A provably secure signcryption with proxy re-encryption for smart water grid network

被引:0
|
作者
Patil R.Y. [1 ]
Patil Y.H. [2 ]
机构
[1] Pimpri Chinchwad College of Engineering, Maharashtr, Pune
[2] IME Division, VBK Infra and Engineering Projects
来源
Int. J. Secur. Netw. | 2022年 / 4卷 / 231-239期
关键词
AVISPA; identity based cryptography; PRE; proxy re-encryption; signcryption; smart water grid; SWG;
D O I
10.1504/ijsn.2022.127151
中图分类号
学科分类号
摘要
Smart water grid (SWG) uses smart water metering systems that regularly gathers consumers’ water consumption records and sends it to the water supply department. The communication of such information is the cause of concern for data privacy. In this work, we proposed an identity based signcryption with proxy re-encryption for smart water grid (IDSC-PRE-SWG). A proxy located at the cloud is responsible for re-encrypting the signcrypted ciphertext message. Our approach permits the authorised user to decode the ciphertext along with validating the message’s source and authenticity. We also demonstrated that our system can be used to safeguard the security of data stored in cloud. The comparison of computational costs in terms of time in milliseconds for each phase of the IDSC-PRE schemes shows that, the proposed approach outperforms the alternative schemes. The simulation study performed with AVISPA tool indicates that IDSC-PRE-SWG is safe in OFMC and CL-Atse backends. Copyright © 2022 Inderscience Enterprises Ltd.
引用
收藏
页码:231 / 239
页数:8
相关论文
共 50 条
  • [31] Secure Multicast Using Proxy Re-encryption in IoT Environment
    Kim, SuHyun
    Lee, ImYeong
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 66 - 70
  • [32] Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
    Libert, Benoit
    Vergnaud, Damien
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (03) : 1786 - 1802
  • [33] CCA-Secure Proxy Re-encryption without Pairings
    Shao, Jun
    Cao, Zhenfu
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 357 - 376
  • [34] Provably secure attribute-based encryption with attribute revocation and grant function using proxy re-encryption and attribute key for updating
    Naruse, Takeru
    Mohri, Masami
    Shiraishi, Yoshiaki
    HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES, 2015, 5
  • [35] Elliptic Curve Qu-Vanstone Based Signcryption Schemes with Proxy Re-encryption for Secure Cloud Data Storage
    Shabisha, Placide
    Braeken, An
    Touhafi, Abdellah
    Steenhaut, Kris
    CLOUD COMPUTING AND BIG DATA: TECHNOLOGIES, APPLICATIONS AND SECURITY, 2019, 49 : 1 - 18
  • [36] Combined Proxy Re-encryption
    Canard, Sebastien
    Devigne, Julien
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 49 - 66
  • [37] Anonymous proxy re-encryption
    Shao, Jun
    Liu, Peng
    Wei, Guiyi
    Ling, Yun
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 439 - 449
  • [38] A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    IEEE ACCESS, 2018, 6 : 70017 - 70024
  • [39] Improved Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
    Zhao Guoan
    Fang Liming
    Wang Jiandong
    Ge Chunpeng
    Ren Yongjun
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 476 - +
  • [40] Restricted CCA-secure Bidirectional Proxy Re-encryption Scheme
    Guo, Duntao
    Wang, Xu An
    Zhang, Minqing
    Yang, Xiaoyuan
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 678 - 681