Enhancing Permissioned Blockchains with Controlled Data Authorization

Qichang Liu, Xufeng Zhang, Sisi Duan, Haibin Zhang*

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Blockchains provide data with availability and integrity. Many applications, however, also require strong confidentiality, a goal that conventional blockchains fail to achieve. This work enhances permissioned blockchains based on Byzantine fault tolerance (BFT) with the ability to manage confidential data in a controlled manner. For this goal, we formally define threshold encryption with controlled authorization (ECA). In an ECA scheme, writers can send transaction messages to readers via servers (e.g., blockchain servers). There are many challenges for ECA — decoupling writers and readers, message confidentiality, reliability of the system, and the tolerance of malicious behaviors. We define the syntax for the ECA system and formalize three security notions for ECA, namely token verifiability, t-robustness, and t-collusion resistant CPA security. We propose an ECA scheme and provide formal proofs of these notions for our proposed ECA scheme. Our ECA scheme decouples writers and readers with the help of servers. The token verifiability guarantees all the servers obtain the right tokens from writers. The t-robustness makes sure our ECA scheme runs well even if t malicious servers implement active attacks. The t-collusion resistant CPA security guarantees message privacy from servers, even if t servers collude with each other to implement active attacks. Finally, we offer an efficient ECA construction satisfying all these security notions.

Original languageEnglish
Title of host publicationInformation Security and Privacy - 29th Australasian Conference, ACISP 2024, Proceedings
EditorsTianqing Zhu, Yannan Li
PublisherSpringer Science and Business Media Deutschland GmbH
Pages3-23
Number of pages21
ISBN (Print)9789819751006
DOIs
Publication statusPublished - 2024
Externally publishedYes
Event29th Australasian Conference on Information Security and Privacy, ACISP 2024 - Sydney, Australia
Duration: 15 Jul 202417 Jul 2024

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume14897 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference29th Australasian Conference on Information Security and Privacy, ACISP 2024
Country/TerritoryAustralia
CitySydney
Period15/07/2417/07/24

Keywords

  • Confidentiality
  • Controlled authorization
  • Fine-grained access control
  • Permissioned blockchain
  • Threshold encryption

Fingerprint

Dive into the research topics of 'Enhancing Permissioned Blockchains with Controlled Data Authorization'. Together they form a unique fingerprint.

Cite this