Pairing-free Proxy Re-Encryption scheme with Equality Test for data security of IoT

被引:1
作者
Han, Gang [1 ,2 ]
Li, Le [1 ]
Qin, Baodong [1 ]
Zheng, Dong [1 ]
机构
[1] Xian Univ Posts & Telecommun, Xian, Peoples R China
[2] Xidian Univ, State Key Lab Integrated Serv Networks, Xian, Peoples R China
关键词
Data recovery; Equality test; Pairing-free; Proxy re-encryption; Secure de-duplication; PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; CLOUD; EFFICIENT;
D O I
10.1016/j.jksuci.2024.102105
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The construction of IoT cloud platform brings great convenience to the storage of massive IoT node data. To ensure security of data collected by the IoT nodes, the data must be encrypted when the nodes upload it. However, it arises some challenge problems, such as efficient retrieval on encrypted data, secure de -duplication and massive data recovery. Proxy Re -Encryption with Equality Test (PREET) can be used to solve these problems. But, existing PREET schemes are based on bilinear pairings, which have low operational efficiency. In order to improve the overall operational efficiency, this paper constructs a Pairing -Free PREET scheme (PF-PREET). Security of this scheme is guaranteed by the Gap Computational Diffie-Hellman assumption in random oracle model. It is demonstrated that the PF-PREET scheme can achieve ciphertext indistinguishability for malicious users and one-wayness for malicious servers. It still has the same security level compared to existing PREET schemes by expanding the scope of the equality test. We discussed the efficiency of the proposed PF-PREET scheme in terms of overall running time, average running time of each phase and time overhead of tag test. The simulated experiment shows a certain improvement compared to PREET schemes using bilinear pairing.
引用
收藏
页数:12
相关论文
共 45 条
[1]   A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain [J].
Agyekum, Kwame Opuni-Boachie Obour ;
Xia, Qi ;
Sifah, Emmanuel Boateng ;
Cobblah, Christian Nii Aflah ;
Xia, Hu ;
Gao, Jianbin .
IEEE SYSTEMS JOURNAL, 2022, 16 (01) :1685-1696
[2]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[3]   Chosen-ciphertext security from identity-based encryption [J].
Boneh, Dan ;
Canetti, Ran ;
Halevi, Shai ;
Katz, Jonathan .
SIAM JOURNAL ON COMPUTING, 2006, 36 (05) :1301-1328
[4]  
Braeken A, 2017, PROCEEDINGS OF 2017 3RD INTERNATIONAL CONFERENCE OF CLOUD COMPUTING TECHNOLOGIES AND APPLICATIONS (CLOUDTECH), P32
[5]  
Canto AC, 2023, Arxiv, DOI arXiv:2305.13544
[6]   A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems [J].
Chen, Biwen ;
He, Debiao ;
Kumar, Neeraj ;
Wang, Huaqun ;
Choo, Kim-Kwang Raymond .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (03) :2048-2059
[7]  
Cintas-Canto A, 2023, Arxiv, DOI arXiv:2306.08178
[8]   Reliable Architectures for Finite Field Multipliers Using Cyclic Codes on FPGA Utilized in Classic and Post-Quantum Cryptography [J].
Cintas-Canto, Alvaro ;
Kermani, Mehran Mozaffari ;
Azarderakhsh, Reza .
IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2023, 31 (01) :157-161
[9]   CRC-Oriented Error Detection Architectures of Post-quantum Cryptography Niederreiter Key Generator on FPGA [J].
Cintas-Canto, Alvaro ;
Mozaffari-Kermani, Mehran ;
Azarderakhsh, Reza ;
Gaj, Kris .
2022 IEEE NORDIC CIRCUITS AND SYSTEMS CONFERENCE (NORCAS), 2022,
[10]   PKE-ET-HS: Public Key Encryption with Equality Test for Heterogeneous Systems in IoT [J].
Elhabob, Rashad ;
Zhao, Yanan ;
Hassan, Alzubair ;
Xiong, Hu .
WIRELESS PERSONAL COMMUNICATIONS, 2020, 113 (01) :313-335