Revocable certificate-based broadcast signcryption scheme for edge-enabled IIoT

被引:0
|
作者
Gao, Yan [1 ]
Deng, Lunzhi [1 ]
Liu, Huan [1 ]
Li, Binhan [1 ]
Wang, Na [2 ]
机构
[1] Guizhou Normal Univ, Guizhou Prov Specialized Key Lab Informat Secur Te, Sch Math Sci, Guiyang 550001, Peoples R China
[2] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificate-based cryptography; Broadcast signcryption; Revocable; Edge-enabled IIoT; Random oracle model; ENCRYPTION; EFFICIENT;
D O I
10.1016/j.ins.2024.121540
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In edge computing-enabled Industrial Internet of Things (edge-enabled IIoT), edge computing facilitates data processing with reduced latency, enhanced reliability, and optimized realtime resource use. With the rapid increase in connected devices, ensuring secure data sharing among them is crucial. Broadcast signcryption technology is an excellent choice for achieving data confidentiality and authentication while enhancing operational efficiency. With devices potentially expiring, aging, or suffering damage, the prompt revocation of their decryption privileges is essential. Currently, there is a lack of research that simultaneously integrates broadcast signcryption with a revocation mechanism. In this paper, we propose a revocable certificate-based broadcast signcryption (RCB-BSC) scheme tailored for edge-enabled IIoT. In our work, base station generates a signcrypted ciphertext for multiple edge computing nodes (ECNs), and sends it to edge service (ES). The ES revokes the access of illegitimate ECNs and generates a new ciphertext for those ECNs with non-revoked decryption privileges, allowing them to decrypt the message using their private keys. Under the random oracle model (ROM), our scheme achieves plaintext confidentiality, ensures anonymity of receivers, and authenticates the legitimacy of the broadcaster. Moreover, the performance analysis shows our scheme excels in computation and communication efficiency, making it ideal for edge-enabled IIoT.
引用
收藏
页数:20
相关论文
共 50 条
  • [21] An Anonymous and Outsourcing-Supported Multiauthority Access Control Scheme With Revocation for Edge-Enabled IIoT System
    Cui, Jie
    Bian, Fengyu
    Zhong, Hong
    Zhang, Qingyang
    Xu, Sheng
    Gu, Chengjie
    Liu, Lu
    IEEE SYSTEMS JOURNAL, 2022, 16 (04): : 6569 - 6580
  • [22] Efficient Certificate-Based Signature Scheme
    Ming, Yang
    Wang, Yumin
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 87 - +
  • [23] Improved for certificate-based signature scheme
    Department of Computer Science, Minnan Normal University, Zhangzhou
    Fujian
    363000, China
    Beijing Youdian Daxue Xuebao, 3 (48-52):
  • [24] Cryptanalysis of a Certificate-Based on Signature Scheme
    Cheng, Lin
    Xiao, Ying
    Wang, Gang
    2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 2821 - 2825
  • [25] Certificate-Based Signcryption Scheme without Pairing: Directly Verifying Signcrypted Messages Using a Public Key
    Le, Minh-Ha
    Hwang, Seong Oun
    ETRI JOURNAL, 2016, 38 (04) : 724 - 734
  • [26] Blockchain and Onion-Routing-Based Secure Message Exchange System for Edge-Enabled IIoT
    Gupta, Rajesh
    Jadav, Nilesh Kumar
    Mankodiya, Harsh
    Alshehri, Mohammad Dahman
    Tanwar, Sudeep
    Sharma, Ravi
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2023, 19 (02) : 1965 - 1976
  • [27] Anonymous Certificate-Based Inner Product Broadcast Encryption
    Yao, Shuang
    Zhang, Dawei
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [28] Anonymous Certificate-Based Broadcast Encryption With Personalized Messages
    Chen, Liqing
    Li, Jiguo
    Zhang, Yichen
    IEEE TRANSACTIONS ON BROADCASTING, 2020, 66 (04) : 867 - 881
  • [29] A certificate-based watermarking scheme for coloured images
    Wu, N. -I.
    Wang, C. -M.
    Tsai, C. -S.
    Hwang, M. -S.
    IMAGING SCIENCE JOURNAL, 2008, 56 (06): : 326 - 332
  • [30] Certificate-based signature scheme in the standard model
    Zhou, Caixue
    Cui, Zongmin
    IET INFORMATION SECURITY, 2017, 11 (05) : 256 - 260