1.School of Computer and Information Technology, Shanxi University, Taiyuan 030006, China
2.Shanxi Yinfumeixun Technology Co. , Ltd. , Changzhi 047500, China
Show less
文章历史+
Received
Accepted
Published
2023-10-13
2024-01-30
Issue Date
2025-10-30
PDF (1914K)
摘要
随着物联网和云计算技术的快速发展,智慧医疗的医疗质量已经得到显著提高,但是医疗系统仍然存在数据安全和用户隐私泄露问题。基于密文策略的属性加密(Ciphertext-Policy Attribute Based Encryption, CP-ABE)被认为是目前最有效的解决方案之一。然而在大多数的CP-ABE方案中攻击者可以从访问策略中获取用户隐私信息,而且由于解密密钥仅与属性相关联,与用户身份无关,所以当密钥泄露时无法准确确认用户的身份。针对上述问题,本文提出了一种策略完全隐藏的可追踪可撤销的CP-ABE方案,使用隐匿集合求交(Private Set Intersection, PSI)技术隐藏策略中的属性值和属性名称,采用与用户相关联的二叉树来追踪和撤销用户。为了提高该方案在加解密阶段的速度,引入离线/在线加密和外包解密技术。最后基于q-BDHE(q-Bilinear Diffie-Hellman Exponent)假设,证明了该方案的安全性,实验结果表明该方案加密和解密算法花费时间呈常量级,相比其他方案,效率有显著提升。
Abstract
With the rapid development of the Internet of Things and cloud computing technologies, the quality of healthcare in smart health has been significantly improved, but the healthcare system still has the problems of data security and user privacy leakage. Ciphertext-Policy Attribute Based Encryption (CP-ABE) is considered to be one of the most effective solutions at present. However, in most CP-ABE schemes attackers can obtain user privacy information from access policies. Since the decryption key is only associated with attributes and not with the user's identity, it is impossible to accurately confirm the user's identity when the key is leaked. To resolve the above problems, this paper proposes a traceable and revocable CP-ABE scheme with policies fully hidden by using Private Set Intersection (PSI) technology to hide the attribute values and attribute names in the policy. Furthermore, this paper adopts binary tree associated with information to track and revoke users. In order to enhance the speed of the scheme in the encryption and decryption phases, this paper introduces the skill of offline/online encryption and outsourced decryption techniques. Finally, based on the q-BDHE assumption, the security of the scheme is proved. The experiment results show that the encryption and decryption algorithms of this scheme take a constant amount of time, which is a significant improvement in efficiency compared to other schemes.
在密码学领域中,基于属性的加密[3](Attribute-Based Encryption, ABE)被视为实现细粒度访问控制的重要工具。这种加密方法主要分为密文策略的属性基加密[4]和密钥策略的属性基加密[5]两大类。在属性加密方案中由于访问策略与密文一起存储在云服务器中,因此任何能检索到密文的人都可以使用相关访问策略,但是访问策略中可能包含敏感信息。例如访问策略“Neurology AND (Doctor OR Nurses)”通过医疗记录可以看出患者有神经系统疾病。对于部分策略隐藏,例如访问策略“(PN:* OR Doctor:*)AND (Hospital:*)”,攻击者仍然可以看出数据和健康相关。因此具有策略完全隐藏的CP-ABE方案具有重要的研究意义。
由于解密密钥与属性紧密相关,所以发生密钥泄露事件时无法确认泄露源。例如,Alice和Bob他们共同拥有属性“Neuropathy AND Nurses”,二者均可以访问“Neurology AND (Doctor OR Nurses)”密钥加密的病历,如果解密密钥泄露,无法确切地判断是Alice还是Bob成了泄露源。为解决解密密钥泄漏和追踪恶意用户的问题,ABE系统对基于可追踪性的撤销机制提出了很高的要求。
WANGC G, BIZ M, XUL D. IoT and Cloud Computing in Automation of Assembly Modeling Systems[J]. IEEE Trans Ind Inform, 2014, 10(2): 1426-1434. DOI: 10.1109/TII.2014.2300346 .
[2]
XUB Y, XUL D, CAIH M, et al. The Design of an M-health Monitoring System Based on a Cloud Computing Platform[J]. Enterp Inf Syst, 2017, 11(1): 17-36. DOI: 10.1080/17517575.2015.1053416 .
[3]
SAHAIA, WATERSB. Fuzzy Identity-based Encryption[C]//Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques. New York: ACM, 2005: 457-473. DOI: 10.1007/11426639_27 .
[4]
BETHENCOURTJ, SAHAIA, WATERSB. Ciphertext-policy Attribute-based Encryption[C]//2007 IEEE Symposium on Security and Privacy (SP '07). New York: IEEE, 2007: 321-334. DOI: 10.1109/SP.2007.11 .
[5]
GOYALV, PANDEYO, SAHAIA, et al. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]//Proceedings of the 13th ACM conference on Computer and communications security. New York: ACM, 2006: 89-98. DOI: 10.1145/1180405.1180418 .
[6]
NISHIDET, YONEYAMAK, OHTAK. Attribute-based Encryption with Partially Hidden Encryptor-specified Access Structures[C]//Proceedings of the 6th international conference on Applied cryptography and network security. New York: ACM, 2008: 111-129. DOI: 10.5555/1788857.1788864 .
[7]
ZHANGY H, CHENX F, LIJ, et al. Anonymous Attribute-based Encryption Supporting Efficient Decryption Test[C]//Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security. New York: ACM, 2013: 511-516. DOI: 10.1145/2484313.2484381 .
[8]
YANGK, HANQ, LIH, et al. An Efficient and Fine-grained Big Data Access Control Scheme with Privacy-preserving Policy[J]. IEEE Internet Things J, 2017, 4(2): 563-571. DOI: 10.1109/JIOT.2016.2571718 .
[9]
ZHANGZ Q, ZHANGJ B, YUANY L, et al. An Expressive Fully Policy-hidden Ciphertext Policy Attribute-based Encryption Scheme with Credible Verification Based on Blockchain[J]. IEEE Internet Things J, 2022, 9(11): 8681-8692. DOI: 10.1109/JIOT.2021.3117378 .
[10]
YANGL, LIC, CHENGY T, et al. Achieving Privacy-preserving Sensitive Attributes for Large Universe Based on Private Set Intersection[J]. Inf Sci, 2022, 582: 529-546. DOI: 10.1016/j.ins.2021.09.034 .
[11]
XUEJ, SHIL, ZHANGW, et al. Poly-ABE: A Traceable and Revocable Fully Hidden Policy CP-ABE Scheme for Integrated Demand Response in Multi-Energy Systems[J]. J Syst Architect, 2023, 143: 102982. DOI: 10.1016/j.sysarc.2023.102982 .
[12]
LUOC, SHIJ, XIEM, et al. A Lightweight Access Control Scheme Supporting Policy Hidden Based on Path Bloom Filter[C]//International Conference on Information Security and Cryptology. Singapore: Springer Nature Singapore, 2023: 433-451. DOI: 10.1007/978-981-97-0942-7_22 .
[13]
LIUZ, CAOZ F, WONGD S. White-box Traceable Ciphertext-policy Attribute-based Encryption Supporting any Monotone Access Structures[J]. IEEE Trans Inf Forensics Secur, 2013, 8(1): 76-88. DOI: 10.1109/TIFS.2012.2223683 .
NINGJ T, CAOZ F, DONGX L, et al. Large Universe Ciphertext-policy Attribute-based Encryption with White-box Traceability[C]//Computer Security-ESORICS 2014. New York: ACM,: 55-72. DOI: 10.1007/978-3-319-11212-1_4 .
[16]
NINGJ T, CAOZ F, DONGX L, et al. White-box Traceable CP-ABE for Cloud Storage Service: How to Catch People Leaking Their Access Credentials Effectively[J]. IEEE Trans Dependable Secure Comput, 2018, 15(5): 883-897. DOI: 10.1109/TDSC.2016.2608343 .
WANGS P, GUOK K, ZHANGY L. Traceable Ciphertext-policy Attribute-based Encryption Scheme with Attribute Level User Revocation for Cloud Storage[J]. PLoS One, 2018, 13(9): e0203225. DOI: 10.1371/journal.pone.0203225 .
[19]
LIANH J, WANGG B, WANGQ X. Fully Secure Traceable and Revocable-storage Attribute-based Encryption with Short Update Keys via Subset Difference Method[C]//2018 Third International Conference on Security of Smart Cities, Industrial Control System and Communications (SSIC). New York: IEEE, 2018: 1-8. DOI: 10.1109/SSIC.2018.8556734 .
[20]
HAND Z, PANN N, LIK C. A Traceable and Revocable Ciphertext-policy Attribute-based Encryption Scheme Based on Privacy Protection[J]. IEEE Trans Dependable Secure Comput, 2022, 19(1): 316-327. DOI: 10.1109/TDSC.2020.2977646 .
CUIH, WANZ G, WEIX L, et al. Pay as you Decrypt: Decryption Outsourcing for Functional Encryption Using Blockchain[J]. IEEE Trans Inf Forensics Secur, 2020, 15: 3227-3238. DOI: 10.1109/TIFS.2020.2973864 .
[23]
GREENM, HOHENBERGERS, WATERSB. Outsourcing the Decryption of ABE Ciphertexts[C]//Proceedings of the 20th USENIX conference on Security. New York: ACM, 2011: 34. DOI: 10.5555/2028067.2028101 .
[24]
LIJ, CHENX F, LIJ W, et al. Fine-grained Access Control System Based on Outsourced Attribute-based Encryption[C]//European Symposium on Research in Computer Security. Berlin, Heidelberg: Springer, 2013: 592-609.10.1007/978-3-642-40203-6_33
[25]
HOHENBERGERS, WATERSB. Online/Offline Attribute-based Encryption[C]//International Workshop on Public Key Cryptography. Berlin, Heidelberg: Springer, 2014: 293-310.10.1007/978-3-642-54631-0_17
[26]
DATTAP, DUTTAR, MUKHOPADHYAYS. Fully Secure Online/Offline Predicate and Attribute-based Encryption[C]//International Conference on Information Security Practice and Experience. Cham: Springer, 2015: 331-345.10.1007/978-3-319-17533-1_23
[27]
AKINYELEJ A, GARMANC, MIERSI, et al. Charm: a framework for rapidly prototyping cryptosystems[J]. J Cryptogr Eng, 2013, 3:111-128. DOI: 10.1007/s13389-013-0057-3 .