An Efficient Anonymous Identity-Based Broadcast Encryption for Large-Scale Wireless Sensor Networks

被引:0
|
作者
Kim, In Tae [1 ]
Hwang, Seong Oun [2 ]
Kim, Seungwoon
机构
[1] Hongik Univ, Dept Elect & Comp Engn, Seoul, South Korea
[2] Hongik Univ, Dept Comp & Informat Commun Engn, Seoul, South Korea
关键词
cryptography; identity-based encryption; identity-based broadcast encryption; sensor network; CONSTANT-SIZE CIPHERTEXTS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Previous identity-based broadcast encryption schemes have mainly focused on reducing the ciphertext and key size. These efforts have resulted in computation and/or storage overhead on a user's side. Therefore, they are not suitable for wireless sensor networks which are very limited in computation capability, storage, and energy resources. In this paper, we propose an efficient, scalable identity-based broadcast encryption scheme suitable for sensor networks by significantly reducing both computation and storage overhead: all of the public key, private keys, and ciphertexts are of constant size. Furthermore, the proposed scheme is also efficient in communication overhead by removing the set of receivers from ciphertexts. This also enables the proposed scheme to protect the privacy of receivers' identities.
引用
收藏
页码:27 / 39
页数:13
相关论文
共 50 条
  • [21] An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks
    Zhang, Leyou
    Hu, Yupu
    Mu, Ningbo
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 1619 - +
  • [22] Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2014, 2014, 8544 : 242 - 257
  • [23] A Hierarchical Key Management Scheme for Wireless Sensor Networks Based on Identity-based Encryption
    Hu, Shuaiqi
    [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2015, : 384 - 389
  • [24] IMBAS: Identity-based multi-user broadcast authentication in wireless sensor networks
    Cao, Xuefei
    Kou, Weidong
    Dang, Lanjun
    Zhao, Bin
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (04) : 659 - 667
  • [25] A Novel Identity-based Broadcast Authentication Scheme with Batch Verification for Wireless Sensor Networks
    Feng, Meng
    Lai, Chin-Feng
    Liu, Hong
    Qi, Rongxin
    Shen, Jian
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (05): : 1303 - 1311
  • [26] TinyIBE: Identity-Based Encryption for Heterogeneous Sensor Networks
    Szczechowiak, Piotr
    Collier, Martin
    [J]. PROCEEDINGS OF THE 2009 FIFTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING, 2009, : 349 - 354
  • [27] TinyIBE: Identity-Based Encryption for Heterogeneous Sensor Networks
    Szczechowiak, Piotr
    Collier, Martin
    [J]. 2009 INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (ISSNIP 2009), 2009, : 337 - 342
  • [28] Efficient Identity-Based Broadcast Encryption Scheme on Lattices for the Internet of Things
    He, Kai
    Liu, Xueqiao
    Liu, Jia-Nan
    Liu, Wei
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [29] An Efficient Sensor Deployment Scheme for Large-Scale Wireless Sensor Networks
    Kim, Hoon
    Han, Sang-wook
    [J]. IEEE COMMUNICATIONS LETTERS, 2015, 19 (01) : 98 - 101
  • [30] An identity-based encryption online/offline (IBOOE) algorithm for securing wireless sensor networks
    Na Yang
    [J]. Wireless Networks, 2022, 28 : 3493 - 3502