Efficient Identity-Based Broadcast Encryption Scheme on Lattices for the Internet of Things

被引:1
|
作者
He, Kai [1 ]
Liu, Xueqiao [2 ]
Liu, Jia-Nan [3 ]
Liu, Wei [3 ]
机构
[1] Dongguan Univ Technol, Sch Cyberspace Secur, Dongguan 523808, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW 2522, Australia
[3] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
基金
美国国家科学基金会;
关键词
CONSTANT-SIZE CIPHERTEXTS; SECURE; PRIVACY;
D O I
10.1155/2021/2847731
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In an identity-based broadcast encryption (IBBE) scheme, the ciphertext is usually appended with a set of user identities to specify intended recipients. However, as IBBE is adopted in extensive industries, the demand of anonymity for specific scenarios such as military applications is urgent and ought no more to be ignored. On the contrary, how to optimize computation and communication is an unavoidable challenge in the IBBE scheme construction, especially in the large-scaled resource-limited wireless networks such as the Internet of Things (IoT), where the cost of computation and communication should be mitigated as much as possible since other functions including connectivity and privacy should be given the top priority. Thus, we present an IBBE scheme from the lattice, in which we employ the Chinese remainder theorem and lattice basis delegation in fixed dimensions to obtain several desirable characteristics, such as constant-size public parameter, private key, and ciphertext. In addition, our encryption and decryption algorithms are more efficient than broadcast encryption (BE) schemes based on number-theoretic problems. To be noticed, our scheme can simultaneously achieve confidentiality and outsider anonymity against the chosen-plaintext attack under the hardness of the learning with error (LWE) problem.
引用
收藏
页数:11
相关论文
共 50 条
  • [1] A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
    Unal, Devrim
    Al-Ali, Abdulla
    Catak, Ferhat Ozgur
    Hammoudeh, Mohammad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 : 433 - 445
  • [2] An Efficient Identity-Based Broadcast Encryption Scheme Based on SM9
    Lai J.-C.
    Huang X.-Y.
    He D.-B.
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (05): : 897 - 907
  • [3] A Novel Hierarchical Identity-Based Encryption Scheme from Lattices
    Ye, Qing
    Hu, Mingxing
    Gao, Wei
    Tang, Yongli
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 412 - 422
  • [4] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257
  • [5] An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks
    Kim, Intae
    Hwang, SeongOun
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (03) : 891 - 895
  • [6] LMIBE: Lattice-Based Matchmaking Identity-Based Encryption for Internet of Things
    Tao, Xufeng
    Qiang, Yan
    Wang, Peng
    Wang, Yingsen
    IEEE ACCESS, 2023, 11 : 9851 - 9858
  • [7] Efficient identity-based broadcast signcryption schemes
    Kim, Intae
    Hwang, Seong Oun
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 914 - 925
  • [8] Privacy-preserving identity-based broadcast encryption
    Hur, Junbeom
    Park, Chanil
    Hwang, Seong Oun
    INFORMATION FUSION, 2012, 13 (04) : 296 - 303
  • [9] Identity-based broadcast encryption with continuous leakage resilience
    Li, Jiguo
    Yu, Qihong
    Zhang, Yichen
    INFORMATION SCIENCES, 2018, 429 : 177 - 193
  • [10] New Identity-based Threshold Broadcast Encryption for Ad Hoc Networks
    Zhang, Leyou
    Hu, Yupu
    Tian, Xu'an
    2010 6TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS NETWORKING AND MOBILE COMPUTING (WICOM), 2010,