SLIM: A Secure and Lightweight Multi-Authority Attribute-Based Signcryption Scheme for IoT

被引:8
作者
Gong, Bei [1 ]
Guo, Chong [2 ,3 ]
Guo, Chong [2 ,3 ]
Guo, Chen [4 ]
Sun, Yao [5 ]
Waqas, Muhammad [6 ]
Chen, Sheng [7 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing Key Lab Trusted Comp, Beijing 100124, Peoples R China
[2] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[3] Beijing Trusty Cloud Technol Co Ltd, Beijing 100022, Peoples R China
[4] China Cybersecur Review Technol & Certificat Ctr, Beijing 100011, Peoples R China
[5] Univ Glasgow, James Watt Sch Engn, Glasgow City G12 8QQ, Scotland
[6] Univ Greenwich, Fac Engn & Sci, Sch Comp & Math Sci, London SE10 9LS, England
[7] Univ Southampton, Sch Elect & Comp Sci, Southampton SO17 1BJ, England
关键词
Attribute-based signcryption; multi-authority; outsourced computation; constant-size ciphertext; access control; PERSONAL HEALTH RECORDS; SIGNATURE;
D O I
10.1109/TIFS.2023.3331566
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Although attribute-based signcryption (ABSC) offers a promising technology to ensure the security of IoT data sharing, it faces a two-fold challenge in practical implementation, namely, the linearly increasing computation and communication costs and the heavy load of single authority based key management. To this end, we propose a Secure and Lightweight Multi-authority ABSC scheme called SLIM in this paper. The signcryption and de-signcryption costs of devices are reduced to a small constant by offloading most of the computation to the edge server. To minimize communication and storage costs, a short and constant-size ciphertext is designed. Moreover, we adopt a hierarchical multi-authority architecture, setting up multiple attribute authorities that manage keys independently to prevent the bottleneck. Rigorous security analysis proves that the SLIM scheme can resist adaptive chosen ciphertext attacks and adaptive chosen message attacks under the standard model. Simulation experiments demonstrate the correctness of our theoretical derivations and the cost reduction of the SLIM scheme in computation, communication and storage.
引用
收藏
页码:1299 / 1312
页数:14
相关论文
共 28 条
  • [1] Charm: a framework for rapidly prototyping cryptosystems
    Akinyele, Joseph A.
    Garman, Christina
    Miers, Ian
    Pagano, Matthew W.
    Rushanan, Michael
    Green, Matthew
    Rubin, Aviel D.
    [J]. JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) : 111 - 128
  • [2] A Multi-Authority Attribute-Based Signcryption Scheme with Efficient Revocation for Smart Grid Downlink Communication
    Alsharif, Ahmad
    Shafee, Ahmed
    Nabil, Mahmoud
    Mahmoud, Mohamed
    Alasmary, Waleed
    [J]. 2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2019, : 1025 - 1032
  • [3] [Anonymous], 2017, P 14 INT C SEC CRYPT
  • [4] Attrapadung N, 2009, LECT NOTES COMPUT SC, V5536, P168, DOI 10.1007/978-3-642-01957-9_11
  • [5] A Survey on IoT Big Data: Current Status, 13 V's Challenges, and Future Directions
    Bansal, Maggi
    Chana, Inderveer
    Clarke, Siobhan
    [J]. ACM COMPUTING SURVEYS, 2021, 53 (06)
  • [6] Beimel A., 1996, SECURE SCHEMES SECRE
  • [7] PROUD: Verifiable Privacy-preserving Outsourced Attribute Based SignCryption supporting access policy Update for cloud assisted IoT applications
    Belguith, Sana
    Kaaniche, Nesrine
    Hammoudeh, Mohammad
    Dargahi, Tooska
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 111 : 899 - 918
  • [8] Chandanapriya G., 2016, INT C COMM EL SYST I, P1
  • [9] Changji Wang, 2011, Proceedings of the 2011 Seventh International Conference on Computational Intelligence and Security (CIS 2011), P905, DOI 10.1109/CIS.2011.204
  • [10] Chase M, 2007, LECT NOTES COMPUT SC, V4392, P515