Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme
Abstract
:1. Introduction
- (1)
- We propose an outsourced decryption method in which the user uses the verification parameters stored in the blockchain to quickly verify the third-party outsourcing results, ensuring the correctness of the outsourced decryption results, and reducing the computational cost at the user’s end;
- (2)
- We hide the access policy to effectively prevent the user’s specific attribute values from being leaked to third parties and ensure user privacy security;
- (3)
- We use blockchain technology to build trust among multiple authorities and four smart contracts to compute keys or tokens for attributes managed across multiple administrative domains, which avoids a single point of failure and reduces the communication and computation overhead on the data user side.
2. Related Work
2.1. Multi-Authority Attribute-Based Encryption
2.2. Hiding Access Policy
2.3. Outsourcing Decryption
3. Preliminaries
3.1. Bilinear Maps
- (1)
- Bilinear: , we have .
- (2)
- Non-degeneracy: .
- (3)
- Computability: , there exists an efficient algorithm to compute .
3.2. Determined Bilinear Diffie-Hellman Problem
3.3. Access Structure
- (1)
- The segmentation of the secret value s forms a vector. These partitions are all elements in . For , a shared generating matrix M exists with l rows and n columns. Function maps mapped to the attribute Universe, given that the vector is the secret value to be shared, where are random elements in . is the l secret value partitions over the secret value s. The xth secret value segmentation is noted as , which corresponds to the property .
- (2)
- In order to reconstruct the secret value s, the user whose attributes satisfy the access policy can find a set of constants ,, …, in polynomial time such that , where X represents the set of rows corresponding to the user’s attribute set S in the matrix. The secret value is finally reconstructed according to the following equation.
3.4. Shamir Secret Sharing
- (1)
- Share. To share a secret with a threshold t among n participants, we first construct a polynomial of order , where are the random elements in . Then, the sharing of n participants is , where
- (2)
- Reconstruct. In order to obtain the results from the n partitions in any t reconstructed secret values s, computed using Lagrangian interpolation:
3.5. Smart Contract
4. Scheme Model
4.1. System Model
4.2. Syntax
4.3. Security Model
5. Scheme Implementation
5.1. System Initialization Phase
Algorithm 1 Attribute management |
|
Algorithm 2 Public attribute key generation |
|
5.2. Decryption Key Generation Phase
Algorithm 3 User attribute key generation |
|
- (1)
- When DU completes registration, calculates the attribute key segmentation , and sends the segmentation to the UAKGC.
- (2)
- After the UAKGC receives at least , we calculate
Algorithm 4 User attribute confused token generation |
|
- (1)
- DU computes , where is the attribute in the user attribute set, and then sends to each AA through a secure channel. To verify DU’s ownership of the attribute, AAs confirm . After successful verification, AAs share the secret between each other secret sharing, compute the partition of the confused key token for attribute , and send this partition to the UACTGC.
- (2)
- After the UACTGC collects at least , it computesThe user attribute confused key .
- (3)
- The user decrypts with his private key to get the attribute confused key .
5.3. Encryption Phase
- (1)
- To hide the attributes in the matrix and protect the privacy of the data sharing parties, DO needs to confuse the attribute mapping function: DO randomly chooses , computes . DO substitutes for the attributes mapped by the rows of the shared generation matrix: , where . The access policy is then transformed into an LSSS scheme over the attributes of interest.
- (2)
- For each row of the matrix M, DO randomly selects a set of vectors , where the secret values . Let where is the xth row of the matrix M. DO randomly select a set of vectors , compute . And randomly choosing . Then the ciphertext is calculated as
5.4. Decryption Phase
- (1)
- To view the data of DO, DU initiates an access request to the blockchain and then downloads the from the CSP. DU calculates , where is the number of attributes in the user attribute set, based on () and in the ciphertext and . DU computes the line number , and sends the outsourced decryption key to the CSP, where .
- (2)
- If the user satisfies the access policy, then must be a full rank matrix. CSP finds a set in polynomial time such that , where corresponds to the set of attributes satisfying the policy , and helps to recover the secret value s. The CSP then performs outsourced decryption based on the received user attribute key.
6. Scheme Analysis
6.1. Correctness Analysis
6.1.1. The Correctness of CSP Outsourcing Decryption
6.1.2. The Correctness of DU Decryption
6.2. Security Analysis
6.2.1. Policy Hidden Security
6.2.2. System Robustness
6.2.3. Security against Collusion Attack
6.2.4. Adaptive Selection of Ciphertext Indistinguishable Security under Chosen Plaintext Attack (INDS-CPA)
6.3. Performance Analysis
6.3.1. Feature Comparison
6.3.2. Communication Overhead
6.3.3. Computation Overhead
6.3.4. Blockchain Simulation Experiments
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Xue, Y.; Xue, K.; Gai, N.; Hong, J.; Wei, D.S.; Hong, P. An attribute-based controlled collaborative access control scheme for public cloud storage. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2927–2942. [Google Scholar] [CrossRef]
- Hao, J.; Huang, C.; Ni, J.; Rong, H.; Xian, M.; Shen, X.S. Fine-grained data access control with attribute-hiding policy for cloud-based IoT. Comput. Netw. 2019, 153, 1–10. [Google Scholar] [CrossRef]
- Li, J.; Chen, N.; Zhang, Y. Extended file hierarchy access control scheme with attribute-based encryption in cloud computing. IEEE Trans. Emerg. Top. Comput. 2019, 9, 983–993. [Google Scholar] [CrossRef]
- Zhang, Y.; Deng, R.H.; Xu, S.; Sun, J.; Li, Q.; Zheng, D. Attribute-based encryption for cloud computing access control: A survey. ACM Comput. Surv. (CSUR) 2020, 53, 1–41. [Google Scholar] [CrossRef]
- Lewko, A.; Waters, B. Decentralizing attribute-based encryption. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2011; pp. 568–588. [Google Scholar]
- Li, W.; Xue, K.; Xue, Y.; Hong, J. TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Trans. Parallel Distrib. Syst. 2015, 27, 1484–1496. [Google Scholar] [CrossRef]
- Zhong, H.; Zhu, W.; Xu, Y.; Cui, J. Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput. 2018, 22, 243–251. [Google Scholar] [CrossRef]
- Li, J.; Chen, X.; Chow, S.S.; Huang, Q.; Wong, D.S.; Liu, Z. Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 2018, 112, 89–96. [Google Scholar] [CrossRef]
- Zhang, L.; Ren, J.; Mu, Y.; Wang, B. Privacy-preserving multi-authority attribute-based data sharing framework for smart grid. IEEE Access 2020, 8, 23294–23307. [Google Scholar] [CrossRef]
- Li, J.; Zhang, Y.; Ning, J.; Huang, X.; Poh, G.S.; Wang, D. Attribute based encryption with privacy protection and accountability for CloudIoT. IEEE Trans. Cloud Comput. 2020, 10, 762–773. [Google Scholar] [CrossRef]
- Gao, J.; Wang, C. TSM: An Efficient Time-Sensitive Data Sharing Scheme in Cloud Storage. In Proceedings of the International Conference on Multi-Modal Information Analytics; Springer: Berlin/Heidelberg, Germany, 2022; pp. 414–421. [Google Scholar]
- Zhang, Y.; Chen, X.; Li, J.; Wong, D.S.; Li, H. Anonymous attribute-based encryption supporting efficient decryption test. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Berlin, Germany, 4–8 November 2013; pp. 511–516. [Google Scholar]
- Huang, D.; Zhou, Z. Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption. U.S. Patent Application 14/216,202, 18 August 2016. [Google Scholar]
- Xiong, H.; Zhao, Y.; Peng, L.; Zhang, H.; Yeh, K.H. Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Future Gener. Comput. Syst. 2019, 97, 453–461. [Google Scholar] [CrossRef]
- Zhang, L.; Hu, G.; Mu, Y.; Rezaeibagha, F. Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system. IEEE Access 2019, 7, 33202–33213. [Google Scholar] [CrossRef]
- Liu, Y.; Du, R. Efficient partially policy-hidden with multi-authority for access control scheme in Internet of Things. In Proceedings of the 2020 International Conference on Networking and Network Applications (NaNA), Haikou, China, 10–13 December 2020; pp. 375–380. [Google Scholar]
- Zeng, P.; Zhang, Z.; Lu, R.; Choo, K.K.R. Efficient policy-hiding and large universe attribute-based encryption with public traceability for internet of medical things. IEEE Internet Things J. 2021, 8, 10963–10972. [Google Scholar] [CrossRef]
- Zhang, W.; Zhang, Z.; Xiong, H.; Qin, Z. PHAS-HEKR-CP-ABE: Partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system. J. Ambient Intell. Humaniz. Comput. 2022, 13, 613–627. [Google Scholar] [CrossRef]
- Green, M.; Hohenberger, S.; Waters, B. Outsourcing the Decryption of {ABE} Ciphertexts. In Proceedings of the 20th USENIX Security Symposium (USENIX Security 11), San Francisco, CA, USA, 8–12 August 2011. [Google Scholar]
- Lai, J.; Deng, R.H.; Guan, C.; Weng, J. Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 2013, 8, 1343–1354. [Google Scholar]
- Qin, B.; Deng, R.H.; Liu, S.; Ma, S. Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1384–1393. [Google Scholar]
- Fan, K.; Xu, H.; Gao, L.; Li, H.; Yang, Y. Efficient and privacy preserving access control scheme for fog-enabled IoT. Future Gener. Comput. Syst. 2019, 99, 134–142. [Google Scholar] [CrossRef]
- Guo, R.; Zhuang, C.; Shi, H.; Zhang, Y.; Zheng, D. A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing. Int. J. Distrib. Sens. Netw. 2020, 16, 1550147720906796. [Google Scholar] [CrossRef]
- Liu, S.; Yu, J.; Xiao, Y.; Wan, Z.; Wang, S.; Yan, B. BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT. IEEE Internet Things J. 2020, 7, 7851–7867. [Google Scholar] [CrossRef]
- Zhao, J.; Zeng, P.; Choo, K.K.R. An efficient access control scheme with outsourcing and attribute revocation for fog-enabled E-health. IEEE Access 2021, 9, 13789–13799. [Google Scholar] [CrossRef]
- Guo, R.; Yang, G.; Shi, H.; Zhang, Y.; Zheng, D. O 3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System. IEEE Internet Things J. 2021, 8, 8949–8963. [Google Scholar] [CrossRef]
- Beimel, A. Secure Schemes for Secret Sharing and Key Distribution; Technion-Israel Institute of Technology: Haifa, Israel, 1996. [Google Scholar]
- Hoffstein, J.; Pipher, J.; Silverman, J.H. International Algorithmic Number Theory Symposium; Springer: Berlin, Germany, 1998; pp. 48–63. [Google Scholar]
- Pang, L.J.; Wang, Y.M. A new (t, n) multi-secret sharing scheme based on Shamir’s secret sharing. Appl. Math. Comput. 2005, 167, 840–848. [Google Scholar] [CrossRef]
- Szabo, N. Smart contracts: Building blocks for digital markets. EXTROPY J. Transhumanist Thought 1996, 18, 28. [Google Scholar]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yang, X.; Zhang, C. Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme. Appl. Sci. 2022, 12, 10812. https://doi.org/10.3390/app122110812
Yang X, Zhang C. Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme. Applied Sciences. 2022; 12(21):10812. https://doi.org/10.3390/app122110812
Chicago/Turabian StyleYang, Xiaohui, and Chenshuo Zhang. 2022. "Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme" Applied Sciences 12, no. 21: 10812. https://doi.org/10.3390/app122110812