Pairing-Free Certificate-Based Searchable Encryption Supporting Privacy-Preserving Keyword Search Function for IIoTs

被引:64
作者
Lu, Yang [1 ]
Li, Jiguo [2 ]
Wang, Fen [1 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing 210023, Jiangsu, Peoples R China
[2] Fujian Normal Univ, Coll Math & Informat, Fuzhou 350117, Fujian, Peoples R China
关键词
Bilinear pairing; certificate-based encryption; cloud computing; industrial IoT (IIoT); keyword search; privacy; PUBLIC-KEY ENCRYPTION; INDUSTRIAL INTERNET; GUESSING ATTACKS; EFFICIENT; SCHEME;
D O I
10.1109/TII.2020.3006474
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As a practical application of the Internet of Things (IoT) in the modern industry, industrial IoT (IIoT) enables industrial enterprises to accelerate the development. Nowadays, the cloud computing technology has been applied to data storage and processing in IIoTs, but how to protect data privacy in the cloud has become a challenge and technical issue. Recently, the certificate-based encryption with keyword search (CBEKS) was presented to handle the cloud ciphertext retrieval. By CBEKS, one can get back all desired ciphertexts from the cloud without decrypting the ciphertexts or leaking the search keywords. However, the existing CBEKS scheme uses the computationally expensive bilinear pairing, which is disgusted by the performance-limited IIoT smart devices. In this article, a pairing-free and privacy-preserving CBEKS scheme is developed. The experimental results show that it has an obvious advantage in the computation performance when compared with the pairing-based CBEKS scheme. In addition, our security proofs indicate that it is secure against keyword guessing attacks.
引用
收藏
页码:2696 / 2706
页数:11
相关论文
共 34 条
[1]  
Abdalla M, 2005, LECT NOTES COMPUT SC, V3621, P205
[2]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]  
[Anonymous], 2012, MIRACL CRYPT SDK MUL
[4]  
[Anonymous], 1984, Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science, DOI DOI 10.1007/3-540-39568-7
[5]  
Ashton K., 2009, RFID J, V22, P97
[6]  
Baek J, 2008, LECT NOTES COMPUT SC, V5072, P1249, DOI 10.1007/978-3-540-69839-5_96
[7]  
Bellare M., 1993, 1 ACM C COMP COMM SE, P62
[8]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[9]  
Gentry C, 2003, LECT NOTES COMPUT SC, V2656, P272
[10]   Certificateless Public Key Authenticated Encryption With Keyword Search or Industrial Internet of Things [J].
He, Debiao ;
Ma, Mimi ;
Zeadally, Sherali ;
Kumar, Neeraj ;
Liang, Kaitai .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (08) :3618-3627