Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Next Article in Journal
Reconstruction Optimization Algorithm of 3D Temperature Distribution Based on Tucker Decomposition
Next Article in Special Issue
A DDoS Detection and Prevention System for IoT Devices and Its Application to Smart Home Environment
Previous Article in Journal
Intelligent Control of Robotic Arm Using Brain Computer Interface and Artificial Intelligence
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme

School of Cyber Security and Computer, Hebei University, Baoding 071000, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(21), 10812; https://doi.org/10.3390/app122110812
Submission received: 3 October 2022 / Revised: 13 October 2022 / Accepted: 18 October 2022 / Published: 25 October 2022

Abstract

:
The Internet of Medical Things (IOMT) is critical in improving electronic device precision, dependability, and productivity. Researchers are driving the development of digital healthcare systems by connecting available medical resources and healthcare services. However, there are concerns about the security of sharing patients’ electronic health records. In response to the prevailing problems such as difficulties in sharing medical records between different hospitals and patients’ inability to grasp the usage of their medical records, we propose a patient-controlled and cloud-chain collaborative multi-authority attribute-based encryption for EHR sharing with verifiable outsourcing decryption and hiding access policies (VO-PH-MAABE). This scheme uses blockchain to store the validation parameters by utilizing its immutable, which data users use to verify the correctness of third-party outsourcing decryption results. In addition, we use policy-hiding technology to protect data privacy so that data security is guaranteed. Moreover, we use blockchain technology to establish trust among multiple authorities and utilize Shamir secret sharing and smart contracts to compute keys or tokens for attributes managed across multiple administrative domains, which avoids a single point of failure and reduces communication and computation overhead on the data user side. Finally, the ciphertext indistinguishability security under the chosen plaintext attack is demonstrated under the stochastic prediction model and compared with other schemes in terms of functionality, communication overhead, and computation overhead. The experimental results show the effectiveness of this scheme.

1. Introduction

A patient’s electronic health record (EHR) is a personal medical health record that stores patient diagnostic and treatment information, such as medical records, allergy medications, physical examination reports, family medical history, and other sensitive information. When a patient visits a doctor, he or she can see the previous medical history and synthesize the previous diagnosis or treatment results to make a more comprehensive and accurate analysis of the condition and provide a more efficient treatment plan for the patient. Meanwhile, for major infectious diseases, the sharing of EHR can also enable excellent teams from various regions to conduct an all-round, accurate and rapid study of the epidemic situation, improving the efficiency of disposal and public medical health. However, the existing IOMT system can hardly satisfy the massive EHR data sharing security.
To satisfy the access control requirements of medical data, we propose ciphertext-policy attribute-based encryption (CP-ABE) and key-policy attribute-based encryption(KP-ABE) approaches to protect the security of shared data by encrypting the shared data using a key, and only the user with the key can decrypt the data. CP-ABE can better solve the interoperability challenges among the participants. Since data owners can use CP-ABE to flexibly specify access policies to determine which attributes are required for users to decrypt, CP-ABE is considered an ideal solution for securely sharing outsourced data in public clouds. It is more suitable for access control scenarios for healthcare data.
However, in most existing CP-ABE programs [1,2,3], all participants trust an authority. Due to the centralized authority problem, the mischievous attribute authority (AA) even causes the misuse of private keys. It distributes the attribute keys to illegal users, leading to unauthorized data access. However, some multi-AA extension schemes did emerge later, dividing the attribute Universe into multiple administrative domains. Each AA manages a disjoint set of attributes, which gives rise to trust issues between attribute domains and does not fundamentally solve the single point of failure, as well as the data users bearing high computation and communication overheads. Moreover, in conventional CP-ABE, the access policy embedded in the ciphertext is publicly accessible, so an attacker can indirectly deduce sensitive identity information about the data owner and the data user [2]. In addition, CP-ABE schemes contain a large amount of bilinear computation during encryption and decryption, which consumes many computational resources and limits the application of CP-ABE [4].
The emerging blockchain technology brings a glimmer of light to these challenges. Blockchain is a distributed ledger technology with tamper-proof features, which enables anyone to host a distributed ledger and keep a permanent record of transactions. Moreover, blockchain technology can establish multi-party trust. Smart contracts deployed on the blockchain enable a collaborative computing process with multiple authorities from different attribute domains and generate attribute keys for users to decrypt data. Since there are performance bottlenecks in blockchain at this stage, and EHR usually includes large-scale, cross-media health data, such as CT, X-ray, and other medical image data, it is inefficient to store and share EHRs independently using blockchain. Thus, it is necessary to combine cloud storage and blockchain to complement each other for secure and efficient EHR sharing.
To address the above issues, we propose an EHR access control scheme (VO-PH-MAABE) for multi-authority attribute-based encryption with verifiable outsourced decryption and hidden access policies, which works as follows.
(1)
We propose an outsourced decryption method in which the user uses the verification parameters stored in the blockchain to quickly verify the third-party outsourcing results, ensuring the correctness of the outsourced decryption results, and reducing the computational cost at the user’s end;
(2)
We hide the access policy to effectively prevent the user’s specific attribute values from being leaked to third parties and ensure user privacy security;
(3)
We use blockchain technology to build trust among multiple authorities and four smart contracts to compute keys or tokens for attributes managed across multiple administrative domains, which avoids a single point of failure and reduces the communication and computation overhead on the data user side.

2. Related Work

2.1. Multi-Authority Attribute-Based Encryption

To solve the problem of a single authority and distributed management of attributes. Lewko and Waters [5] proposed a CA-free stepwise multi-authority design that uses CP-ABE with no communication among authorities and operates independently. Li et al. [6] implemented a multi-AA CP-ABE scheme TMACS for public cloud storage using (t, n) threshold secret sharing. Zhong et al. [7] proposed a decentralized multi-authority CP-ABE access control scheme. Each AA distributes attributes independently in its management domain and uses an obfuscated access matrix to protect access policy privacy. Li et al. [8] proposed a privacy-aware multi-AA CP-ABE scheme with recourse to trace the identity of dishonest users who share their decryption keys by hiding attribute information in the ciphertext. Zhang et al. [9] introduced MA-ABE into a smart grid environment, which adds a test phase to determine whether a client’s attributes conform to access rules. Li et al. [10] proposed a design for addressing user key misuse and fine-grained access supervision of encrypted IoT data on the cloud, which can resist selective plaintext attacks and overcome clients. Gao et al. [11] proposed a time-sensitive multi-authority attribute encryption scheme based on time sensitivity, where data users cannot decrypt the ciphertext before a specific time. The scheme is suitable for data sharing in time-sensitive access control scenarios.

2.2. Hiding Access Policy

In response to earlier CP-ABEs that only partially hide attribute values in the access policy but do not protect attribute names, Zhang et al. [12] designed a policy-hiding CP-ABE solution that performs attribute matching operations before full decryption. The data user uses a unique ciphertext component to test whether the attribute list satisfies the hidden access policy. The scheme has selective plaintext security under the DBDH and D-Line assumptions. Huang et al. [13] designed a CP-ABE scheme for a hiding policy. The CP-ABE scheme can compress the ciphertext length to a constant. Xiong et al. [14] designed a policy-hidden broadcast encryption scheme that supports the LSSS access structure and improves the performance of the policy. Zhang et al. [15] used CP-AB with a hidden access policy to improve the expressiveness of the policy. The scheme supports large-scale attribute collections, and the size and decryption cost of the public parameters in the scheme is constant. Liu et al. [16] used a linear secret sharing scheme to hide part of the policy. They use multiple privileges to resist the complicity attack caused by joint communication among users and protect the privacy of data in the IoT environment. Zeng et al. [17] proposed an effective ABE scheme for partial policy hiding and supporting a large attribute universe in the context of the internet of medical things (IoMT) ecosystem. The scheme shows only non-sensitive attributes and hides sensitive attributes, and the scheme can effectively track any user with the public decryption key. Zhang et al. [18] proposed a partial policy hiding scheme supporting key revocation and designed an algorithm to check whether the user attributes to match the access policy.

2.3. Outsourcing Decryption

In existing ABE schemes, the ciphertext size and decryption cost increase with the complexity of the attribute policy. Therefore, Green et al. [19] first proposed an outsourcing ABE scheme in 2011. They outsourced the complex ABE decryption computation to a third-party cloud server for decryption, which reduces the computation of the decryption process on the user side. Since the third-party cloud server is not fully trusted, the correctness of the outsourced decryption result needs to be verified. Lai et al. [20] proposed an ABE scheme that supports the verification of outsourced decryption by introducing a verification element in the ciphertext. The re-encryption key is generated based on the user key and sent to a third-party cloud server for decryption. Qin et al. [21] proposed a method to convert any ABE scheme with outsourced decryption into an ABE scheme with verifiable outsourced decryption with verifiability. Li et al. [8] proposed an accountable and verifiable outsourced decryption CP-ABE scheme. This scheme achieves accountability for the user key leakage problem and the verifiable outsourced scheme by transferring the key. Fan et al. [22] proposed a CP-ABE scheme for outsourced decryption in the IoT environment. Fog nodes assist in implementing verifiable outsourced decryption, which reduces the complexity of user computation. Guo [23] proposed a lightweight verifiable CP-ABE scheme applied to wireless body-sensing networks, which provides users with correctness verification of outsourced decryption. Liu et al. [24] proposed a blockchain-based searchable attribute-based encryption scheme BC-SABE that supports user outsourcing decryption functions. The blockchain system replaces the traditional centralized server, responsible for generating threshold parameters and key management. Zhao et al. [25] constructed an eHealth fine-grained access control system AC-FEH in a fog computing scenario, which uses fog nodes for data encryption and decryption operations to minimize the computational cost for data owners and users. Guo et al. [26] proposed a scheme with fine-grained access control, outsourced decryption, and ciphertext verification with the help of cloud servers and blockchain in the IoMT ecosystem. The scheme is based on the chameleon hash function to construct data user private keys with conflict resistance, semantic security, and keyless exposure.

3. Preliminaries

3.1. Bilinear Maps

Let q be a large prime, G 1 and G 2 be two multiplicative cyclic groups of order p multiplicative cyclic groups, and g be a generating element on G 1 . A bilinear mapping [27] e : G 1 × G 1 G 2 satisfies the following properties.
(1)
Bilinear: a , b Z p * , u , v G 1 , we have e ( g a , g b ) = e ( g , g ) a b .
(2)
Non-degeneracy: u , v G 1 , e ( u , v ) 1 .
(3)
Computability: u , v G 1 , there exists an efficient algorithm to compute e ( u , v ) .

3.2. Determined Bilinear Diffie-Hellman Problem

The deterministic bilinear Diffie–Hellman (DBDH) problem [28]: G 1 and G 2 are two multiplicative cyclic groups of order p and satisfy the bilinear mapping e : G 1 × G 1 G 2 , and g is the generator of G 1 . Given random numbers a , b , c , z Z p * and group elements g a , g b , g c G 1 , Z G 2 , we suppose no algorithm can generate a random number a , b , c , z with non-negligible distinguish Z = e ( g , g ) a b c in polynomial time with negligible advantage or Z = e ( g , g ) z . In that case, the DBDH problem is considered intractable.

3.3. Access Structure

Let U be an attribute Universe. A set A 2 U is said to be monotone provided that it satisfies the set X A and the set Y 2 U when X Y and Y A . Similarly, a geometric element in an access structure with monotonicity forms an authorized set, and an element of a set not in the access structure forms a non-authorized set. A secret sharing scheme Π over an attribute Universe is called a linear secret sharing scheme when it satisfies the following conditions:
(1)
The segmentation of the secret value s forms a vector. These partitions are all elements in Z p * . For  Π , a shared generating matrix M exists with l rows and n columns. Function ρ maps 1 , 2 , , l mapped to the attribute Universe, given that the vector v = ( s , r 1 , , r n ) , s Z p * is the secret value to be shared, where r 2 , , r n are random elements in Z p * . M v is the l secret value partitions over the secret value s. The xth secret value segmentation is noted as λ x , which corresponds to the property ρ ( x ) .
(2)
In order to reconstruct the secret value s, the user whose attributes satisfy the access policy can find a set of constants { ω 1 , ω 2 , …, ω l } in polynomial time such that x X ω x M x = ( 1 , 0 , , 0 ) , where X represents the set of rows corresponding to the user’s attribute set S in the matrix. The secret value is finally reconstructed according to the following equation.
x X ω x λ x = x X ω x ( M v ) x = x X ω x ( M x ) v = ( 1 , 0 , , 0 ) ( s , r 2 , , r n ) = s

3.4. Shamir Secret Sharing

Shamir secret sharing [29] requires the following:
(1)
Share. To share a secret s Z p * with a threshold t among n participants, we first construct a polynomial of order ( t 1 ) : f ( x ) = a 0 + a 1 x + + a t 1 x t 1 , where a 0 = s , a 1 , , a t 1 are the random elements in Z p * . Then, the sharing of n participants is s i = f ( x i ) ( i = 1 , , n ) , where x i Z p * .
(2)
Reconstruct. In order to obtain the results from the n partitions s 1 , s 2 , , s n in any t reconstructed secret values s, computed using Lagrangian interpolation:
S = i = 1 t = 1 S i j = 1 , j i t x j x j x i

3.5. Smart Contract

As protocols for executing computer transaction contracts, smart contracts were proposed by Szabo [30] in 1994. It will always exist when a smart contract is integrated into a blockchain. Any smart contract can be a part of a database with a unique address. Distributing transactions to its address can enable its functionality to manage each part of the database. A smart contract is a set of software codes that the deployer specifies the conditions it is intended to implement. Smart contracts are often organized as “if …sthen…”. Smart contracts allow code to execute autonomously, without human intervention and third-party observation, when conditions are met. The contract deployer sets it up in the blockchain, and then the user enables it by sending the required parameters to the smart contract’s address. In this scenario, the smart contract is invoked by a registered transaction in the blockchain.

4. Scheme Model

This section focuses on the system model, syntax, and security model of the VO-PH-MAABE scheme.

4.1. System Model

As shown in Figure 1, the VO-PH-MAABE system model includes six entities: certificate authorities (CAs), multi-attribute authorities (AAs), cloud servers (CSPs), data owners (DOs), data users (DUs), and Blockchain (BC).
Attribute authorities (AAs): AAs are responsible for publishing attributes to data users through the blockchain. There is a many-to-many mapping relationship between attributes and attribute management authorities. Each AA manages multiple attributes in an attribute domain, and multiple AAs can manage each attribute across domains. A segmentation of each secret is calculated and sent to the blockchain through secret sharing among AAs.
Cloud service provider (CSP): CSP provides data storage service for data owners (DO) and pre-decryption service for data users (DU) of cipher text. Because of its honest and curious nature, CSP is not trusted.
Data owner (DO): DO, also known as the patients themselves being responsible for encrypting data. They define the attribute-based access policy, encrypt the symmetric key by the access policy, and upload the resultant verification hash of the outsourced decryption to the blockchain. Then DO stores the TxID, data cipher, and key cipher returned by the blockchain to the cloud server.
Data user (DU): Data user wants to view patient cases, such as doctors, medical researchers, and insurance company managers. DU will register their attributes with AAs. In order to access the DO’s data, the DU can initiate a pre-decryption request to the CSP. The decryption will be successful only if the user’s attributes satisfy the access policy embedded in the cipher text. DU performs a power operation and hash operation on the pre-decryption result to verify the correctness of the outsourced decryption result.
Blockchain (BC): Blockchain stores public parameters and hashes for outsourced validation. After a user uploads a verification hash, the blockchain returns a transaction identifier TxID to the user. Blockchain also helps entities perform partially trusted computations and allows multiple AAs to collaboratively manage user attributes, which enables distributed management of attributes.

4.2. Syntax

This VO-PH-MAABE scheme includes the following nine algorithms.
GlobalSetup ( 1 λ ) GP : CA executes the global setup algorithm. This algorithm takes as input a security parameter λ and outputs the system public parameter G P .
AASetup ( GP ) ( pk i , sk i ) : Different AAs execute the attribute authority setup algorithm using the Shamir secret sharing scheme. This algorithm takes as input the public parameters G P , then outputs the public and private keys ( p k i , s k i ) for each A A i .
PAKGen ( pk i ) PAK : The on-chain contract executes the public attribute key generation algorithm. This algorithm takes as input the public key p k i from A A i , then outputs the public attribute key P A K .
DUSetup ( GP ) ( upk , usk ) : DU executes the data user setup algorithm. This algorithm takes as input the public parameter G P , then outputs public and private keys ( u p k , u s k ) for DU.
UAKGen ( GP , S uid ) UAK : AAs and the on-chain contract jointly execute the user attribute key generation algorithm. This algorithm takes as input the public parameter G P and an attribute set S u i d for the data user with identity u i d , then outputs the user attribute key.
UAKGen ( GP , S uid ) UAK : The contract jointly executes the user attribute confused key generation algorithm. This algorithm takes as input the public parameter G P and an attribute set S u i d for the data user with identity u i d , then outputs the user attribute confused key.
Encryption ( KEY , M data , AP , GP , PAK ) CT : DO executes the encryption algorithm. This algorithm takes as input the symmetric key K E Y , plaintext M d a t a , access policy A P , public parameters G P , and public attribute key P A K , then outputs ciphertext C T .
OutDecryption ( CT , SK O , AP ) CT : CSP executes the outsourcing decryption algorithm. This algorithm takes as input the ciphertext C T , access policy A P , and outsourcing decryption key S K O , then outputs the outsourcing decryption ciphertext C T . S K O is the user attribute key U A K that satisfies the access policy A P .
FullDecryption ( CT , usk ) M data : DU executes the full decryption algorithm. This algorithm takes as input the outsourcing decryption ciphertext C T and user private key u s k , then outputs the plaintext M d a t a .

4.3. Security Model

The challenger generates a DBDH challenge. B is a polynomial-time adversary attacking the DBDH problem, A is a polynomial-time adversary attacking this scheme, B uses A to attack the DBDH problem, and  B is viewed as A ’s challenger. We define the security concepts to show the security of the VO-PH-MAABE scheme. This scheme uses the concept of ciphertext indistinguishable security under adaptive selection plaintext attack (INDS-CPA) in the constructed proof. Including adversary A and challenger B , the specific game is as follows.
Initialization : Adversary A submits a challenge access policy ( M * , ρ * ) to Challenger  B .
Setup : Challenger B chooses a sufficiently safe parameter λ to run the S e t u p ( 1 λ ) algorithm to generate the public parameter G P . Challenger B sends G P to adversary A .
Query Phase 1 : The adversary adaptively queries the following Oracles.
O A A s : Adversary A specifies a set of corrupted permissions, and for each attribute ω belonging to the uncorrupted permissions, B runs A A S e t u p ( G P , ω ) to generate the public attribute key ( e ( g , g ) α ω , g β ω ) and returns it to A .
O U A K : Adversary A submits an identity and its corresponding attribute set ( u i d , S * ) to B . When the attribute set is insufficient for the challenge access strategy, adversary B runs U A K G e n ( u i d , ( M * , ρ * ) , S * , G P ) to generate the attribute key U A K ω , u i d , and returns it to A .
Challenge : A submits two equal-length symmetric keys K E Y 0 or K E Y 1 to B . B rolls a coin to determine the value of γ { 0 , 1 } and executes E n c r y p t ( K E Y γ , M d a t a , ( M * , ρ * ) , G P , e ( g , g ) α ω , g β ω ) C T * and sends it to A .
Query Phase 2 : Adversary A receives the challenge ciphertext C T * and continues to follow Q u e r y p h a s e 1 adaptive querying.
Guess : Adversary A guesses γ { 0 , 1 } for γ . If  γ = γ then it is concluded that adversary A wins. The advantage of adversary A in winning this game is defined as A d v V O P H M A A B E I N D S C P A ( A ) = | P r [ γ = γ ] 1 / 2 | .
If no adversary can break the above INDS-CPA game by a non-negligible margin in polynomial time, then the VOPH-MAABE scheme is considered INDS-CPA safe.

5. Scheme Implementation

This section describes in detail the system’s interaction flow and algorithm design. Four types of smart contracts are introduced in this scheme: attribute management contract (AMC), public attribute key generation contract (PAKGC), user attribute key generation contract (UAKGC), and user attribute confused token generation contract (UACTGC). As shown in Figure 2, the overall flow of the implementation of this scheme is divided into four phases: system initialization phase, decryption key generation phase, encryption phase, and decryption phase.

5.1. System Initialization Phase

As shown in Figure 3, the CA is responsible for global setup, and the AMC is responsible for managing attributes. AAs calculate the public attribute key segmentation off-chain, and PAKGC reconstructs the public attribute keys on-chain. DU is responsible for the data user setup.
Attribute Management Contract (AMC). To enable cross-domain attributes management, CA assigns multiple AAs and threshold t ω to each attribute by invoking the AMC. As shown in Algorithm 1, each attribute has two parameters: the number of AAs n ω and the threshold t ω for managing attribute ω . The data user must obtain t ω authorizations from the n ω attribute authorities to access the attribute.
Algorithm 1 Attribute management
1:
//CA invokes the contract to assign a set of authorities and thresholds to attributes
2:
if A s s i g n m e n t ( ω , A A s , t ) = true then
3:
   n ω a set of authorities;
4:
   t ω threshold;
5:
end if
GlobalSetup ( 1 λ ) GP : CA Select two prime p-order bilinear groups G 1 , G 2 , and g is the generating element of G1. e : G 1 × G 1 G 2 is a bilinear map. Then CA defines one-way hash function functions H : { 0 , 1 } * G 1 , H : G 2 Z p * and chooses random numbers y Z p * to count g y . The global parameters G P = { G 1 , G 2 , e , g , H , H , g y } .
AASetup ( GP ) ( pk i , sk i ) : The AAs collaborate using the Shamir secret sharing scheme to obtain a key partition { p k i , ω , s k i , ω } ω S i for each attribute jointly managed using a list of AAs, where S i is the set of attributes managed by A A i . For an attribute ω managed by n ω AAs, A A i randomly chooses α i , β i Z p * to generate two ( t ω 1 ) order random polynomials F i ( x ) and H i ( x ) , and the master secret is defined as
s 1 = α ω = i = 1 n ω α i , s 2 = β ω = i = 1 n ω α i
where α i = F i ( 0 ) , β i = H i ( 0 ) . For each of the other A A j with identity a i d j , A A i computes the subpartition of the master secret s i j , 1 = F i ( a i d j ) , s i j , 2 = H i ( a i d j ) , and sends ( s i j , 1 , s i j , 2 ) to A A j . A A i receives n ω 1 subsegments ( s j i , 1 , s j i , 2 ) and then computes the main segmentation of the main secret.
s i , 1 = s k α ω , i = i = 1 n ω s j i , 1 , s i , 2 = s k α ω , i = i = 1 n ω s j i , 2
The segmentation of the public attribute key p k i , ω = ( e ( g , g ) s k α ω , i , g s k α ω , i ) . Then A A i sends the p k i , ω to the contract.
P u b l i c A t t r i b u t e K e y G e n e r a t i o n C o n t r a c t ( P A K G C ) . AAs collaborate using the Shamir secret sharing scheme to generate the attribute public key for each attribute and upload it to the blockchain. Since multiple AAs jointly manage each attribute, the system needs a contract to collect the public attribute key slice generated by AAs. As shown in Algorithm 2, after the system initialization phase, the PAKGC collects t ω public attribute key segmentation p k i , ω from AAs and automatically invokes Lagrangian interpolation to calculate the public attribute key P A K ω for encryption of data.
Algorithm 2 Public attribute key generation
1:
//AAs invoke SSS to generate the segmentation of public attribute key
2:
if s e g P A K G e n ( A A i , p k i , ω ) = true then
3:
   A A i send p k i , ω to Contract;
4:
    Count[ ω ]++;
5:
    if Count[ ω ] = t ω  then
6:
        //This contract invokes Lagrangian interpolation method to generate P A K ω
7:
     P A K ω L a g r a n g i a n ( t ω , p k i , ω ) ;
8:
    end if
9:
end if
PAKGen ( pk i ) PAK : After receiving t ω public attribute key splits p k i , ω , the PAKGC calculates
e ( g , g ) α ω = i = 1 t ω e ( g , g ) s k α ω , i j = 1 , j i t ω a i d j a i d j a i d i g β ω = g s k β ω , i j = 1 , j i t ω a i d j a i d j a i d i
The public attribute key P A K ω = ( e ( g , g ) α ω , g β ω ) , and the secret attribute key S A K ω = ( α ω , β ω ) .
DUSetup ( GP ) ( upk , usk ) : Each data user who joins the system randomly chooses u s k Z p * to computes u p k = g u s k . The user needs to upload u p k to the blockchain to obtain attribute authorization.

5.2. Decryption Key Generation Phase

As shown in Figure 4, AAs collaborate using the Shamir secret sharing scheme to generate the user attribute key segmentation and user attribute confused key segmentation off-chain. The UAKGC and the UACTGC reconstruct the user attribute key and user attribute confused key on-chain.
User Attribute Key Generation Contract (UAKGC). When DU joins the system, AAs collaborate using the Shamir secret sharing scheme to generate the segmentation U A K i , ω , u i d of the user attribute key in their respective management domains. As shown in Algorithm 3, after the UAKGC collects t ω U A K i , ω , u i d partitions from AAs, it automatically invokes the Lagrangian interpolation method to calculate the user attribute key U A K ω , u i d and then sends it to the user for data decryption.
Algorithm 3 User attribute key generation
1:
//AAs invoke SSS to generate the segment of user attribute key
2:
if s e g U A K G e n ( A A i , U A K i , ω , u i d ) = true then
3:
   A A i send U A K i , ω , u i d to Contract;
4:
    Count[ ω ]++;
5:
    if Count[ ω ] = t ω then
6:
        //This contract invokes Lagrangian interpolation method to generate UAK ω
7:
     U A K ω L a g r a n g i a n ( t ω , U A K i , ω ) ;
8:
    end if
9:
end if
UAKGen ( GP , S uid ) UAK : This algorithm is classified into the following two phases.
(1)
When DU completes registration, A A i calculates the attribute key segmentation U A K i , ω , u i d = g s k α ω , i H ( u i d ) s k α ω , i , and sends the segmentation to the UAKGC.
(2)
After the UAKGC receives at least t ω U A K i , ω , u i d , we calculate
g α ω H ( u i d ) α ω = i = 1 t ω U A K i , ω , u i d j = 1 , j i t ω a i d j a i d j a i d i
The user attribute key U A K ω , u i d = g α ω H ( u i d ) α ω .
User Attribute Confused Token Generation Contract (UACTGC). The user computes H ( ω ) u s k for each attribute and sends it to each AA through a secure channel. As shown in Algorithm 4, AAs generate the segmentation U A C T i , ω , u i d of the user attribute confused token in their respective administrative domains. After the UACTGC receives at least t ω U A C T i , ω , u i d from the AAs, it automatically invokes Lagrangian interpolation to compute the user attribute confused token U A C T ω , u i d .
Algorithm 4 User attribute confused token generation
1:
//AAs invoke SSS to generate the segment of user attribute confused token
2:
if s e g U A C T G e n ( A A i , U A C T i , ω , u i d ) = true then
3:
   A A i send U A C T i , ω , u i d to Contract;
4:
    Count[ ω ]++;
5:
    if Count[ ω ] = t ω ; then
6:
        //This contract invokes Lagrangian interpolation method to generate UACT ω
7:
     U A C T ω L a g r a n g i a n ( t ω , U A C T i , ω ) ;
8:
    end if
9:
end if
UACKGen ( GP , S uid ) UACK : This algorithm is classified into the following three phases.
(1)
DU computes H ( ω ) u s k ω [ S u i d ] , where S u i d is the attribute in the user attribute set, and then sends H ( ω ) u s k to each AA through a secure channel. To verify DU’s ownership of the attribute, AAs confirm e ( H ( ω ) , u p k ) = e ( H ( ω ) u s k , g ) . After successful verification, AAs share the secret between each other secret sharing, compute the partition U A C T i , ω , u i d = H ( ω ) u s k · δ i of the confused key token for attribute ω , and send this partition to the UACTGC.
(2)
After the UACTGC collects at least t ω U A C T i , ω , u i d , it computes
H ( ω ) u s k · δ = i = 1 t ω H ( ω ) u s k · δ i j = 1 , j i t ω a i d j a i d j a i d i
The user attribute confused key U A C T ω , u i d = H ( ω ) u s k · δ .
(3)
The user decrypts with his private key to get the attribute confused key S K C = U A C K ω , u i d = [ U A C T ω , u i d ] 1 / u s k = H ( ω ) δ .

5.3. Encryption Phase

As shown in Figure 5, the DO is responsible for encrypting the medical data.
Encryption ( KEY , M data , AP , GP , PAK ) CT : The data user first encrypts plaintext with a symmetric key and then encrypts the symmetric key with the linear secret sharing scheme (LSSS). First, DO generates a symmetric key K E Y G 2 to encrypt the data A E S E n c r y p t ( K E Y , M d a t a ) = C T A E S . Then DO defines an access policy A P and converts A P into an L S S S shared generation matrix over the associated attributes and a mapping function: ( M l × m , ρ ) , where M is an l × m matrix. The function ρ maps the xth row of M to the attributes ρ ( x ) { a t t r 1 , , a t t r j } , where j [ J ] , J is an attribute in the access policy A P , and a t t r j is an attribute in the access policy. DO generates the ciphertext according to the following two steps.
(1)
To hide the attributes in the matrix and protect the privacy of the data sharing parties, DO needs to confuse the attribute mapping function: DO randomly chooses r Z p * , computes σ j = e ( ( g δ ) r , H ( a t t r j ) ) j [ J ] . DO substitutes σ j for the attributes mapped by the rows of the shared generation matrix: ρ ( x ) = e ( ( g δ ) r , H ( a t t r x ) ) , where x l . The access policy A P is then transformed into an LSSS scheme Π : ( M l m , ρ ) over the attributes of interest.
(2)
For each row of the matrix M, DO randomly selects a set of vectors v = ( s , r 1 , r 2 , , r m ) , where the secret values s Z p * , a n d r 1 , r 2 , , r m Z p * . Let λ x = M x v T where M x is the xth row of the matrix M. DO randomly select a set of vectors h = ( 0 , h 1 , h 2 , , h m ) Z p * , compute c x = M x h T . And randomly choosing u 1 , u 2 , , u l Z p * . Then the ciphertext is calculated as
C T K E Y = K E Y · e ( g , g ) y · s
C 1 , x = e ( g , g ) α ρ ( x ) · u x
C 2 , x = g u x
C 3 , x = g c x · g β ρ ( x ) · u x
C 4 , x = g c x · g y · λ x
C v = H ( e ( g , g ) y · s )
where C v is used to verify the correctness of the outsourced decryption result. DO uploads the verification hash C v to the blockchain, and then the blockchain returns the transaction identifier TxID. Finally, DO uploads the ciphertext C T = ( ( M , ρ ) , g r , C T K E Y , C 1 , x , C 2 , x , C 3 , x , C 4 , x , C v ) and TxID to the cloud CSP.

5.4. Decryption Phase

As shown in Figure 6, CSP is responsible for the outsourced data decryption, and DO verifies the outsourced decryption results and performs the final decryption.
OutDecryption ( CT , SK O , AP ) CT : This algorithm is classified into the following two phases.
(1)
To view the data of DO, DU initiates an access request to the blockchain and then downloads the C T from the CSP. DU calculates { σ ω : σ ω = e ( ( g ) r , H ( a t t r ω ) δ ) } ω [ S u i d ] , where S u i d is the number of attributes in the user attribute set, based on ( M , ρ ) and g r in the ciphertext and U A C K u i d . DU computes the line number X : { σ ω } ω [ S u i d ] { ρ ( x ) } x [ l ] , and sends the outsourced decryption key S K O = U A K ρ ( x ) , u i d to the CSP, where x X .
(2)
If the user satisfies the access policy, then M x must be a full rank matrix. CSP finds a set t x Z p * in polynomial time such that x X t x M x = ( 1 , 0 , , 0 ) , where M x corresponds to the set of attributes satisfying the policy S x , and t x helps to recover the secret value s. The CSP then performs outsourced decryption based on the received user attribute key.
C T = x ( C 1 , x · e ( H ( u i d ) , C 3 , x ) e ( S K O , C 2 , x ) · e ( u p k , C 4 , x ) ) t x = e ( g , g ) u s k · y · s
Then, the CSP returns the outsourced decryption result C T to DU.
FullDecryption ( CT , usk ) M data : To verify the correctness of the outsourced decryption result, DU performs an exponential operation with its private key to get C v = e ( g , g ) y · s and then calculates H ( C v ) . Compared with the C v in the ciphertext, if H ( C v ) = C v , the outsourced decryption result is correct. DU continues to compute the symmetric key K E Y = C T K E Y / C v and then performs AES decryption on the data: A E S D e c r y p t ( K E Y , C T A E S ) M d a t a .

6. Scheme Analysis

6.1. Correctness Analysis

6.1.1. The Correctness of CSP Outsourcing Decryption

After the CSP receives the outsourced decryption key from DU, it calculates
C T = x ( C 1 , x · e ( H ( u i d ) , C 3 , x ) e ( S K O , C 2 , x ) · e ( u p k , C 4 , x ) ) t x = x ( e ( g , g ) α ρ ( x ) · u x · e ( H ( u i d ) , g c x · g β ρ ( x ) · u x ) e ( U A K ρ ( x ) , u i d , g u x ) · e ( g u s k , g c x · g y · λ x ) ) t x = x ( e ( g , g ) α ρ ( x ) · u x · e ( H ( u i d ) , g c x ) · e ( H ( u i d ) , g β ρ ( x ) · u x ) · e ( g u s k , g c x ) · e ( g u s k , g y · λ x ) e ( g α ρ ( x ) , g u x ) · e ( H ( u i d ) β ρ ( x ) , g u x ) ) t x = x ( e ( g , g ) u s k · y · λ x · e ( H ( u i d ) , g ) c x · e ( g , g ) u s k · c x ) t x
Since λ x = M x v T , c x = M x h T , v T = ( s , r 1 , r 2 , , r m ) T , h T = ( 0 , h 1 , h 2 , , h m ) T
λ x · t x = M x t x · v T = ( 1 , 0 , , 0 ) · ( s , r 1 , r 2 , , r m ) T = s ; c x · t x = M x t x · h T = ( 1 , 0 , , 0 ) · ( 0 , h 1 , h 2 , , h m ) T = 0
Therefore, the outsourced decryption ciphertext C T = e ( g , g ) u s k · y · s , and the CSP outsourcing decryption algorithm satisfies the correctness.

6.1.2. The Correctness of DU Decryption

After receiving the outsourced decryption cipher, DU calculates
K E Y = C T K E Y [ C T ] 1 / u s k = K E Y · e ( g , g ) y · s [ e ( g , g ) u s k · y · s ] 1 / u s k = K E Y · e ( g , g ) y · s e ( g , g ) y · s
Therefore, DU can obtain the symmetric key, and the DU decryption algorithm satisfies the correctness.

6.2. Security Analysis

6.2.1. Policy Hidden Security

The patient uploads the encrypted data to the cloud server and replaces the attribute a t t r j in the access policy matrix with an implicit bilinear mapping expression σ j = e ( ( g δ ) r , H ( a t t r j ) ) , which is embedded in the ciphertext using a one-way hash function. Only an authorized user with the key H ( ω ) δ can compute e ( g r , H ( ω ) δ ) . Since δ is a random value, the cloud server and other users cannot guess the attribute ω from the value e ( g r , H ( ω ) β ) . Without knowing the corresponding H ( ω ) δ , no one can compute e ( ( g δ ) r , H ( ω ) ) = e ( g r , H ( ω ) δ ) and hence cannot construct the attribute in the access policy.

6.2.2. System Robustness

We use the Shamir secret sharing scheme ( t , n ) to manage user attributes and distribute user attribute keys, so there is no single point of failure in the system. However, the adversary may bring the system down by attacking multiple AAs. If there are fewer than t AAs in the system, the system will go down. The system’s robustness is affected by the threshold t and the total number n. A threshold t that is too large introduces additional overhead. Considering the system’s security, we can set a suitable threshold value to make the system resist the attack with a high probability.

6.2.3. Security against Collusion Attack

Multiple malicious users conspire with each other to share their own attribute keys e ( H ( u i d ) , g ) c x in an attempt to decrypt other secrets. Suppose two users with identities u i d and u i d , respectively, try to conspire to merge their secrets e ( H ( u i d ) , g ) c x and e ( H ( u i d ) , g ) c x . They cannot cancel each other and thus cannot continue to recover out e ( g , g ) u s k · y · s .

6.2.4. Adaptive Selection of Ciphertext Indistinguishable Security under Chosen Plaintext Attack (INDS-CPA)

Let G 1 and G 2 be two multiplicative cyclic groups of order p and satisfy the bilinear mapping e : G 1 × G 1 G 2 , g is the G 1 generating elements, and randomly selected a , b , s , z Z p * . No probabilistic polynomial-time algorithm can distinguish the tuples [ g , g a , g b , g s , e ( g , g ) a b s ] and the tuples [ g , g a , g b , g s , e ( g , g ) z ] by a non-negligible advantage, called the DBDH assumption. If the DBDH problem is intractable, then the VO-PH-MAABE scheme satisfies the indistinguishable security under the chosen ciphertext attack. It includes adversary A and challenger B , as follows.
Initialization : Adversary A submits a challenge access policy ( M * , ρ * ) to Challenger B .
Setup : Challenger B chooses a sufficiently safe parameter λ to run the S e t u p ( 1 λ ) algorithm to generate the public parameter G P . Challenger B sends G P to adversary A .
Query Phase 1 : The adversary adaptively queries the following Oracle.
O A A s : Adversary A specifies a set of corrupted permissions, and for each attribute ω belonging to the uncorrupted permissions, B runs A A S e t u p ( G P , ω ) to generate the public attribute key ( e ( g , g ) α ω , g β ω ) and returns it to A .
O U A K : Adversary A submits an identity and its corresponding attribute set ( u i d , S * ) to B . When the attribute set is insufficient for the challenge access strategy, adversary B runs U A K G e n ( u i d , ( M * , ρ * ) , S * , G P ) to generate the attribute key U A K ω , u i d , and returns it to A .
Challenge : A submits two equal-length symmetric keys K E Y 0 or K E Y 1 to B . B rolls a coin to determine the value of γ { 0 , 1 } and executes E n c r y p t ( K E Y γ , M d a t a , ( M * , ρ * ) , G P , e ( g , g ) α ω , g β ω ) . B computes C T K E Y = K E Y · e ( g , g ) a b s , and for each row M * in the matrix M x * , B randomly chooses v = ( s , r 1 , r 2 , , r m ) Z p * , h = ( 0 , h 1 , h 2 , , h m ) Z p * , where r 1 , r 2 , , r m , h 1 , h 2 , , h m are chosen randomly from Z p * , and computes λ x = M x v T and c x = M x h T . In addition, B randomly chooses z , u 1 , u 2 , , u l Z p * and computes C 0 = e ( g , g ) z , C 1 , x = e ( g , g ) α ρ ( x ) · u x , C 2 , x = g u x , C 3 , x = g c x · g β ρ ( x ) · u x , C 4 , x = g c x · g y · λ x . The challenge message C T * = ( ( M * , ρ * ) , g r , C T K E Y , C 1 , x , C 2 , x , C 3 , x , C 4 , x ) and sends it to A .
Query Phase 2 : Adversary A continues the adaptive query according to Q u e r y P h a s e 1 .
Guess : Adversary A makes a guess γ { 0 , 1 } for γ . If γ = γ , then challenger B returns 1, and Z = e ( g , g ) a b s ; if γ γ , then B returns 0, and Z = e ( g , g ) z . If Z = e ( g , g ) a b s , then P r [ γ = γ ] = 1 / 2 + ε ; if Z = e ( g , g ) z , then P r [ γ = γ ] = 1 / 2 . Thus, the probability that B solves the problem is P r B , D B D H = 1 / 2 P r [ γ = γ | Z = e ( g , g ) a b s ] 1 / 2 P r [ γ = γ | Z = e ( g , g ) z ] = ε / 2 .
In polynomial time, the advantage of challenger B in breaking the DBDH puzzle is negligible, and similarly, the advantage of A in winning the game ϵ is also negligible. Thus, this scheme (VO-PH-MAABE) is INDS-CPA safe.

6.3. Performance Analysis

This section compares and analyzes the existing scheme with this paper’s scheme in terms of pass-through feature, communication overhead, and computation overhead. The experiments of this scheme are conducted on Windows 11 with Intel(R) Core(TM) i5-10505CPU @ 3.20 GHz and 16GB RAM. We use Java18 developed by Oracle Corporation of America and a 256-bit elliptic curve-based JPBC cryptography library to simulate this scheme.

6.3.1. Feature Comparison

As shown in Table 1, we compare our scheme with schemes [6,7,21,24] and [26] in terms of how attribute authority works, underlying blockchain architecture, policy hiding, outsourcing decryption, outsourcing verification, and smart contracts. In terms of attribute authority, schemes [21,26] have assumed trusted CAs and suffer from concentration of power. Although there is no centralization problem in scheme [7], each AA in the scheme manages the attributes in the domain independently of each other, so the failure of any AA affects the attribute management. The attribute Universe in other schemes is managed by a group of AAs through joint negotiation, which can effectively avoid a single point of failure and enhance system security. Scheme [24] and our scheme combine blockchain systems. In terms of protecting sensitive attributes, only scheme [6], scheme [7], and our scheme implement policy hiding to protect users’ privacy. In terms of outsourcing, schemes [21,24,26] and our scheme implement outsourced decryption, outsourcing the complex decryption operations to cloud servers to reduce the computational overhead at the user side. However, schemes [24,26] are unable to verify the correctness of the results after outsourcing decryption. Besides, only this scheme achieves distributed management of attributes and cross-domain computation of keys by using smart contracts.

6.3.2. Communication Overhead

Let | G 1 | and | G 2 | be the size of the elements in the multiplicative cyclic groups G 1 , G 2 , | Z p * | denote the size of the elements in the domain Z p * , N a t t r denotes the number of attributes contained in the parameters, N u denotes the number of user attributes, U denotes the number of attributes in the attribute space, L v denotes the size of the authentication parameters, and N and n denote the number of representative users and AAs, respectively. As shown in Table 2, we compare our scheme with existing schemes in terms of public parameters G P , size of DU complete attribute key S K , size of ciphertext C T , and size of outsourced decryption ciphertext C T . During the system initialization phase, our scheme generates a public parameter G P with a size of 3 | G 1 | + | G 2 | , which is constant compared to the scheme [21] and scheme [6]. In our scheme, the complete attribute private key of DU is S K = { S K C , S K O , u s k } , so the length of S K is 2 | G 1 | + | Z p * | , which is constant compared to schemes [6,21,24,26]. The size of the ciphertext C T in our scheme is ( 3 N a t t r + 1 ) | G 1 | + ( N a t t r + 1 ) | G 2 | , and our scheme hides the access policy, so it has a slightly higher communication burden relative to the other parties. Since the encryption algorithm is only a one-time operation, our scheme does not affect the user experience. Moreover, the size of the outsourced decryption ciphertext in our scheme is | G 2 | , and the size of the outsourced decryption ciphertext sent to DU is shorter compared to scheme [21].

6.3.3. Computation Overhead

As shown in Figure 7, we compare our scheme with schemes [6,7] and scheme [24] in terms of the computational overhead of decryption on the user side. The horizontal axis is the number of attributes for which the DU satisfies the access policy, and the vertical axis is the time consumed for decryption. Assume that before decryption, the DU has calculated the attributes needed for decryption by the attribute confused key and g r . For the same g r , the overhead in the subsequent decryption process is negligible since the process only needs to be calculated once permanently. During the decryption process, the DU only needs to perform a power operation to recover the symmetric key because the cloud server performs the outsourced decryption process. With the number of attributes increasing, compared with scheme [6,7] in which the decryption time increases linearly with the increase of attribute number, our scheme revolves around 0.043 s. So, our scheme has higher decryption efficiency compared with schemes [6,7].

6.3.4. Blockchain Simulation Experiments

To verify the effectiveness of smart contracts, we test the performance of smart contracts using the private chain simulation of Ethereum.
In this experiment, we set the number of authorities to five. As shown in Figure 8, the horizontal axis is the attributes managed by AAs and the vertical axis is the response latency of the smart contract. The AMC does not have any computation and only involves the assignment of attributes, so it does not grow linearly with the number of attributes but always remains around 0.45 s. The other three contracts run a Lagrangian interpolation algorithm each time the key is reconstructed, so the response latency of the PAKGC, the UAKGC, and the UACTGC grows slowly with the number of attributes. The other three contracts run a Lagrangian interpolation algorithm each time the key is reconstructed, so the response latency of the PAKGC, the UAKGC, and the UACTGC grows slowly with the number of attributes. At the number of attributes of 50, the response latencies of PAKGC, UAKGC, and UACTGC are 1.818 s, 1.702 s, and 1.659 s, respectively. Since it does not affect the user experience, it is acceptable.

7. Conclusions

In this paper, we proposed a blockchain-based multiple authority attribute-based encryption EHR access control scheme to solve the access control and security problem of data in the IOMT environment. Using blockchain smart contracts, we have achieved cross-domain distributed management of attributes and cross-domain computation of different authorities, which reduces the cost of cross-domain computation and eliminates the single-point bottleneck problem of traditional CP-ABE schemes. In the encryption phase, DO hid the access policy to ensure that the privacy of data users is not leaked to third parties. In the decryption phase, the computational cost on the user side is reduced by outsourcing the decryption algorithm. Under the random oracle model, the ciphertext indistinguishability security under the adaptive selection of plaintext attacks has been proven. In addition, the scheme algorithm’s efficiency has been analyzed using the JPBC cryptography library, and the feasibility of smart contracts has been demonstrated using blockchain simulation experiments.

Author Contributions

All authors contributed to this work. Writing—review and editing, X.Y.; writing—original draft preparation, C.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by Ministry of Science and Technology of China, National Key R&D Program “Cyberspace Security” Key Project, 2017YFB0802305 and the Natural Science Foundation of Hebei Province, F2021201052.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Xue, Y.; Xue, K.; Gai, N.; Hong, J.; Wei, D.S.; Hong, P. An attribute-based controlled collaborative access control scheme for public cloud storage. IEEE Trans. Inf. Forensics Secur. 2019, 14, 2927–2942. [Google Scholar] [CrossRef]
  2. Hao, J.; Huang, C.; Ni, J.; Rong, H.; Xian, M.; Shen, X.S. Fine-grained data access control with attribute-hiding policy for cloud-based IoT. Comput. Netw. 2019, 153, 1–10. [Google Scholar] [CrossRef]
  3. Li, J.; Chen, N.; Zhang, Y. Extended file hierarchy access control scheme with attribute-based encryption in cloud computing. IEEE Trans. Emerg. Top. Comput. 2019, 9, 983–993. [Google Scholar] [CrossRef]
  4. Zhang, Y.; Deng, R.H.; Xu, S.; Sun, J.; Li, Q.; Zheng, D. Attribute-based encryption for cloud computing access control: A survey. ACM Comput. Surv. (CSUR) 2020, 53, 1–41. [Google Scholar] [CrossRef]
  5. Lewko, A.; Waters, B. Decentralizing attribute-based encryption. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques; Springer: Berlin/Heidelberg, Germany, 2011; pp. 568–588. [Google Scholar]
  6. Li, W.; Xue, K.; Xue, Y.; Hong, J. TMACS: A robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Trans. Parallel Distrib. Syst. 2015, 27, 1484–1496. [Google Scholar] [CrossRef]
  7. Zhong, H.; Zhu, W.; Xu, Y.; Cui, J. Multi-authority attribute-based encryption access control scheme with policy hidden for cloud storage. Soft Comput. 2018, 22, 243–251. [Google Scholar] [CrossRef]
  8. Li, J.; Chen, X.; Chow, S.S.; Huang, Q.; Wong, D.S.; Liu, Z. Multi-authority fine-grained access control with accountability and its application in cloud. J. Netw. Comput. Appl. 2018, 112, 89–96. [Google Scholar] [CrossRef]
  9. Zhang, L.; Ren, J.; Mu, Y.; Wang, B. Privacy-preserving multi-authority attribute-based data sharing framework for smart grid. IEEE Access 2020, 8, 23294–23307. [Google Scholar] [CrossRef]
  10. Li, J.; Zhang, Y.; Ning, J.; Huang, X.; Poh, G.S.; Wang, D. Attribute based encryption with privacy protection and accountability for CloudIoT. IEEE Trans. Cloud Comput. 2020, 10, 762–773. [Google Scholar] [CrossRef]
  11. Gao, J.; Wang, C. TSM: An Efficient Time-Sensitive Data Sharing Scheme in Cloud Storage. In Proceedings of the International Conference on Multi-Modal Information Analytics; Springer: Berlin/Heidelberg, Germany, 2022; pp. 414–421. [Google Scholar]
  12. Zhang, Y.; Chen, X.; Li, J.; Wong, D.S.; Li, H. Anonymous attribute-based encryption supporting efficient decryption test. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, Berlin, Germany, 4–8 November 2013; pp. 511–516. [Google Scholar]
  13. Huang, D.; Zhou, Z. Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption. U.S. Patent Application 14/216,202, 18 August 2016. [Google Scholar]
  14. Xiong, H.; Zhao, Y.; Peng, L.; Zhang, H.; Yeh, K.H. Partially policy-hidden attribute-based broadcast encryption with secure delegation in edge computing. Future Gener. Comput. Syst. 2019, 97, 453–461. [Google Scholar] [CrossRef]
  15. Zhang, L.; Hu, G.; Mu, Y.; Rezaeibagha, F. Hidden ciphertext policy attribute-based encryption with fast decryption for personal health record system. IEEE Access 2019, 7, 33202–33213. [Google Scholar] [CrossRef]
  16. Liu, Y.; Du, R. Efficient partially policy-hidden with multi-authority for access control scheme in Internet of Things. In Proceedings of the 2020 International Conference on Networking and Network Applications (NaNA), Haikou, China, 10–13 December 2020; pp. 375–380. [Google Scholar]
  17. Zeng, P.; Zhang, Z.; Lu, R.; Choo, K.K.R. Efficient policy-hiding and large universe attribute-based encryption with public traceability for internet of medical things. IEEE Internet Things J. 2021, 8, 10963–10972. [Google Scholar] [CrossRef]
  18. Zhang, W.; Zhang, Z.; Xiong, H.; Qin, Z. PHAS-HEKR-CP-ABE: Partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system. J. Ambient Intell. Humaniz. Comput. 2022, 13, 613–627. [Google Scholar] [CrossRef]
  19. Green, M.; Hohenberger, S.; Waters, B. Outsourcing the Decryption of {ABE} Ciphertexts. In Proceedings of the 20th USENIX Security Symposium (USENIX Security 11), San Francisco, CA, USA, 8–12 August 2011. [Google Scholar]
  20. Lai, J.; Deng, R.H.; Guan, C.; Weng, J. Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 2013, 8, 1343–1354. [Google Scholar]
  21. Qin, B.; Deng, R.H.; Liu, S.; Ma, S. Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1384–1393. [Google Scholar]
  22. Fan, K.; Xu, H.; Gao, L.; Li, H.; Yang, Y. Efficient and privacy preserving access control scheme for fog-enabled IoT. Future Gener. Comput. Syst. 2019, 99, 134–142. [Google Scholar] [CrossRef]
  23. Guo, R.; Zhuang, C.; Shi, H.; Zhang, Y.; Zheng, D. A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing. Int. J. Distrib. Sens. Netw. 2020, 16, 1550147720906796. [Google Scholar] [CrossRef]
  24. Liu, S.; Yu, J.; Xiao, Y.; Wan, Z.; Wang, S.; Yan, B. BC-SABE: Blockchain-aided searchable attribute-based encryption for cloud-IoT. IEEE Internet Things J. 2020, 7, 7851–7867. [Google Scholar] [CrossRef]
  25. Zhao, J.; Zeng, P.; Choo, K.K.R. An efficient access control scheme with outsourcing and attribute revocation for fog-enabled E-health. IEEE Access 2021, 9, 13789–13799. [Google Scholar] [CrossRef]
  26. Guo, R.; Yang, G.; Shi, H.; Zhang, Y.; Zheng, D. O 3-R-CP-ABE: An Efficient and Revocable Attribute-Based Encryption Scheme in the Cloud-Assisted IoMT System. IEEE Internet Things J. 2021, 8, 8949–8963. [Google Scholar] [CrossRef]
  27. Beimel, A. Secure Schemes for Secret Sharing and Key Distribution; Technion-Israel Institute of Technology: Haifa, Israel, 1996. [Google Scholar]
  28. Hoffstein, J.; Pipher, J.; Silverman, J.H. International Algorithmic Number Theory Symposium; Springer: Berlin, Germany, 1998; pp. 48–63. [Google Scholar]
  29. Pang, L.J.; Wang, Y.M. A new (t, n) multi-secret sharing scheme based on Shamir’s secret sharing. Appl. Math. Comput. 2005, 167, 840–848. [Google Scholar] [CrossRef]
  30. Szabo, N. Smart contracts: Building blocks for digital markets. EXTROPY J. Transhumanist Thought 1996, 18, 28. [Google Scholar]
Figure 1. The VO-PH-MAABE system model.
Figure 1. The VO-PH-MAABE system model.
Applsci 12 10812 g001
Figure 2. The overall flow of VO-PH-MAABE.
Figure 2. The overall flow of VO-PH-MAABE.
Applsci 12 10812 g002
Figure 3. System initialization phase.
Figure 3. System initialization phase.
Applsci 12 10812 g003
Figure 4. Decryption key generation phase.
Figure 4. Decryption key generation phase.
Applsci 12 10812 g004
Figure 5. Encryption phase.
Figure 5. Encryption phase.
Applsci 12 10812 g005
Figure 6. Decryption phase.
Figure 6. Decryption phase.
Applsci 12 10812 g006
Figure 7. The comparison of our scheme with the TMACS scheme [6], dec-ABE scheme [7], and BC-SABE scheme [24] in terms of user decryption time.The comparison of user decryption time.
Figure 7. The comparison of our scheme with the TMACS scheme [6], dec-ABE scheme [7], and BC-SABE scheme [24] in terms of user decryption time.The comparison of user decryption time.
Applsci 12 10812 g007
Figure 8. Response latency of the four contracts in our scheme.
Figure 8. Response latency of the four contracts in our scheme.
Applsci 12 10812 g008
Table 1. Feature Comparison.
Table 1. Feature Comparison.
SchemeAttribute AuthorityBlockchainPolicy HidingOutsourcing DecryptionOutsourcing VerificationSmart Contracts
Qin [21]Single×××
TMACS [6]Multi-Common××××
dec-ABE [7]Multi-Common×××
BC-SABE [24]Multi-Exclusive××××
O3-R-CP-ABE [26]Single××××
Our schemeMulti-Common
Table 2. Communication overhead.
Table 2. Communication overhead.
Scheme GP SK CT CT
Qin [21] ( 2 + U ) | G 1 | + | G 2 | 2 | G 1 | + N u | G 2 | ( 2 N a t t r + 1 ) | G 1 | + | G 2 | + L v 2 | G 2 |
TMACS [6] ( 2 U + 2 N + n + 10 ) | Z p * | ( 2 N u + 5 ) | Z p * | ( 2 N a t t r + 1 ) | G 1 | + | G 2 |
dec-ABE [7] 2 | G 1 | + | G 2 | ( N u + 3 ) | G 1 | ( 2 N a t t r + 2 ) | G 1 | + ( N a t t r + 1 ) | G 2 | | G 2 |
BC-SABE [24] 12 | G 1 | + | G 2 | + | Z p * | | Z p * | ( 3 N a t t r + 2 ) | G 1 | + | G 2 |
O3-R-CP-ABE [26] 3 | G 1 | + | G 2 | ( N u + 2 ) | G 1 | + | G 2 | 2 N a t t r | G 1 | + | G 2 | | G 2 |
Our scheme 3 | G 1 | + | G 2 | 2 | G 1 | + | Z p * | ( 3 N a t t r + 1 ) | G 1 | + ( N a t t r + 1 ) | G 2 | | G 2 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Yang, X.; Zhang, C. Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme. Appl. Sci. 2022, 12, 10812. https://doi.org/10.3390/app122110812

AMA Style

Yang X, Zhang C. Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme. Applied Sciences. 2022; 12(21):10812. https://doi.org/10.3390/app122110812

Chicago/Turabian Style

Yang, Xiaohui, and Chenshuo Zhang. 2022. "Blockchain-Based Multiple Authorities Attribute-Based Encryption for EHR Access Control Scheme" Applied Sciences 12, no. 21: 10812. https://doi.org/10.3390/app122110812

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop