Paper
6 May 2022 A privacy-preserving attribute-based access control system based on blockchain
Xin Liu
Author Affiliations +
Proceedings Volume 12176, International Conference on Algorithms, Microchips and Network Applications; 121762B (2022) https://doi.org/10.1117/12.2636428
Event: International Conference on Algorithms, Microchips, and Network Applications 2022, 2022, Zhuhai, China
Abstract
With the wide application of blockchain, the access control of on-chain data and privacy protection are two urgent concerns to be solved. Although many access control systems based on attribute-based encryption (ABE) have emerged, they are not satisfactory for achieving the privacy protection of data owners’ attributes and the revocation of data consumers’ attribute sets. An anonymous ciphertext policy ABE with attribute revocation (AR-ACP-ABE) was unveiled by adopting the idea of attribute revocation based on broadcast encryption. Then, a new privacy-preserving attributebased access control system was constructed. It is an extension of the AR-ACP-ABE scheme by adopting the technique of blockchain and outsourced computation. The new system supports completely hidden access policies and allows data owners to revoke data consumers’ attribute sets. In addition, data consumers only need to perform one exponent operation on the target group during the access phase. Security analysis shows that the new system meets the properties of correctness, confidentiality, and integrity.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Xin Liu "A privacy-preserving attribute-based access control system based on blockchain", Proc. SPIE 12176, International Conference on Algorithms, Microchips and Network Applications, 121762B (6 May 2022); https://doi.org/10.1117/12.2636428
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Control systems

Control systems design

Computer security

Data storage

Computing systems

Back to Top