 44(12): 3699-3708. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||