Anonymous Aggregate Encryption Scheme for Industrial Internet of Things

被引:3
|
作者
Deng, Lunzhi [1 ]
机构
[1] Guizhou Normal Univ, Sch Math Sci, Guiyang 550001, Peoples R China
来源
IEEE SYSTEMS JOURNAL | 2020年 / 14卷 / 03期
基金
中国国家自然科学基金;
关键词
Aggregate encryption; anonymous; industrial Internet of Things (IIoTs); public key cryptography; standard model (SM); IDENTITY-BASED ENCRYPTION; PUBLIC-KEY ENCRYPTION; BROADCAST ENCRYPTION; CERTIFICATELESS ENCRYPTION; MULTIRECEIVER ENCRYPTION; STRONGLY SECURE; EFFICIENT; CRYPTANALYSIS; ENCAPSULATION; CIPHERTEXT;
D O I
10.1109/JSYST.2019.2935998
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of information technology and the continuous upgrading of special equipment, such as sensing and control, the application of industrial Internet of Things (IIoTs) has received great attention. Within the IIoTs, a large amount of sensitive data needs to be transmitted in time. Therefore, protecting data security and user privacy has been a key issue. In this article, the concept of public key anonymous aggregation encryption (AAE) is proposed for the first time. The sender of the message encryptsndifferent messages into one ciphertext using the public keys of n different receivers. After receiving the ciphertext, the receiver decrypts the ciphertext using his private key to get the corresponding message. The messages obtained by different receivers are different, and the identity of the receiver is kept secret to anyone including other receivers. A concrete AAE scheme then is constructed, which is proved to be secure in the standard model based on the decisional Diffie-Hellman problem. It does not require pairing operations, so it is more efficient than previous public encryption schemes and is more suitable for IIoTs.
引用
收藏
页码:3999 / 4006
页数:8
相关论文
共 50 条
  • [21] Secure and Efficient Certificateless Searchable Authenticated Encryption Scheme Without Random Oracle for Industrial Internet of Things
    Hu, Zhenyu
    Deng, Lunzhi
    Wu, Yaying
    Shi, Hongyu
    Gao, Yan
    IEEE SYSTEMS JOURNAL, 2023, 17 (01): : 1304 - 1315
  • [22] A Privacy-Preserving Homomorphic Encryption Scheme for the Internet of Things
    Zouari, Jaweher
    Hamdi, Mohamed
    Kim, Tai-Hoon
    2017 13TH INTERNATIONAL WIRELESS COMMUNICATIONS AND MOBILE COMPUTING CONFERENCE (IWCMC), 2017, : 1939 - 1944
  • [23] Fast asymmetric encryption and decryption of SimpleMatrix scheme for Internet of Things
    Yi, Haibo
    COMPUTER COMMUNICATIONS, 2022, 190 : 145 - 153
  • [24] A lightweight attribute-based encryption scheme for the Internet of Things
    Yao, Xuanxia
    Chen, Zhi
    Tian, Ye
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 49 : 104 - 112
  • [25] Fast asymmetric encryption and decryption of SimpleMatrix scheme for Internet of Things
    Yi, Haibo
    Computer Communications, 2022, 190 : 145 - 153
  • [26] A Work in Progress: Context based encryption scheme for Internet of Things
    Lee, Jungyub
    Oh, Sungmin
    Jang, Ju Wook
    10TH INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND COMMUNICATIONS (FNC 2015) / THE 12TH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS AND PERVASIVE COMPUTING (MOBISPC 2015) AFFILIATED WORKSHOPS, 2015, 56 : 271 - 275
  • [27] Searchable Encryption with Access Control in Industrial Internet of Things (IIoT)
    Bader, Jawhara
    Michala, Anna Lito
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2021, 2021
  • [28] Certificateless Searchable Encryption With Trapdoor Unlinkability for Industrial Internet of Things
    Sun, Lixue
    Xu, Chunxiang
    Zhang, Xiaojun
    Zeng, Fugeng
    IEEE SYSTEMS JOURNAL, 2023, 17 (03): : 4521 - 4532
  • [29] Cryptanalysis of a Certificateless Hybrid Signcryption Scheme and a Certificateless Encryption Scheme for Internet of Things
    Shan, Shan
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [30] A three -factor anonymous user authentication scheme for Internet of Things environments
    Lee, Hakjun
    Kang, Dongwoo
    Ryu, Jihyeon
    Won, Dongho
    Kim, Hyoungshick
    Lee, Youngsook
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 52