Hierarchical Identity-based Broadcast Cryptography and its Application in Blockchain
DOI:
https://doi.org/10.21467/preprints.346Abstract
Blockchain as an emerging cryptographic database technology has gained wide attention in many directions. Among them, data security is one of the hot spots of research in blockchain. In this paper, we first analyze the security problems of blockchain and then propose to solve them with hierarchical identity-based broadcast encryption (HIBBE). HIBBE, as a variant of hierarchical identity-based cryptography, can effectively improve the data security. HIBBE has all the characteristics of hierarchical identity-based cryptography, so it has potential in decentralized application scenarios. Then we made an overview of the several existing HIBBE scheme. This paper also gives a formal definition of HIBBE and concludes with the research direction of HIBBE-based blockchain.
Keywords:
Blockchain Technology, Hierarchical Identity-based Broadcast Encryption, DatabaseDownloads
References
Belchior, Rafael, et al. "A survey on blockchain interoperability: Past, present, and future trends." ACM Computing Surveys (CSUR) 54.8 (2021): 1-41.
Imbugwa, Gerald, Mazara Manuel, and Salvatore Distefano. "Developing a Mobile Application Using Open Source Parking Management System on Etherium Smart Contracts." Journal of Physics: Conference Series. Vol. 1694. No. 1. IOP Publishing, 2020.
Yang, Xiaohui, and Wenjie Li. "A zero-knowledge-proof-based digital identity management scheme in blockchain." Computers & Security 99 (2020): 102050.
Li, Wanxin, et al. "Privacy-preserving traffic management: A blockchain and zero-knowledge proof inspired approach." IEEE Access 8 (2020): 181733-181743.
Mundhe, Pravin, et al. "Ring signature-based conditional privacy-preserving authentication in VANETs." Wireless Personal Communications 114.1 (2020): 853-881.
Langrehr, Roman, and Jiaxin Pan. "Tightly secure hierarchical identity-based encryption." Journal of Cryptology 33.4 (2020): 1787-1821.
Liu, Weiran, et al. "Hierarchical identity-based broadcast encryption." Australasian Conference on Information Security and Privacy. Springer, Cham, 2014.
Liu, Weiran, et al. "Practical chosen-ciphertext secure hierarchical identity-based broadcast encryption." International journal of information security 15.1 (2016): 35-50.
Zheng, Zibin, et al. "Blockchain challenges and opportunities: A survey." International Journal of Web and Grid Services 14.4 (2018): 352-375.
Shi, Shuyun, et al. "Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey." Computers & Security (2020): 101966.
Yao, Danfeng, et al. "ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption." Proceedings of the 11th ACM conference on Computer and communications security. 2004.
Boneh, Dan, and Michael Hamburg. "Generalized identity based and broadcast encryption schemes." International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, 2008.
Ameri, Mohammmad Hassan, Javad Mohajeri, and Mahmoud Salmasizadeh. "Efficient and provable secure anonymous hierarchical identity-based broadcast encryption (hibbe) scheme without random oracle." Cryptology ePrint Archive (2016).
Li, Dawei, et al. "Revocable hierarchical identity-based broadcast encryption." Tsinghua Science and Technology 23.5 (2018): 539-549.
Jinman, Zhang, and Chen Qin. "Hierarchical identity-based broadcast encryption scheme on lattices." 2011 Seventh International Conference on Computational Intelligence and Security. IEEE, 2011.
Yang, Chunli, et al. "Hierarchical identity-based broadcast encryption scheme from LWE." Journal of Communications and Networks 16.3 (2014): 258-263.
Wan, Zhiguo, Wei Liu, and Hui Cui. "HIBEChain: A Hierarchical Identity-based Blockchain System for Large-Scale IoT." IACR Cryptol. ePrint Arch. 2019 (2019): 1425.
Pavithran, Deepa, Jamal N. Al-Karaki, and Khaled Shaalan. "Edge-Based Blockchain Architecture for Event-Driven IoT using Hierarchical Identity Based Encryption." Information Processing & Management 58.3 (2021): 102528.
Khan, Saifullah, et al. "Blockchain and the Identity based Encryption Scheme for High Data Security." 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC). IEEE, 2020.
Khan, Saifullah, et al. "Blockchain and the Identity based Encryption Scheme for High Data Security." 2020 Fourth International Conference on Computing Methodologies and Communication (ICCMC). IEEE, 2020.
Zhang, Meng, et al. "Protecting data privacy for permissioned blockchains using identity-based encryption." 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC). IEEE, 2019.
Downloads
Posted
Section
Categories
License
Copyright (c) 2021 Chenchen Han
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Any non-commercial use, distribution, adaptation, and reproduction in any medium is permitted as long as the original work is properly cited. However, caution and responsibility are required when reusing as the articles on the preprint server are not peer-reviewed. Readers are advised to check for the availability of any updated or peer-reviewed version.