REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT

被引:1
|
作者
Li, Cui [1 ,2 ]
Chen, Rongmao [1 ]
Wang, Yi [1 ]
Xing, Qianqian [1 ]
Wang, Baosheng [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Peoples R China
[2] Natl Univ Def Technol, Sch Informat & Commun, Xian 710106, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Encryption; Public key; Protocols; Performance evaluation; Scalability; Receivers; Proxy re-encryption; conditional proxy re-encryption; decryption rights revocation; publish subscribe paradigm; internet of Things; PROXY RE-ENCRYPTION; BROADCAST ENCRYPTION; CIPHERTEXTS;
D O I
10.1109/TDSC.2024.3353811
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To address the confidentiality concerns of malicious adversaries that fully compromise the message broker in pub/sub based IoT systems, several researchers use proxy re-encryption (PRE) to realize end-to-end encrypted message distribution (from publisher to subscriber). However, the all-or-nothing share feature of PRE poses a problem that the share cannot be efficiently revoked. The only way for publishers to revoke the access rights of subscribers is to pick a new public-private key pair and re-generate the re-encryption keys for all the remaining subscribers, which hampers the scalability in practice. To realize efficient user revocation, we present REEDS, an efficient revocable end-to-end encrypted message distribution system for IoT. The core of REEDS is a novel proxy-aided identity-based conditional proxy re-encryption (PIB-CPRE) scheme. Essentially, we use a binary-tree structure to organize re-encryption keys, so that the update of re-encryption keys is reduced from linear to logarithmic in the number of subscribers. We show that REEDS satisfies confidentiality, efficient immediate revocation, decentralized authorization, and maintains low overhead for publishers and subscribers. The prototype system is implemented and its performance is evaluated. The results show that REEDS is not only easy to deploy over existing message brokers but also highly efficient.
引用
收藏
页码:4526 / 4542
页数:17
相关论文
共 50 条
  • [1] FSEE: A Forward Secure End-to-End Encrypted Message Transmission System for IoT
    Cui, Li
    Xing Qianqian
    Yi, Wang
    Wang Baosheng
    Jing, Tao
    Liu, Liu
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [2] End-to-End Encrypted Message Distribution System for the Internet of Things Based on Conditional Proxy Re-Encryption
    Lin, Shi
    Cui, Li
    Ke, Niu
    SENSORS, 2024, 24 (02)
  • [3] Voice End-to-End Encrypted for TETRA Radiocommunication System
    Buric, Marian
    PROCEEDINGS OF THE 2010 8TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2010, : 419 - 422
  • [4] End-to-End Message Authentication Using CoAP Over IoT
    Singhal, Prateek
    Sharma, Puneet
    Hazela, Bramah
    INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING AND COMMUNICATIONS, VOL 1, 2019, 55 : 279 - 288
  • [5] Traceback for End-to-End Encrypted Messaging
    Tyagi, Nirvan
    Miers, Ian
    Ristenpart, Thomas
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 413 - 430
  • [6] End-to-End Encrypted Cloud Storage
    Backendal, Matilda
    Haller, Miro
    Paterson, Kenny
    IEEE SECURITY & PRIVACY, 2024, 22 (02) : 69 - 74
  • [7] Kaala: Scalable, End-to-End, IoT System Simulator
    Dayalan, Udhaya Kumar
    Fezeu, Rostand A. K.
    Salo, Timothy J.
    Zhang, Zhi-Li
    PROCEEDINGS OF THE ACM SIGCOMM 2022 WORKSHOP ON NETWORKED SENSING SYSTEMS FOR A SUSTAINABLE SOCIETY, NET4US 2022, 2022, : 33 - 38
  • [8] DISTRIBUTION OF END-TO-END DELAY IN MESSAGE-SWITCHED NETWORKS
    WONG, JW
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1978, 2 (01): : 44 - 49
  • [9] End-to-End Security for the IoT
    Dooley, James
    INTELLIGENT ENVIRONMENTS 2016, 2016, 21 : 606 - 606
  • [10] Inspecting End-to-End Encrypted Communication Differentially for the Efficient Identification of Harmful Media
    Zheng, Tengfei
    Zhou, Tongqing
    Lu, Kai
    Cai, Zhiping
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 5772 - 5787