A provably secure signcryption with proxy re-encryption for smart water grid network

被引:0
|
作者
Patil R.Y. [1 ]
Patil Y.H. [2 ]
机构
[1] Pimpri Chinchwad College of Engineering, Maharashtr, Pune
[2] IME Division, VBK Infra and Engineering Projects
来源
Int. J. Secur. Netw. | 2022年 / 4卷 / 231-239期
关键词
AVISPA; identity based cryptography; PRE; proxy re-encryption; signcryption; smart water grid; SWG;
D O I
10.1504/ijsn.2022.127151
中图分类号
学科分类号
摘要
Smart water grid (SWG) uses smart water metering systems that regularly gathers consumers’ water consumption records and sends it to the water supply department. The communication of such information is the cause of concern for data privacy. In this work, we proposed an identity based signcryption with proxy re-encryption for smart water grid (IDSC-PRE-SWG). A proxy located at the cloud is responsible for re-encrypting the signcrypted ciphertext message. Our approach permits the authorised user to decode the ciphertext along with validating the message’s source and authenticity. We also demonstrated that our system can be used to safeguard the security of data stored in cloud. The comparison of computational costs in terms of time in milliseconds for each phase of the IDSC-PRE schemes shows that, the proposed approach outperforms the alternative schemes. The simulation study performed with AVISPA tool indicates that IDSC-PRE-SWG is safe in OFMC and CL-Atse backends. Copyright © 2022 Inderscience Enterprises Ltd.
引用
收藏
页码:231 / 239
页数:8
相关论文
共 50 条
  • [41] Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
    Deng, Robert H.
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 1 - +
  • [42] Comments on "Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption"
    Seo, Jae Woo
    Yum, Dae Hyun
    Lee, Pil Joong
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (05) : 3256 - 3256
  • [43] IPRES: In-device Proxy Re-Encryption Service for Secure ICN
    Suksomboon, Kalika
    Tagami, Atsushi
    Basu, Anirban
    Kurihara, Jun
    PROCEEDINGS OF THE 4TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN 2017), 2017, : 176 - 177
  • [44] Proxy Re-Encryption Based on Homomorphic Encryption
    Bellafqira, Reda
    Coatrieux, Gouenou
    Bouslimi, Dalel
    Quellec, Gwenole
    Cozic, Michel
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161
  • [45] Efficient and Secure MPC Through Integration of FHE and Proxy Re-encryption
    Rohitkumar R. Upadhyay
    Sahadeo Padhye
    SN Computer Science, 6 (2)
  • [46] Secure Data Sharing in the Cloud Through Proxy Re-Encryption Technique
    Adilakshmi, Jyothi
    Rithika, Badgoian
    Pushpalatha, Chitikela
    Venkatesh, Thurpati
    Lohitha, Mandapati
    2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 700 - 705
  • [47] Distributed Proxy Re-Encryption Protocol for Secure Multiparty Computation with Fully Homomorphic Encryption
    Demir, Busranur Bulbul
    Altilar, Deniz Turgay
    2024 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING, BLACKSEACOM 2024, 2024, : 199 - 204
  • [48] On the application of generic CCA-secure transformations to proxy re-encryption
    Nunez, David
    Agudo, Isaac
    Lopez, Javier
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1769 - 1785
  • [49] File Matching Based on Secure Authentication and Proxy Homomorphic Re-encryption
    Yu, Bin
    Zhang, Chen
    Li, Weihong
    ICMLC 2019: 2019 11TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, 2019, : 472 - 476
  • [50] Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption
    Hayashi, Ryotaro
    Matsushita, Tatsuyuki
    Yoshida, Takuya
    Fujii, Yoshihiro
    Okada, Koji
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2011, 7038 : 210 - +