Revocable and Unbounded Attribute-Based Encryption Scheme With Adaptive Security for Integrating Digital Twins in Internet of Things

被引:17
作者
Xiong, Hu [1 ]
Qu, Zheng [1 ]
Huang, Xin [1 ]
Yeh, Kuo-Hui [2 ,3 ]
机构
[1] Univ Elect Sci & Technol China, Sch Informat & Software Engn, Network & Data Secur Key Lab Sichuan Prov, Chengdu 610054, Peoples R China
[2] Natl Dong Hwa Univ, Dept Informat Management, Hualien 974301, Taiwan
[3] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 804201, Taiwan
关键词
IoT; digital twins; revocable attribute-based encryption; arithmetic span program; CIPHERTEXTS; REVOCATION; BROADCAST;
D O I
10.1109/JSAC.2023.3310076
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Internet of Things (IoTs) has been a burgeoning field that transforms the ubiquitous objects to interconnected devices and intelligent system. Today, with the emerging of innovative technologies such as cloud computing, the IoT sector is in a race to leverage these novel technologies to achieve optimal performance. Naturally the Digital Twins (DTs) architecture acts as an indispensable intermediary bridge to couple the IoT domain with these lastest technologies together. However, a tremendous obstacle is that the current Revocable Attribute-Based Encryption (RABE) schemes applied in the DTs paradigm fail to balance the efficiency, security and scalability simultaneously. In this paper, we tackle this challenge by presenting an unbounded and efficient direct RABE scheme with adaptive security. Compared with the previous schemes in this domain, our approach achieves revocable and fine-grained access control efficiently by employing the arithmetic span program (ASP) as the access structure. In this way, the expensive bilinear pairing and exponentiation operations are reduced significantly. Moreover, the unbounded property is satisfied in our scheme since the parameters are not required to be predefined in the setup phase. At last, with the support of the Matrix Decisional Diffie-Hellman (MDDH) assumption, the proposed scheme is proved to achieve adaptive security by adopting dual system encryption methodology. Theoretical comparison and implementation results demonstrate our proposed scheme possesses prominent practicability, scalability and efficiency.
引用
收藏
页码:3306 / 3317
页数:12
相关论文
共 39 条
[1]  
Attrapadung N, 2014, LECT NOTES COMPUT SC, V8441, P557, DOI 10.1007/978-3-642-55220-5_31
[2]  
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[3]   The Internet of Things: A survey [J].
Atzori, Luigi ;
Iera, Antonio ;
Morabito, Giacomo .
COMPUTER NETWORKS, 2010, 54 (15) :2787-2805
[4]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[5]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[6]   On the Internet of Medical Things [J].
Cerf, Vinton G. .
COMMUNICATIONS OF THE ACM, 2020, 63 (08) :5-5
[7]  
Chen C, 2011, LECT NOTES COMPUT SC, V6980, P84, DOI 10.1007/978-3-642-24316-5_8
[8]   Unbounded ABE via Bilinear Entropy Expansion, Revisited [J].
Chen, Jie ;
Gong, Junqing ;
Kowalczyk, Lucas ;
Wee, Hoeteck .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT I, 2018, 10820 :503-534
[9]   Improved Dual System ABE in Prime-Order Groups via Predicate Encodings [J].
Chen, Jie ;
Gay, Romain ;
Wee, Hoeteck .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 :595-624
[10]  
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456