Revocable certificate-based broadcast signcryption scheme for edge-enabled IIoT

被引:0
|
作者
Gao, Yan [1 ]
Deng, Lunzhi [1 ]
Liu, Huan [1 ]
Li, Binhan [1 ]
Wang, Na [2 ]
机构
[1] Guizhou Normal Univ, Guizhou Prov Specialized Key Lab Informat Secur Te, Sch Math Sci, Guiyang 550001, Peoples R China
[2] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificate-based cryptography; Broadcast signcryption; Revocable; Edge-enabled IIoT; Random oracle model; ENCRYPTION; EFFICIENT;
D O I
10.1016/j.ins.2024.121540
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In edge computing-enabled Industrial Internet of Things (edge-enabled IIoT), edge computing facilitates data processing with reduced latency, enhanced reliability, and optimized realtime resource use. With the rapid increase in connected devices, ensuring secure data sharing among them is crucial. Broadcast signcryption technology is an excellent choice for achieving data confidentiality and authentication while enhancing operational efficiency. With devices potentially expiring, aging, or suffering damage, the prompt revocation of their decryption privileges is essential. Currently, there is a lack of research that simultaneously integrates broadcast signcryption with a revocation mechanism. In this paper, we propose a revocable certificate-based broadcast signcryption (RCB-BSC) scheme tailored for edge-enabled IIoT. In our work, base station generates a signcrypted ciphertext for multiple edge computing nodes (ECNs), and sends it to edge service (ES). The ES revokes the access of illegitimate ECNs and generates a new ciphertext for those ECNs with non-revoked decryption privileges, allowing them to decrypt the message using their private keys. Under the random oracle model (ROM), our scheme achieves plaintext confidentiality, ensures anonymity of receivers, and authenticates the legitimacy of the broadcaster. Moreover, the performance analysis shows our scheme excels in computation and communication efficiency, making it ideal for edge-enabled IIoT.
引用
收藏
页数:20
相关论文
共 50 条
  • [11] Cryptanalysis and improvements of an efficient certificate-based proxy signature scheme for IIoT environments
    Zhu, Fei
    Xu, Feihong
    Yang, Xu
    Yi, Xun
    Abuadbba, Alsharif
    INFORMATION PROCESSING LETTERS, 2022, 173
  • [12] Certificate-based signcryption with enhanced security features
    Li, Jiguo
    Huang, Xinyi
    Hong, Meixue
    Zhang, Yichen
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 64 (06) : 1587 - 1601
  • [13] Certificate-Based Secure Three-Party Signcryption Scheme With Low Costs
    Lin, Han-Yu
    Wu, Tzong-Sun
    Huang, Shih-Kun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2012, 28 (04) : 739 - 753
  • [14] Certificate-Based Signcryption Scheme for Securing Wireless Communication in Industrial Internet of Things
    Ullah, Insaf
    Alomari, Abdullah
    Abdullah, Ako Muhammad
    Kumar, Neeraj
    Alsirhani, Amjad
    Noor, Fazal
    Hussain, Saddam
    Khan, Muhammad Asghar
    IEEE ACCESS, 2022, 10 : 105182 - 105194
  • [15] Continuous leakage-resilient certificate-based signcryption scheme and application in cloud computing
    Zhou, Yanwei
    Xu, Yuan
    Qiao, Zirui
    Yang, Bo
    Zhang, Mingwu
    THEORETICAL COMPUTER SCIENCE, 2021, 860 : 1 - 22
  • [16] Fully Continuous Leakage-Resilient Certificate-Based Signcryption Scheme for Mobile Communications
    Tseng, Yuh-Min
    Tsai, Tung-Tso
    Huang, Sen-Shan
    INFORMATICA, 2023, 34 (01) : 199 - 222
  • [17] A Distributed Resource Sharing Mechanism in Edge-Enabled IIoT Systems
    Liu, Huan
    Li, Shiyong
    Li, Wenzhe
    Sun, Wei
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (08): : 14296 - 14312
  • [18] A certificate-based signature scheme
    Kang, BG
    Park, JH
    Hahn, SG
    TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 99 - 111
  • [19] Revocable ID-based signcryption scheme
    Liu, Zhenhua
    Li, Juanjuan
    Zu, Longhui
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2014, 46 (02): : 79 - 86
  • [20] A certificate-based proxy cryptosystem with revocable proxy decryption power
    Wang, Lihua
    Shao, Jun
    Cao, Zhenfu
    Mambo, Masahiro
    Yamamura, Akihiro
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 297 - 311