Blockchain-Aided Privacy-Preserving Outsourcing Algorithms of Bilinear Pairings for Internet of Things Devices

被引:21
作者
Zhang, Hanlin [1 ,2 ]
Tong, Le [1 ]
Yu, Jia [1 ]
Lin, Jie [3 ]
机构
[1] Qingdao Univ, Sch Comp Sci & Technol, Qingdao 266071, Peoples R China
[2] Qingdao Univ, Business Sch, Qingdao 266071, Peoples R China
[3] Xi An Jiao Tong Univ, Sch Elect & Informat Engn, Xian 710049, Peoples R China
来源
IEEE INTERNET OF THINGS JOURNAL | 2021年 / 8卷 / 20期
基金
中国国家自然科学基金;
关键词
Outsourcing; Cloud computing; Servers; Elliptic curves; Internet of Things; Task analysis; Cryptography; Bilinear pairings; blockchain; cloud computing; SECURE; CLOUD; COMPUTATION; DELEGATION;
D O I
10.1109/JIOT.2021.3073500
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bilinear pairing is a fundamental operation that is widely used in cryptographic algorithms (e.g., identity-based cryptographic algorithms) to secure IoT applications. Nonetheless, the time complexity of bilinear pairing is O(n(3)), making it a very time-consuming operation, especially for resource-constrained IoT devices. Secure outsourcing of bilinear pairing has been studied in recent years to enable computationally weak devices to securely outsource the bilinear pairing to untrustworthy cloud servers. However, the state-of-art algorithms often require to precompute and store some values, which results in storage burden for devices. In the Internet of Things, devices are generally with very limited storage capacity. Thus, the existing algorithms do not fit the IoT well. In this article, we propose a secure outsourcing algorithm of bilinear pairings, which does not require precomputations. In the proposed algorithm, the outsourcer side's efficiency is significantly improved compared with executing the original bilinear pairing operation. At the same time, the privacy of the input and output is ensured. Also, we apply the Ethereum blockchain in our outsourcing algorithm to enable fair payments, which ensures that the cloud server gets paid only when he correctly accomplished the outsourced work. The theoretical analysis and experimental results show that the proposed algorithm is efficient and secure.
引用
收藏
页码:15596 / 15607
页数:12
相关论文
共 40 条
  • [1] [Anonymous], 2011, IACRCryptol. ePrint Arch.
  • [2] A View of Cloud Computing
    Armbrust, Michael
    Fox, Armando
    Griffith, Rean
    Joseph, Anthony D.
    Katz, Randy
    Konwinski, Andy
    Lee, Gunho
    Patterson, David
    Rabkin, Ariel
    Stoica, Ion
    Zaharia, Matei
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (04) : 50 - 58
  • [3] Atallah M.J., 2010, Proc. ACM Symp. on Information, P48, DOI DOI 10.1145/1755688.1755695
  • [4] Brakerski Z., 2014, ACM Trans. on Com. T, V6, P13
  • [5] Canard Sebastien, 2013, Information and Communications Security. 15th International Conference, ICICS 2013. Proceedings: LNCS 8233, P373, DOI 10.1007/978-3-319-02726-5_27
  • [6] Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2014, 74 (03) : 2141 - 2151
  • [7] Efficient algorithms for secure outsourcing of bilinear pairings
    Chen, Xiaofeng
    Susilo, Willy
    Li, Jin
    Wong, Duncan S.
    Ma, Jianfeng
    Tang, Shaohua
    Tang, Qiang
    [J]. THEORETICAL COMPUTER SCIENCE, 2015, 562 : 112 - 121
  • [8] New Algorithms for Secure Outsourcing of Modular Exponentiations
    Chen, Xiaofeng
    Li, Jin
    Ma, Jianfeng
    Tang, Qiang
    Lou, Wenjing
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (09) : 2386 - 2396
  • [9] Chevallier-Mames B, 2010, LECT NOTES COMPUT SC, V6035, P24, DOI 10.1007/978-3-642-12510-2_3
  • [10] Blockchains and Smart Contracts for the Internet of Things
    Christidis, Konstantinos
    Devetsikiotis, Michael
    [J]. IEEE ACCESS, 2016, 4 : 2292 - 2303