REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT

被引:1
|
作者
Li, Cui [1 ,2 ]
Chen, Rongmao [1 ]
Wang, Yi [1 ]
Xing, Qianqian [1 ]
Wang, Baosheng [1 ]
机构
[1] Natl Univ Def Technol, Sch Comp, Changsha 410073, Peoples R China
[2] Natl Univ Def Technol, Sch Informat & Commun, Xian 710106, Peoples R China
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Encryption; Public key; Protocols; Performance evaluation; Scalability; Receivers; Proxy re-encryption; conditional proxy re-encryption; decryption rights revocation; publish subscribe paradigm; internet of Things; PROXY RE-ENCRYPTION; BROADCAST ENCRYPTION; CIPHERTEXTS;
D O I
10.1109/TDSC.2024.3353811
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
To address the confidentiality concerns of malicious adversaries that fully compromise the message broker in pub/sub based IoT systems, several researchers use proxy re-encryption (PRE) to realize end-to-end encrypted message distribution (from publisher to subscriber). However, the all-or-nothing share feature of PRE poses a problem that the share cannot be efficiently revoked. The only way for publishers to revoke the access rights of subscribers is to pick a new public-private key pair and re-generate the re-encryption keys for all the remaining subscribers, which hampers the scalability in practice. To realize efficient user revocation, we present REEDS, an efficient revocable end-to-end encrypted message distribution system for IoT. The core of REEDS is a novel proxy-aided identity-based conditional proxy re-encryption (PIB-CPRE) scheme. Essentially, we use a binary-tree structure to organize re-encryption keys, so that the update of re-encryption keys is reduced from linear to logarithmic in the number of subscribers. We show that REEDS satisfies confidentiality, efficient immediate revocation, decentralized authorization, and maintains low overhead for publishers and subscribers. The prototype system is implemented and its performance is evaluated. The results show that REEDS is not only easy to deploy over existing message brokers but also highly efficient.
引用
收藏
页码:4526 / 4542
页数:17
相关论文
共 50 条
  • [31] SEEMless: Secure End-to-End Encrypted Messaging with less Trust
    Chase, Melissa
    Deshpande, Apoorvaa
    Ghosh, Esha
    Malvai, Harjasleen
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 1639 - 1656
  • [32] An implementation for secure data deduplication on end-to-end encrypted documents
    Jipianu, Tora-Mihnea
    Aciobanitei, Iulian
    18TH INTERNATIONAL SYMPOSIUM ON APPLIED COMPUTATIONAL INTELLIGENCE AND INFORMATICS, SACI 2024, 2024, : 303 - 307
  • [33] An efficient end-to-end feature based system for SAR ATR
    Pham, QH
    Brosnan, TM
    Smith, MJT
    Mersereau, RM
    ALGORITHMS FOR SYNTHETIC APERTURE RADAR IMAGERY V, 1998, 3370 : 519 - 529
  • [34] mReFinED: An Efficient End-to-End Multilingual Entity Linking System
    Limkonchotiwati, Peerat
    Cheng, Weiwei
    Christodoulopoulos, Christos
    Saffari, Amir
    Lehmann, Jens
    FINDINGS OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (EMNLP 2023), 2023, : 15080 - 15089
  • [35] Towards an Improved Energy Efficient and End-to-End Secure Protocol for IoT Healthcare Applications
    Ahmad, Arshad
    Ullah, Ayaz
    Feng, Chong
    Khan, Muzammil
    Ashraf, Shahzad
    Adnan, Muhammad
    Nazir, Shah
    Khan, Habib Ullah
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [36] Resilient End-to-End Message Protection for Cyber-Physical System Communications
    Kim, Youngjin
    Kolesnikov, Vladimir
    Thottan, Marina
    IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (04) : 2478 - 2487
  • [37] A Triggering Mechanism for End-to-end IoT eHealth System with Connected Ambulance Vehicles
    Elsaadany, Amr
    Sedky, Amr
    Elkholy, Noor
    2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS & APPLICATIONS (IISA), 2017, : 126 - 131
  • [38] An End-to-End Encrypted Domain Proximity Recommendation System Using Secret Sharing Homomorphic Cryptography
    Shieh, Jyh-Ren
    49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2015, : 198 - 203
  • [39] PICADOR: End-to-end encrypted Publish-Subscribe information distribution with proxy re-encryption
    Borcea, Cristian
    Gupta, Arnab Deb
    Polyakov, Yuriy
    Rohloff, Kurt
    Ryan, Gerard
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 71 : 177 - 191
  • [40] END-TO-END ENERGY EFFICIENT COMMUNICATION
    Dittmann, Lars
    PROCEEDINGS OF 2011 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY AND APPLICATION, ICCTA2011, 2011, : 323 - 327