
Research Article
Verifiable Attribute-Based Proxy Re-encryption with Non-repudiation Based on Blockchain
@INPROCEEDINGS{10.1007/978-3-031-60037-1_7, author={Yaorui He and Ting Liang and Pei Huang and Zhe Xia}, title={Verifiable Attribute-Based Proxy Re-encryption with Non-repudiation Based on Blockchain}, proceedings={Blockchain Technology and Emerging Applications. Third EAI International Conference, BlockTEA 2023, Wuhan, China, December 2-3, 2023, Proceedings}, proceedings_a={BLOCKTEA}, year={2024}, month={5}, keywords={Blockchain Proxy Re-Encryption Privacy-Preserving Data-Sharing}, doi={10.1007/978-3-031-60037-1_7} }
- Yaorui He
Ting Liang
Pei Huang
Zhe Xia
Year: 2024
Verifiable Attribute-Based Proxy Re-encryption with Non-repudiation Based on Blockchain
BLOCKTEA
Springer
DOI: 10.1007/978-3-031-60037-1_7
Abstract
With the development of Blockchain, cloud computing, and artificial intelligence, smart transportation is highly likely to drive urban transportation in the direction of intelligence and digitalization. However, when connected vehicle devices share data in edge networks, there are security and privacy issues, e.g. leakage of sensitive information will cause serious threats. The separation of user data ownership and physical control requires users to impose access control on the outsourced data. Existing privacy protection schemes still suffer from problems such as a lack of supervision of centralized third-party cloud servers, which face the challenge of data leakage. In this paper, Blockchain and proxy re-encryption techniques are used to address these challenges. To enable sharing of the outsourced data in a secure way, Attribute-Based Proxy Re-encryption (ABPRE) is a popular technique. At the same time, verifiability enables the shared user to verify that the re-encrypted ciphertext returned by the server is correct. In addition, the introduction of a decentralized Blockchain provides distributed storage and it is tamper-proof for enhancing the trustworthiness of the connected vehicle devices as well as the security of the communication between the entities. The security and performance analyses demonstrate that our proposed scheme can achieve the desirable security features and it is efficient for protecting data privacy.