引用本文: | 杨小东,廖泽帆,刘 磊,王彩芬.基于区块链和属性基加密的电力数据共享方案[J].电力系统保护与控制,2023,51(13):169-176.[点击复制] |
YANG Xiaodong,LIAO Zefan,LIU Lei,WANG Caifen.Power data sharing scheme based on blockchain and attribute-based encryption[J].Power System Protection and Control,2023,51(13):169-176[点击复制] |
|
摘要: |
目前电力数据共享方案主要采用属性基加密技术实现一对多的电力数据访问控制,但存在加密效率低和用户属性易被篡改等问题。为了解决这些问题,提出了一种基于区块链和属性基加密的电力数据共享方案。结合属性基加密和对称加密算法,实现了电力数据的机密性和细粒度访问控制。引入在线/离线加密模式,大大提升了数据拥有者的加密性能。利用外包计算技术,降低了数据访问用户的计算负担。将属性集合和电力数据的哈希值上传至区块链,保障用户属性的不可伪造性和解密密文的正确性。分析结果表明,该方案实现了电力数据的安全共享,其加密/解密性能适用于资源受限的电力终端设备。 |
关键词: 电力数据共享 在线/离线加密 属性加密 外包解密 区块链 |
DOI:10.19783/j.cnki.pspc.221491 |
投稿时间:2022-09-18修订日期:2022-12-31 |
基金项目:国家自然科学基金项目资助(61662069);中国博士后科学基金项目资助(2017M610817) |
|
Power data sharing scheme based on blockchain and attribute-based encryption |
YANG Xiaodong1,LIAO Zefan1,LIU Lei2,WANG Caifen3 |
(1. College of Computer Science and Engineering, Northwest Normal University, Lanzhou 730070, China; 2. Institute of
China Telecom WanWei, China Telecom WanWei Information Technology Co., Ltd., Lanzhou 730030, China;
3. College of Big Data and Internet, Shenzhen Technology University, Shenzhen 518118, China) |
Abstract: |
Existing data sharing schemes mainly use attribute-based encryption technology to achieve "one-to-many" data access control, but there are problems such as low encryption efficiency and attributes that are easily tampered with. To solve these problems, a blockchain-based ciphertext data sharing scheme is proposed. Combining attribute-based encryption and symmetric encryption algorithms, confidentiality and fine-grained access control of shared data are achieved. The introduction of an on-line/off-line encryption mode greatly improves the encryption performance of the data owner. In addition, it uses outsourcing computing technology to reduce the computing burden of data access users. Attribute sets and Hash values of shared data are uploaded to the blockchain. This ensures the ‘unforgeability’ of attributes and the correctness of decrypted ciphertext. The analysis shows that this scheme realizes secure data sharing, and its encryption/ decryption efficiency is better than similar schemes. Hence, it is more suitable for resource-constrained smart devices. |
Key words: power data sharing on-line/off-line encryption attribute-based encryption outsourcing decryption blockchain |