Identity-Based Broadcast Proxy Re-Encryption for Flexible Data Sharing in VANETs

被引:8
|
作者
Zhang, Jing [1 ,2 ]
Su, Shuangshuang [1 ,2 ]
Zhong, Hong [1 ,2 ]
Cui, Jie [1 ,2 ]
He, Debiao [3 ]
机构
[1] Anhui Univ, Sch Comp Sci & Technol, Key Lab Intelligent Comp & Signal Proc, Minist Educ, Hefei, Peoples R China
[2] Anhui Univ, Sch Comp Sci & Technol, Anhui Engn Lab IoT Secur Technol, Hefei 230039, Peoples R China
[3] Wuhan Univ, Sch Cyber Sci & Engn, Wuhan 430072, Peoples R China
基金
中国国家自然科学基金;
关键词
VANETs; multi-receiver; identity-based broadcast encryption; proxy re-encryption; Lagrange interpolation polynomial; AUTHENTICATION; COMMUNICATION; SCHEME;
D O I
10.1109/TIFS.2023.3299466
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Data sharing is an integral part of vehicular ad hoc networks (VANETs), which provide drivers with safe and comfortable driving environments. However, when data are shared among multiple vehicles, they must be encrypted multiple times. Some solutions have used identity-based broadcast encryption to solve this problem. However, these schemes have two major limitations. First, the decryption cost is linearly related to the number of data receivers, where the identity of other receivers must be known. Second, only the data sender can forward the data. To address these important deficiencies, we propose an identity-based broadcast proxy re-encryption scheme to realize flexible and efficient data-sharing in VANETs. The data sender generates a fixed ciphertext that can be obtained by newly added vehicles through authorized vehicles. Data receivers can decrypt ciphertext directly without knowing the identities of other receivers, where the decryption overhead is constant. In addition, our scheme can achieve complete anonymous data sharing to protect vehicle privacy. A security proof shows that our scheme has sufficient security, and a performance analysis shows that our scheme performs well. Our proposed scheme is thus suitable for securing VANETs.
引用
收藏
页码:4830 / 4842
页数:13
相关论文
共 50 条
  • [21] Identity-based multi-condition proxy re-encryption
    Wang, Pingshu
    [J]. PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 1047 - 1052
  • [22] Identity-based proxy re-encryption without random oracles
    Chu, Cheng-Kang
    Tzeng, Wen-Guey
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 189 - +
  • [23] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    赖俊祚
    朱文涛
    邓慧杰
    刘胜利
    寇卫东
    [J]. Journal of Computer Science & Technology, 2010, 25 (04) : 793 - 806
  • [24] Flexible attribute-based proxy re-encryption for efficient data sharing
    Deng, Hua
    Qin, Zheng
    Wu, Qianhong
    Guan, Zhenyu
    Zhou, Yunya
    [J]. INFORMATION SCIENCES, 2020, 511 : 94 - 113
  • [25] Identity-Based Proxy Re-encryption Based on SM9
    Liu, Hang
    Ming, Yang
    Wang, Chenhao
    Zhao, Yi
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 320 - 339
  • [26] An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing
    Liang, Kaitai
    Liu, Joseph K.
    Wong, Duncan S.
    Susilo, Willy
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 257 - 272
  • [27] Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    Shao, Jun
    Cao, Zhenfu
    [J]. INFORMATION SCIENCES, 2012, 206 : 83 - 95
  • [28] Identity-based conditional proxy re-encryption with fine grain policy
    Ge, Chunpeng
    Susilo, Willy
    Wang, Jiandong
    Fang, Liming
    [J]. COMPUTER STANDARDS & INTERFACES, 2017, 52 : 1 - 9
  • [29] Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model
    Jiang Mingming
    Guo Yuyan
    Yu Lei
    Song Wangan
    Wei Shimin
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (01) : 61 - 66
  • [30] On the security of two identity-based conditional proxy re-encryption schemes
    He, Kai
    Weng, Jian
    Deng, Robert H.
    Liu, Joseph K.
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 652 : 18 - 27