
Blockchain Data Controlled Sharing Scheme Based on Proxy Re-Encryption
GUO Qing, TIAN You-liang, WAN Liang
ACTA ELECTRONICA SINICA ›› 2023, Vol. 51 ›› Issue (2) : 477-488.
Blockchain Data Controlled Sharing Scheme Based on Proxy Re-Encryption
The blockchain stores transaction data in the form of a distributed shared global ledger and it is difficult to achieve a balance between privacy protection and availability in data sharing. The existing blockchain data sharing schemes have low availability while protecting privacy and effectively realizing the dynamic adjustment of blockchain data access permissions is a challenging problem. To this end, this paper proposes a blockchain data controlled sharing scheme based on proxy re-encryption. Firstly, based on SM2, the proxy re-encryption algorithm is constructed to design a blockchain data controlled sharing scheme, using proxy re-encryption to protect the privacy of transaction data to achieve data secure sharing. Secondly, a dynamic adjustment mechanism of user permissions is proposed that the blockchain nodes division of labor agent and the re-encryption key parameters are dividedly managed to realize the assured update of user access rights, so that the visibility of the blockchain data can be dynamically adjusted. Finally, the security and performance analysis show that the scheme can realize the dynamic sharing of blockchain data while protecting transaction privacy, and has advantages in computing overhead, better suitable for the controlled sharing of blockchain data.
blockchain / proxy re-encryption / privacy protection / SM2 / controlled sharing {{custom_keyword}} /
表1 交易数据隐私保护需求表 |
数据拥有者 | 交易数据类型 | 数据使用者 | |||
---|---|---|---|---|---|
参与方A | 参与方B | 参与方C | 参与方D | ||
参与方A | 基础数据 | 可见 | 可见 | 不可见 | 可见 |
敏感数据 | 可见 | 可见 | 不可见 | 不可见 | |
参与方B | 基础数据 | 可见 | 可见 | 可见 | 不可见 |
敏感数据 | 不可见 | 可见 | 可见 | 不可见 |
表4 SM2公钥密码算法椭圆曲线参数 |
曲线参数 | 取值 |
---|---|
| FFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF00000000FFFFFFFFFFFFFFFF |
| FFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF00000000FFFFFFFFFFFFFFFC |
| 28E9FA9E9D9F5E344D5A9E4BCF6509A7F39789F515AB8F92DDBCBD414D940E93 |
| FFFFFFFEFFFFFFFFFFFFFFFFFFFFFFFF7203DF6B21C6052B53BBF40939D54123 |
| 32C4AE2C1F1981195F9904466A39C9948FE30BBFF2660BE1715A4589334C74C7 |
| BC3736A2F4F6779C59BDCEE36B692153D0A9877CC62A474002DF32E52139F0A0 |
1 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
2 |
祝烈煌, 高峰, 沈蒙, 等. 区块链隐私保护研究综述[J]. 计算机研究与发展, 2017, 54(10): 2170-2186.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
3 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
4 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
5 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
6 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
7 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
8 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
9 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
10 |
董祥千, 郭兵, 沈艳, 等. 一种高效安全的去中心化数据共享模型[J]. 计算机学报, 2018, 41(5): 1021-1036.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
11 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
12 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
13 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
14 |
田有亮, 杨科迪, 王缵, 等. 基于属性加密的区块链数据溯源算法[J]. 通信学报, 2019, 40(11): 101-111.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
15 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
16 |
王秀利, 江晓舟, 李洋. 应用区块链的数据访问控制与共享模型[J]. 软件学报, 2019, 30(6): 1661-1669.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
17 |
苏铓, 吴槟, 付安民, 等. 基于代理重加密的云数据访问授权确定性更新方案[J]. 软件学报, 2020, 31(5): 1563-1572.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
18 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
19 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
20 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
21 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
22 |
马晓婷, 马文平, 刘小雪. 基于区块链技术的跨域认证方案[J]. 电子学报, 2018, 46(11): 2571-2579.
{{custom_citation.content}}
{{custom_citation.annotation}}
|
23 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
24 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
25 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
26 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
27 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
28 |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
{{custom_ref.label}} |
{{custom_citation.content}}
{{custom_citation.annotation}}
|
/
〈 |
|
〉 |