{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T01:11:21Z","timestamp":1769821881514,"version":"3.49.0"},"reference-count":22,"publisher":"MDPI AG","issue":"14","license":[{"start":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T00:00:00Z","timestamp":1720656000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key R&amp;D Program of China","award":["2021ZD0111404"],"award-info":[{"award-number":["2021ZD0111404"]}]},{"name":"National Key R&amp;D Program of China","award":["CUC24QT04"],"award-info":[{"award-number":["CUC24QT04"]}]},{"name":"National Key R&amp;D Program of China","award":["CUC230D016"],"award-info":[{"award-number":["CUC230D016"]}]},{"name":"National Key R&amp;D Program of China","award":["62172005"],"award-info":[{"award-number":["62172005"]}]},{"name":"National Key R&amp;D Program of China","award":["2022YFC3302103-01"],"award-info":[{"award-number":["2022YFC3302103-01"]}]},{"name":"National Key R&amp;D Program of China","award":["JYB2022-01"],"award-info":[{"award-number":["JYB2022-01"]}]},{"name":"Fundamental Research Funds for the Central Universities","award":["2021ZD0111404"],"award-info":[{"award-number":["2021ZD0111404"]}]},{"name":"Fundamental Research Funds for the Central Universities","award":["CUC24QT04"],"award-info":[{"award-number":["CUC24QT04"]}]},{"name":"Fundamental Research Funds for the Central Universities","award":["CUC230D016"],"award-info":[{"award-number":["CUC230D016"]}]},{"name":"Fundamental Research Funds for the Central Universities","award":["62172005"],"award-info":[{"award-number":["62172005"]}]},{"name":"Fundamental Research Funds for the Central Universities","award":["2022YFC3302103-01"],"award-info":[{"award-number":["2022YFC3302103-01"]}]},{"name":"Fundamental Research Funds for the Central Universities","award":["JYB2022-01"],"award-info":[{"award-number":["JYB2022-01"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2021ZD0111404"],"award-info":[{"award-number":["2021ZD0111404"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["CUC24QT04"],"award-info":[{"award-number":["CUC24QT04"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["CUC230D016"],"award-info":[{"award-number":["CUC230D016"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172005"],"award-info":[{"award-number":["62172005"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2022YFC3302103-01"],"award-info":[{"award-number":["2022YFC3302103-01"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["JYB2022-01"],"award-info":[{"award-number":["JYB2022-01"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2021ZD0111404"],"award-info":[{"award-number":["2021ZD0111404"]}]},{"name":"National Key Research and Development Program of China","award":["CUC24QT04"],"award-info":[{"award-number":["CUC24QT04"]}]},{"name":"National Key Research and Development Program of China","award":["CUC230D016"],"award-info":[{"award-number":["CUC230D016"]}]},{"name":"National Key Research and Development Program of China","award":["62172005"],"award-info":[{"award-number":["62172005"]}]},{"name":"National Key Research and Development Program of China","award":["2022YFC3302103-01"],"award-info":[{"award-number":["2022YFC3302103-01"]}]},{"name":"National Key Research and Development Program of China","award":["JYB2022-01"],"award-info":[{"award-number":["JYB2022-01"]}]},{"name":"Strategic Research Program of Science and Technology Commission of the Ministry of Education of China","award":["2021ZD0111404"],"award-info":[{"award-number":["2021ZD0111404"]}]},{"name":"Strategic Research Program of Science and Technology Commission of the Ministry of Education of China","award":["CUC24QT04"],"award-info":[{"award-number":["CUC24QT04"]}]},{"name":"Strategic Research Program of Science and Technology Commission of the Ministry of Education of China","award":["CUC230D016"],"award-info":[{"award-number":["CUC230D016"]}]},{"name":"Strategic Research Program of Science and Technology Commission of the Ministry of Education of China","award":["62172005"],"award-info":[{"award-number":["62172005"]}]},{"name":"Strategic Research Program of Science and Technology Commission of the Ministry of Education of China","award":["2022YFC3302103-01"],"award-info":[{"award-number":["2022YFC3302103-01"]}]},{"name":"Strategic Research Program of Science and Technology Commission of the Ministry of Education of China","award":["JYB2022-01"],"award-info":[{"award-number":["JYB2022-01"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Although the copyright protection schemes supported by blockchain have significantly changed traditional copyright data management, there are still some data security challenges that cannot be ignored, especially the secure access and controllable management of copyright data. Quantum computing attacks also pose a threat to its security. Targeting these issues, we design and propose a blockchain copyright protection scheme based on attribute-based encryption (ABE). In this scheme, the security advantages of blockchain technology are utilized to ensure the authenticity and integrity of copyright data. Based on lattice cryptography and the decision ring learning with errors (R-LWE) problem, a new ABE algorithm that supports searchable ciphertext and policy updates is designed. Then, we introduce it into the blockchain copyright protection scheme, which enables secure access to copyright data and fine-grained control. In addition, the lattice cryptography can strengthen this scheme against quantum attacks. Through security analysis, our scheme can prove to be secure against adaptive chosen keyword attacks, selective chosen plaintext attacks, and adaptive chosen policy attacks in the random oracle model. More importantly, the comparison analysis and experimental results show that our proposed approach has lower computation costs and storage costs. Therefore, our scheme has better security and performance in copyright protection.<\/jats:p>","DOI":"10.3390\/s24144493","type":"journal-article","created":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T15:59:48Z","timestamp":1720713588000},"page":"4493","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Blockchain Copyright Protection Scheme Based on CP-ABE Scheme with Policy Update"],"prefix":"10.3390","volume":"24","author":[{"given":"Jian","family":"Jiang","sequence":"first","affiliation":[{"name":"State Key Laboratory of Media Convergence and Communication, Communication University of China, Beijing 100024, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7202-5264","authenticated-orcid":false,"given":"Yulong","family":"Gao","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Media Convergence and Communication, Communication University of China, Beijing 100024, China"}]},{"given":"Yufei","family":"Gong","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Media Convergence and Communication, Communication University of China, Beijing 100024, China"}]},{"given":"Zhengtao","family":"Jiang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Media Convergence and Communication, Communication University of China, Beijing 100024, China"}]}],"member":"1968","published-online":{"date-parts":[[2024,7,11]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"5531","DOI":"10.1007\/s11042-023-15806-y","article-title":"Digital image and video watermarking: Methodologies, attacks, applications, and future directions","volume":"83","author":"Aberna","year":"2024","journal-title":"Multimed. Tools Appl."},{"key":"ref_2","first-page":"57","article-title":"Blockchain-based copyright management system capable of registering creative ideas","volume":"20","author":"Hwang","year":"2019","journal-title":"J. Internet Comput. Serv."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Lu, Z., Shi, Y., Tao, R., and Zhang, Z. (2019, January 18\u201320). Blockchain for digital rights management of design works. Proceedings of the 2019 IEEE 10th International Conference on Software Engineering and Service Science (ICSESS), Beijing, China.","DOI":"10.1109\/ICSESS47205.2019.9040744"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"746","DOI":"10.1016\/j.future.2018.07.029","article-title":"Blockchain for digital rights management","volume":"89","author":"Ma","year":"2018","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Zhang, X., and Yin, Y. (2019, January 15\u201317). Research on Digital Copyright Management System Based on Blockchain Technology. Proceedings of the 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC), Chengdu, China.","DOI":"10.1109\/ITNEC.2019.8729410"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1016\/j.jnca.2018.10.020","article-title":"A survey on privacy protection in blockchain system","volume":"126","author":"Feng","year":"2019","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"21091","DOI":"10.1109\/ACCESS.2020.2968985","article-title":"Towards Post-Quantum Blockchain: A Review on Blockchain Cryptography Resistant to Quantum Computing Attacks","volume":"8","year":"2020","journal-title":"IEEE Access."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"27205","DOI":"10.1109\/ACCESS.2018.2827203","article-title":"A Secure Cryptocurrency Scheme Based on Post-Quantum Blockchain","volume":"6","author":"Gao","year":"2018","journal-title":"IEEE Access."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1213","DOI":"10.1109\/TEM.2020.2966643","article-title":"Enabling Attribute Revocation for Fine-Grained Access Control in Blockchain-IoT Systems","volume":"67","author":"Yu","year":"2020","journal-title":"IEEE Trans. Eng. Manag."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1049\/iet-ifs.2017.0225","article-title":"Efficient revocable and grantable attribute-based encryption from lattices with fine-grained access control","volume":"12","author":"Wang","year":"2018","journal-title":"IET Inf. Secur."},{"key":"ref_11","first-page":"1019","article-title":"FS-PEKS: Lattice-Based Forward Secure Public-Key Encryption with Keyword Search for Cloud-Assisted Industrial Internet of Things","volume":"18","author":"Zhang","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"109038","DOI":"10.1109\/ACCESS.2019.2928455","article-title":"A Keyword-Searchable ABE Scheme from Lattice in Cloud Storage Environment","volume":"7","author":"Liu","year":"2019","journal-title":"IEEE Access"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1269","DOI":"10.1109\/TDSC.2018.2867462","article-title":"Lattice-Based Public Key Searchable Encryption from Experimental Perspectives","volume":"17","author":"Behnia","year":"2020","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1177\/1550147721999616","article-title":"BCAS: A blockchain-based ciphertext-policy attribute-based encryption scheme for cloud data security sharing","volume":"17","author":"Zuo","year":"2021","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"54840","DOI":"10.1109\/ACCESS.2021.3071031","article-title":"Secure ABE Scheme for Access Management in Blockchain-Based IoT","volume":"9","author":"Zhang","year":"2021","journal-title":"IEEE Access"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"1767","DOI":"10.1109\/JSYST.2017.2667679","article-title":"User Collusion Avoidance CP-ABE with Efficient Attribute Revocation for Cloud Storage","volume":"12","author":"Li","year":"2017","journal-title":"IEEE Syst. J."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"2193","DOI":"10.3233\/JIFS-189318","article-title":"Data security sharing method based on CP-ABE and blockchain","volume":"40","author":"Zhang","year":"2021","journal-title":"J. Intell. Fuzzy Syst."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1109\/TNSM.2022.3185237","article-title":"Blockchain-Assisted Comprehensive Key Management in CP-ABE for Cloud-Stored Data","volume":"20","author":"Liu","year":"2023","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Lyubashevsky, V., Peikert, C., and Regev, O. (June, January 30). On ideal lattices and learning with errors over rings. Proceedings of the Advances in Cryptology\u2013EUROCRYPT 2010: 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Riviera, French.","DOI":"10.1007\/978-3-642-13190-5_1"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3292548","article-title":"Post-quantum lattice-based cryptography implementations: A survey","volume":"51","author":"Nejatollahi","year":"2019","journal-title":"ACM Comput. Surv."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"71","DOI":"10.3390\/iot2010005","article-title":"Post-quantum cryptosystems for Internet-of-Things: A survey on lattice-based algorithms","volume":"2","author":"Asif","year":"2021","journal-title":"IoT"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/MCOM.2018.1700330","article-title":"Securing edge devices in the post-quantum internet of things using lattice-based cryptography","volume":"56","author":"Liu","year":"2018","journal-title":"IEEE Commun. Mag."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/14\/4493\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T15:15:17Z","timestamp":1760109317000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/24\/14\/4493"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,11]]},"references-count":22,"journal-issue":{"issue":"14","published-online":{"date-parts":[[2024,7]]}},"alternative-id":["s24144493"],"URL":"https:\/\/doi.org\/10.3390\/s24144493","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,7,11]]}}}