Dynamic identity-based broadcast proxy re-encryption for data sharing in autonomous vehicles

被引:1
|
作者
Zhou, Yuanjian [1 ]
Cao, Zhenfu [1 ,2 ]
Dong, Xiaolei [1 ]
机构
[1] East China Normal Univ, Software Engn Inst, 3663 North Zhongshan Rd, Shanghai 200062, Peoples R China
[2] Zhejiang Lab, Res Inst Basic Theories, Res Ctr Basic Theories Intelligent Comp, Hangzhou, Peoples R China
基金
中国国家自然科学基金; 上海市自然科学基金;
关键词
D O I
10.1002/ett.4801
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Autonomous vehicles (AVs), as the essential part of intelligent autonomous transportation system, improves vehicle communication efficiency and supports diverse kinds of social services. However, with the development of AVs, more data has been generated by the sensors about the road, traffic, street light, and weather conditions. This also inevitably bringing new security problems, such as secure data sharing. Although the identity-based broadcast proxy re-encryption (IBBPRE) can be used to realize one-to-many data sharing, most existing schemes require access to the data owner for the group shared key update phases since the data owner's private key is mandatory for the group shared key generation. Therefore, frequent interaction with the data owner increases the operational burden and risks leaking the data owner's private key. Thus, we design a dynamic identity-based broadcast proxy re-encryption (DIB-BPRE) to solve the problem of re-encryption update. In the proposed scheme, a vehicle cloud server directly revokes or adds a group of data receivers, designated by the data owner, from the re-encryption key. Finally, the theoretical and experimental analyses demonstrate that the DIB-BPRE scheme is efficient, and it is suitable for data sharing in AVs.
引用
收藏
页数:20
相关论文
共 50 条
  • [31] Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model
    Jiang Mingming
    Guo Yuyan
    Yu Lei
    Song Wangan
    Wei Shimin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (01) : 61 - 66
  • [32] On the security of two identity-based conditional proxy re-encryption schemes
    He, Kai
    Weng, Jian
    Deng, Robert H.
    Liu, Joseph K.
    THEORETICAL COMPUTER SCIENCE, 2016, 652 : 18 - 27
  • [33] Identity-based Conditional Proxy Re-Encryption Without Random Oracles
    Qiu, JunJie
    Lee, YoungSil
    Lee, HoonJae
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 349 - 353
  • [34] A Novel Revocable and Identity-Based Conditional Proxy Re-Encryption Scheme With Ciphertext Evolution for Secure Cloud Data Sharing
    Yao, Shimao
    Dayot, Ralph Voltaire J.
    Kim, Hyung-Jin
    Ra, In-Ho
    IEEE ACCESS, 2021, 9 : 42801 - 42816
  • [35] HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
    Ren, Yanli
    Gu, Dawu
    Wang, Shuozhong
    Zhang, Xinpengu
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2010, 21 (06) : 1049 - 1063
  • [36] Identity-based conditional proxy re-encryption with fine grain policy
    Ge, Chunpeng
    Susilo, Willy
    Wang, Jiandong
    Fang, Liming
    COMPUTER STANDARDS & INTERFACES, 2017, 52 : 1 - 9
  • [37] Data Sharing Scheme of Smart Grid Based on Identity Condition Proxy Re-Encryption
    Zhang, Lihua
    Yang, Qianqian
    Yang, Yi
    Chen, Shihong
    Gu, Jinguang
    ELECTRONICS, 2024, 13 (01)
  • [38] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
    Luo, Wei
    Ma, Wenping
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530
  • [39] New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks
    Wang, Lihua
    Wang, Licheng
    Mambo, Masahiro
    Okamoto, Eiji
    PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 327 - +
  • [40] Identity-based re-encryption scheme with lightweight re-encryption key generation
    Liu, Liang
    Ye, Jun
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 21 (01) : 41 - 57