A Multi-Conditional Proxy Broadcast Re-Encryption Scheme for Sensor Networks

被引:3
作者
Li, Pang [1 ]
Zhu, Lifeng [2 ]
Gupta, Brij B. [3 ,4 ]
Jha, Sunil Kumar [5 ]
机构
[1] Nanjing Vocat Coll Informat Technol, Nanjing 210044, Peoples R China
[2] Southeast Univ, Sch Instrument Sci & Engn, State Key Lab Bioelect, Jiangsu Key Lab Remote Measurement & Control, Nanjing 210096, Peoples R China
[3] Natl Inst Technol, Dept Comp Engn, Kurukshetra 136119, Haryana, India
[4] Asia Univ, Dept Comp Sci & Informat Engn, Taichung 41449, Taiwan
[5] Univ Informat Technol & Management Rzeszow, IT Fundamentals & Educ Technol Applicat, PL-100031 Rzeszow Voivodeship, Poland
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2020年 / 65卷 / 03期
关键词
Proxy re-encryption; sensor network security; broadcast re-encryption;
D O I
10.32604/cmc.2020.013696
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In sensor networks, it is a challenge to ensure the security of data exchange between packet switching nodes holding different private keys. In order to solve this problem, the present study proposes a scheme called multi-conditional proxy broadcast re encryption (MC-PBRE). The scheme consists of the following roles: the source node, proxy server, and the target node. If the condition is met, the proxy can convert the encrypted data of the source node into data that the target node can directly decrypt. It allows the proxy server to convert the ciphertext of the source node to a new ciphertext of the target node in a different group, while the proxy server does not need to store the key or reveal the plaintext. At the same time, the proxy server cannot obtain any valuable information in the ciphertext. This paper formalizes the concept of MC-PBRE and its security model, and proposes a MC-PBRE scheme of ciphertext security. Finally, the scheme security has been proved in the random oracle.
引用
收藏
页码:2079 / 2090
页数:12
相关论文
共 15 条
  • [1] Ammar H., 2015, INT J DISTRIB SENS N, V11
  • [2] Towards a secure incremental proxy re-encryption for e-healthcare data sharing in mobile cloud computing
    Bhatia, Tarunpreet
    Verma, A. K.
    Sharma, Gaurav
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (05)
  • [3] Chu CK, 2009, LECT NOTES COMPUT SC, V5594, P327
  • [4] PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks
    Huang, Qinlong
    Yang, Yixian
    Fu, Jingyi
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 : 1523 - 1533
  • [5] Localization Based Evolutionary Routing (LOBER) for Efficient Aggregation in Wireless Multimedia Sensor Networks
    Janarthanan, Ashwinth
    Kumar, Dhananjay
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2019, 60 (03): : 895 - 912
  • [6] IoT device security based on proxy re-encryption
    Kim, SuHyun
    Lee, ImYeong
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1267 - 1273
  • [7] Kumar SVN, 2017, PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), P187, DOI 10.1109/ISS1.2017.8389395
  • [8] Lightweight and practical node clustering authentication protocol for hierarchical wireless sensor networks
    Liu, Dengzhi
    Shen, Jian
    Wang, Anxi
    Wang, Chen
    [J]. INTERNATIONAL JOURNAL OF SENSOR NETWORKS, 2018, 27 (02) : 95 - 102
  • [9] A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system
    Liu, Yepeng
    Ren, Yongjun
    Ge, Chunpeng
    Xia, Jinyue
    Wang, Qirun
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 125 - 131
  • [10] Ren Y., 2019, 12 EAI INT C MOB MUL