A Novel User Collusion-Resistant Decentralized Multi-Authority Attribute-Based Encryption Scheme Using the Deposit on a Blockchain

Recently, the concept of a decentralized data marketplace is getting much attention to exchange user data. Multi-authority attribute-based encryption (ABE), which can provide flexibility and user-centric access control, is previously widely used in decentralized data sharing applications and also becoming a foundation to build decentralized data trading applications. It is known that users in a multi-authority ABE system can collude by sharing their secret information for malicious purposes. To address this issue, the collusion-resistant multi-authority ABE model was introduced in which a unique global identifier (GID) is issued by the central authority (CA) to each user. Unfortunately, such approach cannot be used directly to build a decentralized data marketplace as (a) such intervention of the CA is directly against the main motivation of the decentralized trading platform and, mostly importantly, (b) the CA can exploit its full knowledge on users’ GID to launch various attacks against users. Motivated by these observations, this paper introduces a novel user collusion-resistant decentralized multi-authority ABE scheme for privacy preserving data trading systems. In the existing multi-authority ABE systems, users utilize his/her GID that is solely assigned by the CA to generate his/her secret keys throughout the collaboration with authorities and a user can compute multi-authority keys by combining the secret keys (stem from the same GID) in various ways. In the proposed system, the CA only has a partial knowledge of users’ GIDs, and thus, users’ privacy can be protected. On the other hand, we set the user’s own partial GID as a secret which can be used to withdraw his/her deposit to discourage any possible collusion among users.

[1]  Ke Zhou,et al.  Achieving Privacy-Preserving CP-ABE Access Control with Multi-Cloud , 2018, 2018 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Ubiquitous Computing & Communications, Big Data & Cloud Computing, Social Computing & Networking, Sustainable Computing & Communications (ISPA/IUCC/BDCloud/SocialCom/SustainCom).

[2]  Elaine Shi,et al.  On Scaling Decentralized Blockchains - (A Position Paper) , 2016, Financial Cryptography Workshops.

[3]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[4]  Ang Gao,et al.  Free global ID against collusion attack on multi-authority attribute-based encryption , 2013, Secur. Commun. Networks.

[5]  Hao Guo,et al.  Collusion Attacks on Decentralized Attributed-Based Encryption: Analyses and a Solution , 2020, ArXiv.

[6]  Miguel Oom Temudo de Castro,et al.  Practical Byzantine fault tolerance , 1999, OSDI '99.

[7]  Shoushan Luo,et al.  BSSPD: A Blockchain-Based Security Sharing Scheme for Personal Data with Fine-Grained Access Control , 2021, Wirel. Commun. Mob. Comput..

[8]  Arthur Gervais,et al.  Do you Need a Blockchain? , 2018, 2018 Crypto Valley Conference on Blockchain Technology (CVCBT).

[9]  Yingshu Li,et al.  Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks , 2018, IEEE Transactions on Dependable and Secure Computing.

[10]  Allison Bishop,et al.  Decentralizing Attribute-Based Encryption , 2011, IACR Cryptol. ePrint Arch..

[11]  A. Shamm Identity-based cryptosystems and signature schemes , 1985 .

[12]  Kyungtae Kang,et al.  Removing escrow from ciphertext policy attribute-based encryption , 2013, Comput. Math. Appl..

[13]  Khaled Riad,et al.  Multi-authority trust access control for cloud storage , 2016, 2016 4th International Conference on Cloud Computing and Intelligence Systems (CCIS).

[14]  Christian Decker,et al.  Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.

[15]  Zhipeng Cai,et al.  Adversarial Privacy-Preserving Graph Embedding Against Inference Attack , 2020, IEEE Internet of Things Journal.

[16]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[17]  Kim-Kwang Raymond Choo,et al.  BaDS: Blockchain-Based Architecture for Data Sharing with ABS and CP-ABE in IoT , 2018, Wirel. Commun. Mob. Comput..

[18]  Melissa Chase,et al.  Multi-authority Attribute Based Encryption , 2007, TCC.

[19]  Andrew Miller,et al.  Pisa: Arbitration Outsourcing for State Channels , 2019, IACR Cryptol. ePrint Arch..

[20]  Maurice Herlihy,et al.  Atomic Cross-Chain Swaps , 2018, PODC.

[21]  Kyungtae Kang,et al.  Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks , 2014, IEEE/ACM Transactions on Networking.

[22]  Muttukrishnan Rajarajan,et al.  Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption , 2012, IEEE Transactions on Parallel and Distributed Systems.