Dynamic identity-based broadcast proxy re-encryption for data sharing in autonomous vehicles

被引:1
|
作者
Zhou, Yuanjian [1 ]
Cao, Zhenfu [1 ,2 ]
Dong, Xiaolei [1 ]
机构
[1] East China Normal Univ, Software Engn Inst, 3663 North Zhongshan Rd, Shanghai 200062, Peoples R China
[2] Zhejiang Lab, Res Inst Basic Theories, Res Ctr Basic Theories Intelligent Comp, Hangzhou, Peoples R China
基金
中国国家自然科学基金; 上海市自然科学基金;
关键词
D O I
10.1002/ett.4801
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Autonomous vehicles (AVs), as the essential part of intelligent autonomous transportation system, improves vehicle communication efficiency and supports diverse kinds of social services. However, with the development of AVs, more data has been generated by the sensors about the road, traffic, street light, and weather conditions. This also inevitably bringing new security problems, such as secure data sharing. Although the identity-based broadcast proxy re-encryption (IBBPRE) can be used to realize one-to-many data sharing, most existing schemes require access to the data owner for the group shared key update phases since the data owner's private key is mandatory for the group shared key generation. Therefore, frequent interaction with the data owner increases the operational burden and risks leaking the data owner's private key. Thus, we design a dynamic identity-based broadcast proxy re-encryption (DIB-BPRE) to solve the problem of re-encryption update. In the proposed scheme, a vehicle cloud server directly revokes or adds a group of data receivers, designated by the data owner, from the re-encryption key. Finally, the theoretical and experimental analyses demonstrate that the DIB-BPRE scheme is efficient, and it is suitable for data sharing in AVs.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] P2B: Privacy Preserving Identity-Based Broadcast Proxy Re-Encryption
    Maiti, Sumana
    Misra, Sudip
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (05) : 5610 - 5617
  • [22] Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage
    Jiang, Linmei
    Guo, Donghui
    IEEE ACCESS, 2017, 5 : 13336 - 13345
  • [23] Identity Based Broadcast Encryption Based on One to Many Identity Based Proxy Re-encryption
    Wang, Xu An
    Yang, Xiaoyuan
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, : 47 - 50
  • [24] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    赖俊祚
    朱文涛
    邓慧杰
    刘胜利
    寇卫东
    JournalofComputerScience&Technology, 2010, 25 (04) : 793 - 806
  • [25] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    Jun-Zuo Lai
    Wen-Tao Zhu
    Robert H. Deng
    Sheng-Li Liu
    Wei-Dong Kou
    Journal of Computer Science and Technology, 2010, 25 : 793 - 806
  • [26] Identity-based proxy re-encryption without random oracles
    Chu, Cheng-Kang
    Tzeng, Wen-Guey
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 189 - +
  • [27] Identity-based multi-condition proxy re-encryption
    Wang, Pingshu
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 1047 - 1052
  • [28] An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing
    Liang, Kaitai
    Liu, Joseph K.
    Wong, Duncan S.
    Susilo, Willy
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 257 - 272
  • [29] Identity-Based Proxy Re-encryption Based on SM9
    Liu, Hang
    Ming, Yang
    Wang, Chenhao
    Zhao, Yi
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 320 - 339
  • [30] Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    Shao, Jun
    Cao, Zhenfu
    INFORMATION SCIENCES, 2012, 206 : 83 - 95