Efficient Identity-Based Broadcast Encryption Scheme on Lattices for the Internet of Things

被引:1
|
作者
He, Kai [1 ]
Liu, Xueqiao [2 ]
Liu, Jia-Nan [3 ]
Liu, Wei [3 ]
机构
[1] Dongguan Univ Technol, Sch Cyberspace Secur, Dongguan 523808, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW 2522, Australia
[3] Jinan Univ, Coll Cyber Secur, Guangzhou 510632, Peoples R China
基金
美国国家科学基金会;
关键词
CONSTANT-SIZE CIPHERTEXTS; SECURE; PRIVACY;
D O I
10.1155/2021/2847731
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In an identity-based broadcast encryption (IBBE) scheme, the ciphertext is usually appended with a set of user identities to specify intended recipients. However, as IBBE is adopted in extensive industries, the demand of anonymity for specific scenarios such as military applications is urgent and ought no more to be ignored. On the contrary, how to optimize computation and communication is an unavoidable challenge in the IBBE scheme construction, especially in the large-scaled resource-limited wireless networks such as the Internet of Things (IoT), where the cost of computation and communication should be mitigated as much as possible since other functions including connectivity and privacy should be given the top priority. Thus, we present an IBBE scheme from the lattice, in which we employ the Chinese remainder theorem and lattice basis delegation in fixed dimensions to obtain several desirable characteristics, such as constant-size public parameter, private key, and ciphertext. In addition, our encryption and decryption algorithms are more efficient than broadcast encryption (BE) schemes based on number-theoretic problems. To be noticed, our scheme can simultaneously achieve confidentiality and outsider anonymity against the chosen-plaintext attack under the hardness of the learning with error (LWE) problem.
引用
下载
收藏
页数:11
相关论文
共 50 条
  • [1] A MULTIVARIATE IDENTITY-BASED BROADCAST ENCRYPTION WITH APPLICATIONS TO THE INTERNET OF THINGS
    Srivastava, Vikas
    Debnath, Sumit Kumar
    Stanica, Pantelimon
    Pal, Saibal Kumar
    ADVANCES IN MATHEMATICS OF COMMUNICATIONS, 2023, 17 (06) : 1302 - 1313
  • [2] Identity-Based Encryption in the Internet of Things
    Genc, Yasin
    Afacan, Erkan
    29TH IEEE CONFERENCE ON SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS (SIU 2021), 2021,
  • [3] A secure and efficient Internet of Things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption
    Unal, Devrim
    Al-Ali, Abdulla
    Catak, Ferhat Ozgur
    Hammoudeh, Mohammad
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 125 : 433 - 445
  • [4] An Efficient Identity-Based Broadcast Encryption Scheme Based on SM9
    Lai J.-C.
    Huang X.-Y.
    He D.-B.
    Jisuanji Xuebao/Chinese Journal of Computers, 2021, 44 (05): : 897 - 907
  • [5] Efficient Identity-Based Encryption With Revocation for Data Privacy in Internet of Things
    Sun, Yinxia
    Chatterjee, Pushpita
    Chen, Yi
    Zhang, Yudong
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (04) : 2734 - 2743
  • [6] Efficient Hierarchical Identity-Based Encryption System for Internet of Things Infrastructure
    Guo, Lifeng
    Wang, Jing
    Yau, Wei-Chuen
    SYMMETRY-BASEL, 2019, 11 (07):
  • [7] Identity-based Broadcast Encryption Scheme with Untrusted PKG
    Guo, Shanqing
    Zhang, Chunhua
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1613 - 1618
  • [8] Identity-Based Authentication Scheme for the Internet of Things
    Salman, Ola
    Abdallah, Sarah
    Elhajj, Imad H.
    Chehab, Ali
    Kayssi, Ayman
    2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 1109 - 1111
  • [9] An efficient identity-based broadcast signcryption scheme
    Luo, Ming
    Zou, Chunhua
    Xu, Jianfeng
    Journal of Software, 2012, 7 (02) : 366 - 373
  • [10] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption
    Kim, Kitak
    Kim, Milyoung
    Kim, Hyoseung
    Park, Jon Hwan
    Lee, Dong Hoon
    COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102