A provably secure signcryption with proxy re-encryption for smart water grid network

被引:0
|
作者
Patil R.Y. [1 ]
Patil Y.H. [2 ]
机构
[1] Pimpri Chinchwad College of Engineering, Maharashtr, Pune
[2] IME Division, VBK Infra and Engineering Projects
来源
Int. J. Secur. Netw. | 2022年 / 4卷 / 231-239期
关键词
AVISPA; identity based cryptography; PRE; proxy re-encryption; signcryption; smart water grid; SWG;
D O I
10.1504/ijsn.2022.127151
中图分类号
学科分类号
摘要
Smart water grid (SWG) uses smart water metering systems that regularly gathers consumers’ water consumption records and sends it to the water supply department. The communication of such information is the cause of concern for data privacy. In this work, we proposed an identity based signcryption with proxy re-encryption for smart water grid (IDSC-PRE-SWG). A proxy located at the cloud is responsible for re-encrypting the signcrypted ciphertext message. Our approach permits the authorised user to decode the ciphertext along with validating the message’s source and authenticity. We also demonstrated that our system can be used to safeguard the security of data stored in cloud. The comparison of computational costs in terms of time in milliseconds for each phase of the IDSC-PRE schemes shows that, the proposed approach outperforms the alternative schemes. The simulation study performed with AVISPA tool indicates that IDSC-PRE-SWG is safe in OFMC and CL-Atse backends. Copyright © 2022 Inderscience Enterprises Ltd.
引用
收藏
页码:231 / 239
页数:8
相关论文
共 50 条
  • [21] A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU
    Yang, Nan
    Tian, Youliang
    Zhou, Zhou
    Zhang, Qijia
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [22] Strong Post-Compromise Secure Proxy Re-Encryption
    Davidson, Alex
    Deo, Amit
    Lee, Ela
    Martin, Keith
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 58 - 77
  • [23] SEMPRE: SECURE MULTICAST ARCHITECTURE USING PROXY RE-ENCRYPTION
    Chiu, Yun-Peng
    Huang, Chun-Ying
    Lei, Chin-Laung
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (7A): : 4719 - 4748
  • [24] Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
    Hanaoka, Goichiro
    Kawai, Yutaka
    Kunihiro, Noboru
    Matsuda, Takahiro
    Weng, Jian
    Zhang, Rui
    Zhao, Yunlei
    TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 349 - +
  • [25] Unidirectional chosen-ciphertext secure proxy re-encryption
    Libert, Benoit
    Vergnaud, Damien
    PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 360 - +
  • [26] Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
    Sur, Chul
    Jung, Chae Duk
    Park, Youngho
    Rhee, Kyung Hyune
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2010, 6109 : 214 - +
  • [27] Secure and Efficient IBE-PKE Proxy Re-Encryption
    Mizuno, Takeo
    Doi, Hiroshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 36 - 44
  • [28] Secure Multicast using Proxy Re-Encryption in an IoT Environment
    Kim, SuHyun
    Hwang, YongWoon
    Seo, JungTaek
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (02): : 946 - 959
  • [29] Secure bidirectional proxy re-encryption for cryptographic cloud storage
    Shao, Jun
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Kaitai
    PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 113 - 121
  • [30] Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption
    Luo, Fucai
    Al-Kuwari, Saif
    Susilo, Willy
    Duong, Dung Hoang
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2398 - 2408