BA-ORABE: Blockchain-Based Auditable Registered Attribute-Based   Encryption With Reliable Outsourced Decryption
        - URL: http://arxiv.org/abs/2412.08957v2
 - Date: Mon, 16 Dec 2024 11:08:55 GMT
 - Title: BA-ORABE: Blockchain-Based Auditable Registered Attribute-Based   Encryption With Reliable Outsourced Decryption
 - Authors: Dongliang Cai, Borui Chen, Liang Zhang, Haibin Kan, 
 - Abstract summary: BA-ORABE is the first fully auditable registered ABE with reliable outsourced decryption scheme based on blockchain.<n>We utilize a verifiable tag mechanism to achieve verifiability of ciphertext transformation.<n>Our system achieves fairness and decentralized outsourcing to protect the interests of all parties.
 - Score: 12.205762282360482
 - License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
 - Abstract:   Attribute-based encryption (ABE) is a generalization of public-key encryption that enables fine-grained access control in cloud services. Recently, Hohenberger et al. (Eurocrypt 2023) introduced the notion of registered ABE, which is an ABE scheme without a trusted central authority. Instead, users generate their own public/secret keys and then register their keys and attributes with a key curator. The key curator is a transparent and untrusted entity and its behavior needs to be audited for malicious registration. In addition, pairing-based registered ABE still suffers the heavy decryption overhead like ABE. A general approach to address this issue is to outsource decryption to a decryption cloud service (DCS).In this work, we propose BA-ORABE, the first fully auditable registered ABE with reliable outsourced decryption scheme based on blockchain. First, we utilize a verifiable tag mechanism to achieve verifiability of ciphertext transformation, and the exemptibility which enables the honest DCS to escape from wrong claims is guaranteed by zero knowledge fraud proof under optimistic assumption. Additionally, our system achieves fairness and decentralized outsourcing to protect the interests of all parties and the registration and outsourcing process are transparent and fully auditable through blockchain. Finally, we give security analysis, implement and evaluate our scheme on Ethereum to demonstrate its feasibility and efficiency, and show its advantages in real application of decentralized finance. 
 
       
      
        Related papers
        - Decentralized Vulnerability Disclosure via Permissioned Blockchain: A   Secure, Transparent Alternative to Centralized CVE Management [0.0]
This paper proposes a decentralized, blockchain-based system for the publication of Common Vulnerabilities and Exposures ( CVEs)
The proposed architecture leverages a permissioned blockchain, wherein only authenticated CVE Numbering Authorities (CNAs) are authorized to submit entries.
We evaluate the proposed model in comparison with existing practices, highlighting its advantages in transparency, trust decentralization, and auditability.
arXiv  Detail & Related papers  (2025-05-01T12:12:08Z) - Data sharing in the metaverse with key abuse resistance based on   decentralized CP-ABE [17.462884309974097]
Ciphertext-policy-based encryption (CP-ABE) is a promising primitive to provide confidentiality and fine-grained access control.
Few studies have considered CP-ABE key confidentiality and authority accountability simultaneously.
We introduce an open incentive mechanism to encourage honest participation in data sharing.
arXiv  Detail & Related papers  (2024-12-18T12:06:56Z) - Balancing Confidentiality and Transparency for Blockchain-based   Process-Aware Information Systems [46.404531555921906]
We propose an architecture for blockchain-based PAISs aimed at preserving both confidentiality and transparency.<n>Smart contracts enact, enforce and store public interactions, while attribute-based encryption techniques are adopted to specify access grants to confidential information.
arXiv  Detail & Related papers  (2024-12-07T20:18:36Z) - Attribute-Based Encryption With Payable Outsourced Decryption Using   Blockchain and Responsive Zero Knowledge Proof [14.158211902973438]
We propose a blockchain-based payable outsourced decryption ABE scheme.
It achieves both verifiability and exemptibility without adding redundant information to ABE ciphertext.
arXiv  Detail & Related papers  (2024-11-06T11:26:09Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv  Detail & Related papers  (2024-07-16T20:53:04Z) - Towards Credential-based Device Registration in DApps for DePINs with   ZKPs [46.08150780379237]
We propose a credential-based device registration (CDR) mechanism that verifies device credentials on the blockchain.
We present a general system model, and technically evaluate CDR using zkSNARKs with Groth16 and Marlin.
arXiv  Detail & Related papers  (2024-06-27T09:50:10Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive   Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
 Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv  Detail & Related papers  (2024-03-28T07:08:26Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
  and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv  Detail & Related papers  (2024-01-28T10:46:17Z) - Blockchain-enabled Data Governance for Privacy-Preserved Sharing of   Confidential Data [1.6006586061577806]
We propose a blockchain-based data governance system that employs attribute-based encryption to prevent privacy leakage and credential misuse.
First, our ABE encryption system can handle multi-authority use cases while protecting identity privacy and hiding access policy.
Second, applying the Advanced Encryption Standard (AES) for data encryption makes the whole system efficient and responsive to real-world conditions.
arXiv  Detail & Related papers  (2023-09-08T05:01:59Z) - Enabling Data Confidentiality with Public Blockchains [5.749927436954179]
Multi-Authority Approach to Transaction Systems for Interoperating Applications (MARTSIA)
MARTSIA enables read-access control over shared data at the level of message parts.
Based on Multi-Authority Attribute-Based Encryption (MA-ABE), MARTSIA enables read-access control over shared data at the level of message parts.
arXiv  Detail & Related papers  (2023-08-04T13:21:48Z) - Quantum Proofs of Deletion for Learning with Errors [91.3755431537592]
We construct the first fully homomorphic encryption scheme with certified deletion.
Our main technical ingredient is an interactive protocol by which a quantum prover can convince a classical verifier that a sample from the Learning with Errors distribution in the form of a quantum state was deleted.
arXiv  Detail & Related papers  (2022-03-03T10:07:32Z) - A lightweight blockchain-based access control scheme for integrated edge
  computing in the internet of things [4.308257382729074]
We propose an attribute-based encryption and access control scheme (ABE-ACS) for the Edge-Iot network.
For the problems of high resource consumption and difficult deployment of existing blockchain platforms, we design a lightweight blockchain (LBC)
Six smart contracts are designed to realize the ABAC and penalty mechanism, with which ABE is outsourced to edge nodes for privacy and integrity.
arXiv  Detail & Related papers  (2021-11-12T02:56:09Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv  Detail & Related papers  (2021-06-11T23:39:25Z) - Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous   Authentication on Permissionless Blockchains and Incentive Compatible,   Strictly Dominant Cryptocurrencies [0.0]
Zero-Knowledge Proof-of-Identity from trusted public certificates (e.g., national identity cards and/or ePassports; eSIM) is introduced here to permissionless blockchains.
The proposed solution effectively limits the number of mining nodes a single individual would be able to run while keeping membership open to everyone.
arXiv  Detail & Related papers  (2019-05-22T12:06:03Z) 
        This list is automatically generated from the titles and abstracts of the papers in this site.
       
     
           This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.