Revocable certificate-based broadcast signcryption scheme for edge-enabled IIoT

被引:0
|
作者
Gao, Yan [1 ]
Deng, Lunzhi [1 ]
Liu, Huan [1 ]
Li, Binhan [1 ]
Wang, Na [2 ]
机构
[1] Guizhou Normal Univ, Guizhou Prov Specialized Key Lab Informat Secur Te, Sch Math Sci, Guiyang 550001, Peoples R China
[2] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificate-based cryptography; Broadcast signcryption; Revocable; Edge-enabled IIoT; Random oracle model; ENCRYPTION; EFFICIENT;
D O I
10.1016/j.ins.2024.121540
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In edge computing-enabled Industrial Internet of Things (edge-enabled IIoT), edge computing facilitates data processing with reduced latency, enhanced reliability, and optimized realtime resource use. With the rapid increase in connected devices, ensuring secure data sharing among them is crucial. Broadcast signcryption technology is an excellent choice for achieving data confidentiality and authentication while enhancing operational efficiency. With devices potentially expiring, aging, or suffering damage, the prompt revocation of their decryption privileges is essential. Currently, there is a lack of research that simultaneously integrates broadcast signcryption with a revocation mechanism. In this paper, we propose a revocable certificate-based broadcast signcryption (RCB-BSC) scheme tailored for edge-enabled IIoT. In our work, base station generates a signcrypted ciphertext for multiple edge computing nodes (ECNs), and sends it to edge service (ES). The ES revokes the access of illegitimate ECNs and generates a new ciphertext for those ECNs with non-revoked decryption privileges, allowing them to decrypt the message using their private keys. Under the random oracle model (ROM), our scheme achieves plaintext confidentiality, ensures anonymity of receivers, and authenticates the legitimacy of the broadcaster. Moreover, the performance analysis shows our scheme excels in computation and communication efficiency, making it ideal for edge-enabled IIoT.
引用
收藏
页数:20
相关论文
共 50 条
  • [1] A Certificate-Based Signcryption Scheme
    Luo, Ming
    Wen, Yingyou
    Zhao, Hong
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 17 - 23
  • [2] On the security of a certificate-based signcryption scheme
    Yuan, Y. (ymyuan@xmu.edu.cn), 1600, CESER Publications, Post Box No. 113, Roorkee, 247667, India (49):
  • [3] TACAS-IoT: Trust Aggregation Certificate-Based Authentication Scheme for Edge-Enabled IoT Systems
    Wazid, Mohammad
    Das, Ashok Kumar
    Shetty, Sachin
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (22) : 22643 - 22656
  • [4] A Certificate-Based Ring Signcryption Scheme for Securing UAV-Enabled Private Edge Computing Systems
    Asghar Khan, Muhammad
    Ullah, Insaf
    Kumar, Neeraj
    Afghah, Fatemeh
    Barb, Gordana
    Noor, Fazal
    Alqahtany, Saad
    IEEE ACCESS, 2024, 12 : 83466 - 83479
  • [5] Certificate-Based Generalized Ring Signcryption Scheme
    Zhou, Caixue
    Gao, Guangyong
    Cui, Zongmin
    Zhao, Zhiqiang
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2018, 29 (06) : 1063 - 1088
  • [6] Anonymous Message Authentication Scheme for Semitrusted Edge-Enabled IIoT
    Cui, Jie
    Wang, Fengqun
    Zhang, Qingyang
    Xu, Yan
    Zhong, Hong
    IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2021, 68 (12) : 12921 - 12929
  • [7] Provably Secure Certificate-Based Signcryption Scheme without Pairings
    Lu, Yang
    Li, Jiguo
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (07): : 2554 - 2571
  • [8] An Efficient and Secure Multimessage and Multireceiver Signcryption Scheme for Edge-Enabled Internet of Vehicles
    Ullah, Insaf
    Khan, Muhammad Asghar
    Khan, Fazlullah
    Jan, Mian Ahmad
    Srinivasan, Ram
    Mastorakis, Spyridon
    Hussain, Saddam
    Khattak, Hizbullah
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2688 - 2697
  • [9] Security weakness of a certificate-based proxy signature scheme for IIoT environments
    Park, Je Hong
    Kim, Woo-Hwan
    INFORMATION PROCESSING LETTERS, 2024, 183
  • [10] An efficient and provable certificate-based proxy signature scheme for IIoT environment
    Verma, Girraj Kumar
    Singh, B. B.
    Kumar, Neeraj
    Obaidat, Mohammad S.
    He, Debiao
    Singh, Harendra
    INFORMATION SCIENCES, 2020, 518 : 142 - 156