A Proxy Re-Encryption Approach To Secure Data Sharing in The Internet of Things Based On Blockchain
A Proxy Re-Encryption Approach To Secure Data Sharing in The Internet of Things Based On Blockchain
Abstract—The evolution of the Internet of Things has seen data in applications such as healthcare, vehicular networks, smart
sharing as one of its most useful applications in cloud computing. cities, industries, and manufacturing, among others [1]. The
As eye-catching as this technology has been, data security remains sensors measure a host of parameters that are very useful for
one of the obstacles it faces since the wrongful use of data leads to
stakeholders involved. Consequently, as enticing as IoT seems
several damages. In this article, we propose a proxy re-encryption
approach to secure data sharing in cloud environments. Data to be, its advancement has introduced new challenges to security
owners can outsource their encrypted data to the cloud using and privacy. IoT needs to be secured against attacks that hinder
identity-based encryption, while proxy re-encryption construction it from providing the required services, in addition to those
will grant legitimate users access to the data. With the Internet of that pose threats to the confidentiality, integrity, and privacy of
Things devices being resource-constrained, an edge device acts as data.
a proxy server to handle intensive computations. Also, we make A viable solution is to encrypt the data before outsourcing to
use of the features of information-centric networking to deliver
cached content in the proxy effectively, thus improving the quality
the cloud servers. Attackers can only see the data in its encrypted
of service and making good use of the network bandwidth. Further, form when traditional security measures fail. In data sharing,
our system model is based on blockchain, a disruptive technology any information must be encrypted from the source and only
that enables decentralization in data sharing. It mitigates the bot- decrypted by authorized users in order to preserve its protection.
tlenecks in centralized systems and achieves fine-grained access Conventional encryption techniques can be used, where the
control to data. The security analysis and evaluation of our scheme decryption key is shared among all the data users designated by
show the promise of our approach in ensuring data confidentiality, the data owner. The use of symmetric encryption implies that the
integrity, and security.
same key is shared between the data owner and users, or at least
Index Terms—Access control, blockchain, data security, identity- the participants agree on a key. This solution is very inefficient.
based proxy re-encryption, information-centric network (ICN), Furthermore, the data owners do not know in advance who the
Internet of Things (IoT). intended data users are, and, therefore, the encrypted data needs
to be decrypted and subsequently encrypted with a key known
I. INTRODUCTION to both the data owner and the users. This decrypt-and-encrypt
solution means the data owner has to be online all the time, which
HE Internet of Things (IoT) has emerged as a technology
T that has great significance to the world nowadays and its
utilization has given rise to an expanded growth in network traffic
is practically not feasible. The problem becomes increasingly
complex when there are multiple pieces of data and diverse data
owners and users.
volumes over the years. It is expected that a lot of devices will Although simple, the traditional encryption schemes involve
get connected in the years ahead. Data is a central notion to complex key management protocols and, hence, are not apt for
the IoT paradigm as the data collected serves several purposes data sharing. Proxy re-encryption (PRE), a notion first proposed
by Blaze et al. [2], allows a proxy to transform a file computed
Manuscript received August 28, 2020; revised December 4, 2020 and April under a delegator’s public key into an encryption intended for
10, 2021; accepted April 27, 2021. Date of publication May 27, 2021; date
of current version March 24, 2022. This work was supported in part by the
a delegatee. Let the data owner be the delegator and the data
Program of International Science and Technology Cooperation and Exchange user be the delegate. In such a scheme, the data owner can send
of Sichuan Province under Grant 2019YFH0014 and Grant 2020YFH0030 and encrypted messages to the user temporarily without revealing
in part by the Science and Technology Program of Sichuan Province under Grant his secret key. The data owner or a trusted third party generates
2020YFSY0061. (Corresponding author: Jianbin Gao.)
Kwame Opuni-Boachie Obour Agyekum, Qi Xia, Emmanuel Boateng Sifah, the re-encryption key. A proxy runs the re-encryption algorithm
Christian Nii Aflah Cobblah, and Jianbin Gao are with the School of Computer with the key and revamps the ciphertext before sending the new
Science and Engineering, University of Electronic Science and Technology ciphertext to the user. An intrinsic trait of a PRE scheme is that
of China, Chengdu 610054, China, and also with the UESTC-CDFH Joint the proxy is not fully trusted (it has no idea of the data owner’s
Institute of Blockchain, Chengdu Jiaozi Financial Holding Group Co. Ltd.,
Chengdu 610042, China (e-mail: [email protected]; [email protected]; secret key). This is seen as a prime candidate for delegating
[email protected]; [email protected]; [email protected]). access to encrypted data in a secured manner, which is a crucial
Hu Xia is with the School of Computer Science and Engineering, University of component in any data-sharing scenario. In addition, PRE allows
Electronic Science and Technology of China, Chengdu 610054, China (e-mail:
[email protected]).
for encrypted data in the cloud to be shared to authorized users
Digital Object Identifier 10.1109/JSYST.2021.3076759 while maintaining its confidentiality from illegitimate parties.
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/
1686 IEEE SYSTEMS JOURNAL, VOL. 16, NO. 1, MARCH 2022
Data disclosures can be minimized through the use of encryption 4) The security analysis of our scheme is presented, and
since only users delegated by the data owner can effectively we also test and compare its performance with existing
access the outsourced data. schemes.
Motivated by this scenario, this article proposes an improve- This article is structured as follows. Section II reviews some
ment in IoT data sharing by combining PRE with identity-based literature on PRE, IBE, ICN, and blockchain for data sharing
encryption (IBE), information-centric networking (ICN), and and access control. Security definitions and preliminaries are
blockchain technology. Shamir [3] first presented the notion of formally described in Section III. In Section IV, we define
IBE, in which a sender encrypts a message to a recipient using the a data-sharing problem and present the system model. The
identity (email ) as the public key. It is a very powerful primitive implementation of our model is illustrated in Section V and the
used to combat numerous key distribution problems and has formal security analysis is outlined in Section VI. Section VII
consented to the development of several cryptographic proto- evaluates and discusses our proposed scheme, while Section VIII
cols, including public-key searchable encryption [4], [5], secret concludes the article.
handshakes [6], and chosen ciphertext attack (CCA) secure
public-key encryption [7]. IBE is preferred over attribute-based II. RELATED WORKS
encryption (ABE) because ABE involves heavy computations
In this section, we review some of the applications of the
on data encryption, decryption, and key management, and these
technologies used in this article in relation to data sharing and
processes are not convenient for the resource-constrained IoT
access control in the cloud.
devices. The strength of this article is increased by borrowing
the idea of ICN to cater for the growth in information sharing.
The appeal for low-latency applications introduced the notion A. PRE Data Sharing
of ICN [8]–[11], where data owners can distribute and assign Yu et al. [15] combined key-policy ABE (KP-ABE) and PRE
unique names to their data which can be replicated and saved in to propose a system for data sharing in the cloud. The data was
network caches [12], [13]. This ensures that there is an efficient encrypted using KP-ABE which meant that only an appropriate
data delivery and utilization of network bandwidth, which is a collection of the attribute secret keys can make decryption
prerequisite for the IoT ecosystem regardless of the enormous possible. Besides the encrypted data, the cloud also managed
growth in network volumes. On issues of trust, a decentralized, all attribute secret keys except one special secret key in order to
distributed system that can smoothen secure and trusted data handle revocation of users. When users are revoked, new keys
sharing was introduced by Nakamoto [14]. This is the blockchain were distributed to the remaining users by the data owner and the
technology, and it has gained much attention due to its ability to encrypted data had to be re-encrypted. Although the scheme was
preserve data privacy. Although there exist optimization issues efficient, the re-encryption was performed in a lazy way, and,
when storing vast sizes of data, emerging system applications therefore, the security of the scheme was weakened. Park [16]
have used the blockchain for access control in database man- provided a modification to the scheme in [15], where collusion
agement. Data confidentiality and user revocation can also be between the service provider and revoked users is avoided. Their
achieved using blockchain. scheme was to basically replace the service provider with a
PRE, together with IBE and the features of ICN and trusted third party, which implies that there should be reliance
blockchain, will enhance security and privacy in data-sharing on stronger trust assumption. Other schemes [17]–[19] have
systems. PRE and IBE will ensure fine-grained data access made similar approaches but utilized ciphertext-policy ABE
control, while the concept of ICN promises a sufficient quality of (CP-ABE) rather, in which the access policy is associated with
service in data delivery because the in-network caching provides the ciphertext instead of the secret keys. Liu et al. [20] also
efficient distribution of data. The blockchain is optimized to proposed a time-constrained access control scheme based on
prevent storage and data-sharing overheads and also to ensure a PRE and ABE. ABE was used to design time-based access
trusted system among entities on the network. In our article, the control policies while PRE was used to update the time attributes.
data owner propagates an access control list which is stored on Although these schemes have their advantages, they are not
the blockchain. Only the authorized users are able to access the suitable in the context of IoT due to the heavy computations
data. The contributions of this article are summarized as follows. on encryption and decryption.
1) We propose a secure access control framework to realize An IBE PRE scheme suitable for data sharing was presented
data confidentiality, and fine-grained access to data are by Han et al. in [21]. The re-encryption keys were not only
achieved. This will also guarantee data owners’ complete bound to the users’ identities but also to a specific ciphertext.
control over their data. This implied that the data owner had to create a different re-
2) We give a detailed description of our PRE scheme and encryption key for each pair of data user and shared file. A
the actualization of a complete protocol that guarantees similar idea was proposed by Lin et al. [22] where they used a
security and privacy of data. hierarchical PRE instead of an identity-based PRE. These two
3) To improve data delivery and effectively utilize the network schemes tend to be inefficient when multiple and complex data
bandwidth, edge devices serve as proxy nodes and perform pieces are considered. An identity-based broadcast encryption
re-encryption on the cached data. The edge devices are (IBBE) combined with PRE was proposed by Zhou et al. in [23]
assumed to have enough computation capabilities than for data sharing. Their scheme was a hybrid one that allowed
the IoT devices and as such provide high performance the conversion to be done between the two protocols without
networking. leaking any sensitive information. Wang et al. [24] also designed
AGYEKUM et al.: PROXY RE-ENCRYPTION APPROACH TO SECURE DATA SHARING IN THE IOT BASED ON BLOCKCHAIN 1687
significant mathematical symbols and their notations. However, as inputs and returns the message m. The constraint in the
all other symbols are duly explained. following equation must be satisfied:
$
P b u, v, w ←− Zp∗ ; 1 ← A (g, g u , g v , g w , e(g, g)uvw ) , −
≤ ψ(λ) (1)
$ $
P b u, v, w ←− Zp∗ ; J ←− G2 ; 1 ← A (g, g u , g v , g w , J) ,
AGYEKUM et al.: PROXY RE-ENCRYPTION APPROACH TO SECURE DATA SHARING IN THE IOT BASED ON BLOCKCHAIN 1689
A. Security Proof
B. System Security Analysis
Theorem 6.1. The system is IN DPRID/CPA secure under the
In this subsection, we analyze the attacks that our proposed
DBDH assumption.
system mitigates.
Proof: The interaction between the adversary and the chal-
1) Man-in-the-Middle Attack: Our system is secure against
lenger is shown in Fig. 4. Consider A to be a p.p.t algorithm
man-in-the-middle (MITM) attacks. MITM attacks get to the
with non-negligible advantage in eIN DPRID/CPA . In order to for-
certificate authority (CA) to provide the user with forged public
mulate another algorithm C that has non-negligible advantage in
keys. This often leads to the decryption of sensitive information.
solving the DBDH problem in G1 , G2 , A is engaged. C’s input
In our system, the blockchain acts as the CA. The public keys of
is the tuple G1 = g , g u , g v , g w , J ∈ G41 × G2 for which the
the users are put in published blocks, and the data is distributed
output will be 1 if J = e(g, g)uvw . The interaction between A
over the participating nodes with links to both the previous and
and C is shown below.
following blocks. This makes the public key immutable and it
The random oracle G1 ← H1 : (0, 1)∗ is simulated by C as
becomes harder for attackers to publish fake keys. Also, there is
follows: When an ID query is received, a random number
no single point of failure due to the distribution.
θ → Zp∗ is selected and a randomly flipped coin η → 1 with
2) Data Tampering: When hackers compromise a system, they
probability χ is set. Otherwise, η → 0. h ← (g w )θ when η → 0, inject their own versions of the data into the system. There is no
else h ← g θ . The tuple (ID, h, θ, η) is recorded. h is returned definite way to make sure that the data has not been tampered
as the query result, for which it has a random distribution. with if the hash can be compromised and changed. In contrast,
C continues to simulate the random oracle H2 : G1 ← G2 . It our blockchain-based model permits every user to publish a hash
returns random elements in G1 . associated with a particular data which needs to be protected
1) Setup phase: A is given params = (G1 , H1 , H2 , g, g u ) as from tampering. While an attacker might be able to compromise
generated by C. the storage location and tamper with the data, he will not be able
2) Find phase: C evaluates H(ID) after A has submit- to change the hash stored on the blockchain. This will make it
ted (KeyGen, ID) to obtain (ID, h, θ, η). A secret key known to everyone that the data has been manipulated.
mskID = (g u )θ belonging to the queried ID is given to 3) Anomaly Attacks: In blockchain-based systems and ap-
A. When A sends the query (ReKey, IDDO , IDDU ), C plications, forks become important with every chance of the
$ $ $
selects random numbers r ←− Zp∗ , x ←− G1 and ϑ ←− evolution of a malicious purpose. Although attacks may happen
G2 and evaluates (η1 , θ1 ) ← H1 and (η2 , θ2 ) ← H2 for once within a device, their repetition over time against other
IDDO and IDDU , respectively. devices almost behaves in the same way. In our model, informa-
a) When η1 = 0, A receives RKIDDO →IDDU = tion on previous attacks is collected and blacklisted in order to
((g v )r , J rθ2 · ϑ, x) from C. prevent the attacks on entities that have not been attacked yet.
AGYEKUM et al.: PROXY RE-ENCRYPTION APPROACH TO SECURE DATA SHARING IN THE IOT BASED ON BLOCKCHAIN 1693
TABLE II
FUNCTIONAL COMPARISON
Information collected on forks include the start time of the fork, TABLE III
COMPUTATION COST COMPARISON
detection time of the fork, and the number and type of malicious
transactions. These details are propagated in the network to all
the peers.
VIII. CONCLUSION [17] G. Wang, Q. Liu, J. Wu, and M. Guo, “Hierarchical attribute-based
encryption and scalable user revocation for sharing data in cloud servers,”
The emergence of the IoT has made data sharing one of its Comput. Secur., vol. 30, no. 5, pp. 320–331, Jul. 2011.
most prominent applications. To guarantee data confidentiality, [18] J. Hur, “Improving security and efficiency in attribute-based data shar-
integrity, and privacy, we propose a secure identity-based PRE ing,” IEEE Trans. Knowl. Data Eng., vol. 25, no. 10, pp. 2271–2282,
Apr. 2011.
data-sharing scheme in a cloud computing environment. Secure [19] P. K. Tysowski and M. A. Hasan, “Hybrid attribute-and re-encryption-
data sharing is realized with IBPRE technique, which allows based key management for secure and scalable mobile applications
the data owners to store their encrypted data in the cloud and in clouds,” IEEE Trans. Cloud Comput., vol. 1, no. 2, pp. 172–186,
Nov. 2013.
share them with legitimate users efficiently. Due to resource [20] Q. Liu, G. Wang, and J. Wu, “Time-based proxy re-encryption scheme
constraints, an edge device serves as the proxy to handle the in- for secure data sharing in a cloud environment,” Inform. Sci., vol. 258,
tensive computations. The scheme also incorporates the features pp. 355–370, Feb. 2014.
of ICN to proficiently deliver cached content, thereby improving [21] J. Han, W. Susilo, and Y. Mu, “Identity-based data storage in cloud
computing,” Future Gener. Comput. Syst., vol. 29, no. 3, pp. 673–681,
the quality of service and making great use of the network Mar. 2013.
bandwidth. Then, we present a blockchain-based system model [22] H.-Y. Lin, J. Kubiatowicz, and W.-G. Tzeng, “A secure fine-grained access
that allows for flexible authorization on encrypted data. Fine- control mechanism for networked storage systems,” in Proc. IEEE 6th Int.
Conf. Softw. Secur. Rel., Jun. 2012, pp. 225–234.
grained access control is achieved, and it can help data owners [23] Y. Zhou et al., “Identity-based proxy re-encryption version 2: Making
achieve privacy preservation in an adequate way. The analysis mobile access easy in cloud,” Future Gener. Comput. Syst., vol. 62,
and results of the proposed model show how efficient our scheme pp. 128–139, Sep. 2016.
is, compared to existing schemes. [24] X. A. Wang, J. Ma, F. Xhafa, M. Zhang, and X. Luo, “Cost-effective secure
e-health cloud system using identity based cryptographic techniques,”
Future Gener. Comput. Syst., vol. 67, pp. 242–254, Feb. 2017.
[25] J. Shao, G. Wei, Y. Ling, and M. Xie, “Identity-based conditional
REFERENCES proxy re-encryption,” in Proc. IEEE Int. Conf. Commun., Jun. 2011,
pp. 1–5.
[1] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. Ayyash, [26] K. O. B. Obour Agyekum et al., “A secured proxy-based data sharing
“Internet of Things: A survey on enabling technologies, protocols, and module in IoT environments using blockchain,” Sensors, vol. 19, no. 5,
applications,” IEEE Commun. Surveys Tut., vol. 17, no. 4, pp. 2347–2376, Jan. 2019, Art. no. 1235.
Oct./Dec. 2015. [27] G. Zyskind et al., “Decentralizing privacy: Using blockchain to protect
[2] M. Blaze, G. Bleumer, and M. Strauss, “Divertible protocols and atomic personal data,” in Proc. IEEE Secur. Privacy Workshops, May 2015,
proxy cryptography,” in Proc. Int. Conf. Theory Appl. Cryptographic pp. 180–184.
Techn., Springer, May 1998, pp. 127–144. [28] D. D. F. Maesa, P. Mori, and L. Ricci, “Blockchain based access control,”
[3] A. Shamir, “Identity-based cryptosystems and signature schemes,” in in Proc. IFIP Int. Conf. Distributed Appl. Interoperable Syst., Springer,
Proc. Workshop Theory Appl. Cryptographic Techn., Springer, Aug. 1984, Jun. 2017, pp. 206–220.
pp. 47–53. [29] K. Fan, Y. Ren, Y. Wang, H. Li, and Y. Yang, “Blockchain-based efficient
[4] D. Boneh, G. Di Crescenzo, R. Ostrovsky, and G. Persiano, “Public privacy preserving and data sharing scheme of content-centric network in
key encryption with keyword search,” in Proc. Int. Conf. Theory Appl. 5G,” IET Commun., vol. 12, no. 5, pp. 527–532, Mar. 2018.
Cryptographic Techn., Springer, May 2004, pp. 506–522. [30] M. Singh and S. Kim, “Branch based blockchain technology in intelligent
[5] B. R. Waters, D. Balfanz, G. Durfee, and D. K. Smetters, “Building an vehicle,” Comput. Netw., vol. 145, pp. 219–231, Nov. 2018.
encrypted and searchable audit log,” in NDSS, vol. 4. Citeseer, Feb. 2004, [31] R. S. Da Silva and S. D. Zorzo, “An access control mechanism to ensure
pp. 5–6. privacy in named data networking using attribute-based encryption with
[6] D. Balfanz et al., “Secret handshakes from pairing-based key agreements,” immediate revocation of privileges,” in Proc. 12th Annu. IEEE Consum.
in Proc. IEEE, Symp. Secur. Privacy, 2003, pp. 180–196. Commun. Netw. Conf., Jan. 2015, pp. 128–133.
[7] R. Canetti, S. Halevi, and J. Katz, “Chosen-ciphertext security from [32] B. Li, D. Huang, Z. Wang, and Y. Zhu, “Attribute-based access control for
identity-based encryption,” in Proc. Int. Conf. Theory Appl. Cryptographic ICN naming scheme,” IEEE Trans. Dependable Secure Comput., vol. 15,
Techn., Springer, 2004, pp. 207–222. no. 2, pp. 194–206, Apr. 2016.
[8] T. Koponen et al., “A data-oriented (and beyond) network architecture,” [33] S. Misra et al., “Accconf: An access control framework for leveraging
in Proc. Conf. Appl., Techn., Architectures, Protoc. Comput. Commun., in-network cached data in the ICN-enabled wireless edge,” IEEE Trans.
Aug. 2007, pp. 181–192. Dependable Secure Comput., vol. 16, no. 1, pp. 5–17, Feb. 2017.
[9] N. Fotiou, P. Nikander, D. Trossen, and G. C. Polyzos, “Developing [34] E. G. AbdAllah, M. Zulkernine, and H. S. Hassanein, “DACPI: A decen-
information networking further: From PSIRP to pursuit,” in Proc. Int. tralized access control protocol for information centric networking,” in
Conf. Broadband Commun., Netw. Syst., Springer, Oct. 2010, pp. 1–13. Proc. IEEE Int. Conf. Commun., May 2016, pp. 1–6.
[10] C. Dannewitz, J. Golic, B. Ohlman, and B. Ahlgren, “Secure naming [35] Y. Zhang, R. H. Deng, D. Zheng, J. Li, P. Wu, and J. Cao, “Efficient and
for a network of information,” in Proc. INFOCOM IEEE Conf. Comput. robust certificateless signature for data crowdsensing in cloud-assisted
Commun. Workshops,2010, pp. 1–6. industrial IoT,” IEEE Trans. Ind. Inform., vol. 15, no. 9, pp. 5099–5108,
[11] A. Carzaniga, M. J. Rutherford, and A. L. Wolf, “A routing scheme for Jan. 2019.
content-based networking,” in Proc. IEEE INFOCOM 2004, vol. 2, 2004, [36] J.-S. Fu, Y. Liu, H.-C. Chao, B. K. Bhargava, and Z.-J. Zhang, “Secure
pp. 918–928. data storage and searching for industrial IoT by integrating fog comput-
[12] I. Psaras, W. K. Chai, and G. Pavlou, “Probabilistic in-network caching for ing and cloud computing,” IEEE Trans. Ind. Inform., vol. 14, no. 10,
information-centric networks,” in Proc. 2nd ed. ICN Workshop Inform.- pp. 4519–4528, Jan. 2018.
Centric Netw., Aug. 2012, pp. 55–60. [37] M. Ma, D. He, N. Kumar, K.-K. R. Choo, and J. Chen, “Certificateless
[13] Y. Sun et al., “Trace-driven analysis of ICN caching algorithms on video- searchable public key encryption scheme for industrial Internet of Things,”
on-demand workloads,” in Proc. 10th ACM Int. Conf. Emerging Netw. Exp. IEEE Trans. Ind. Inform., vol. 14, no. 2, pp. 759–767, May 2017.
Technol., Dec. 2014, pp. 363–376. [38] Z. Wei, J. Li, X. Wang, and C.-Z. Gao, “A lightweight privacy-preserving
[14] S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, vol. 4. protocol for VANETs based on secure outsourcing computing,” IEEE
Bitcoin.org, 2008. Available: https://bitcoin. org/bitcoin. pdf Access, vol. 7, pp. 62785–62793, 2019.
[15] S. Yu, C. Wang, K. Ren, and W. Lou, “Achieving secure, scalable, and [39] Y. Zhang, D. Zheng, and R. H. Deng, “Security and privacy in smart
fine-grained data access control in cloud computing,” in Proc. IEEE health: Efficient policy-hiding attribute-based access control,” IEEE In-
INFOCOM, Mar. 2010, pp. 1–9. ternet Things J., vol. 5, no. 3, pp. 2130–2145, Apr. 2018.
[16] N. Park, “Secure data access control scheme using type-based re- [40] L. Zhang, Q. Wu, Y. Mu, and J. Zhang, “Privacy-preserving and secure
encryption in cloud environment,” in Semantic Methods Knowledge Man- sharing of PHR in the cloud,” J. Med. Syst., vol. 40, no. 12, pp. 1–13,
agement and Communications. Berlin, Germany: Springer, 2011, pp. 319– Dec. 2016.
327.
1696 IEEE SYSTEMS JOURNAL, VOL. 16, NO. 1, MARCH 2022
[41] S. Wang, Y. Zhang, and Y. Zhang, “A blockchain-based framework for data Emmanuel Boateng Sifah received the B.Sc. de-
sharing with fine-grained access control in decentralized storage systems,” gree in telecommunications engineering from Ghana
IEEE Access, vol. 6, pp. 38437–38450, 2018. Technology University College, Accra, Ghana, in
[42] S. Niu, L. Chen, J. Wang, and F. Yu, “Electronic health record sharing 2014 and the M.Eng. degree in computer science
scheme with searchable attribute-based encryption on blockchain,” IEEE and technology in 2017, from the School of Com-
Access, vol. 8, pp. 7195–7204, 2019. puter Science and Engineering, University of Elec-
[43] G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy tronic Science and Technology of China (UESTC),
re-encryption schemes with applications to secure distributed storage,” Chengdu, China, where he is currently working to-
ACM Trans. Inform. Syst. Secur., vol. 9, no. 1, pp. 1–30, Feb. 2006. ward the Ph.D. degree in computer Science and
[44] R. Pecori, “S-kademlia: A trust and reputation method to mitigate a sybil technology.
attack in Kademlia,” Comput. Netw., vol. 94, pp. 205–218, Jan. 2016. His current research interests include blockchain
[45] A. De Caro and V. Iovino, “ JPBC: Java pairing based cryptography,” in technology and its application and big data security and privacy.
Proc. IEEE Symp. Comput. Commun., Jun. 2011, pp. 850–855.
[46] E. Barker, L. Chen, S. Keller, A. Roginsky, A. Vassilev, and R. Davis,
“Recommendation for pair-wise key-establishment schemes using discrete
logarithm cryptography,” National Institute of Standards and Technology,
Gaithersburg, MD, USA, Tech. Rep. 800-56Ar3, Aug. 2017.