{"title":"A blind batch encryption and public ledger-based protocol for sharing sensitive data","authors":"Zhiwei Wang, Nianhua Yang, Qingqing Chen, Wei Shen, Zhiying Zhang","doi":"10.23919/JCC.fa.2020-0640.202401","DOIUrl":null,"url":null,"abstract":"For the goals of security and privacy preservation, we propose a blind batch encryption- and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved. Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester. We prove that our protocol is semanticallly secure, blind, and secure against oblivious requesters and malicious file keepers. We also provide security analysis in the context of four typical attacks.","PeriodicalId":504777,"journal":{"name":"China Communications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"China Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.23919/JCC.fa.2020-0640.202401","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
For the goals of security and privacy preservation, we propose a blind batch encryption- and public ledger-based data sharing protocol that allows the integrity of sensitive data to be audited by a public ledger and allows privacy information to be preserved. Data owners can tightly manage their data with efficient revocation and only grant one-time adaptive access for the fulfillment of the requester. We prove that our protocol is semanticallly secure, blind, and secure against oblivious requesters and malicious file keepers. We also provide security analysis in the context of four typical attacks.