Secure Group Communication Based on Distributed Parallel ID-based Proxy Re-encryption

被引:0
|
作者
Zhang Minqing [1 ,2 ]
Wu Xuguang [2 ]
Han Yiliang [2 ]
Guo Yao [2 ]
机构
[1] Northwestern Polytech Univ, Sch Comp Sci & Engn, Xian 710068, Peoples R China
[2] Engn Univ CAPF, Key Lab Networks & Informat Secur CAPF, Xian 710086, Peoples R China
基金
中国国家自然科学基金;
关键词
Proxy Re-encryption; Secure group communication; Distributed computing;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A distributed parallel proxy re-encryption scheme is proposed, so as to get with to distributed environment, such as cloud computing. The network model is has two-layer hierarchical structures: the first layer network is formed by the sender and a set of proxy nodes; the second layer network is masked up by clients such as pocketbook, tablet computer and even phones. Each group is a basic distributed parallel cell, which often has a sever node and several computer nodes. The distributed parallel ID-based proxy re-encryption algorithm obtains the higher utilization rate of several computer nodes. The messages are optimized parallel with randomness reusing and cipher text aggregation, which will reduce the computation and transmission overheads further. Experiment result shows that the scheme is very efficient.
引用
收藏
页码:6364 / 6367
页数:4
相关论文
共 50 条
  • [1] ID-Based Multireceiver Homomorphic Proxy Re-Encryption in Federated Learning
    Fan, Chun-, I
    Hsu, Ya-Wen
    Shie, Cheng-Han
    Tseng, Yi-Fan
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2022, 18 (04)
  • [2] Security vulnerability in a non-interactive ID-based proxy re-encryption scheme
    Koo, Woo Kwon
    Hwang, Jung Yeon
    Lee, Dong Hoon
    [J]. INFORMATION PROCESSING LETTERS, 2009, 109 (23-24) : 1260 - 1262
  • [3] Leakage resilient ID-based proxy re-encryption scheme for access control in fog computing
    Wang, Zhiwei
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 87 : 679 - 685
  • [4] RSA-Based Collusion Resistant Quorum Controlled Proxy Re-encryption Scheme for Distributed Secure Communication
    Patil, Shravani Mahesh
    Purushothama, B. R.
    [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2019, 2019, 11319 : 349 - 363
  • [5] Group-Based Proxy Re-encryption Scheme
    Ma, Chunbo
    Ao, Jun
    [J]. EMERGING INTELLIGENT COMPUTING TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, 5754 : 1025 - 1034
  • [6] A quantum secure ID-based cryptographic encryption based on group rings
    Gaurav Mittal
    Sunil Kumar
    Sandeep Kumar
    [J]. Sādhanā, 2022, 47
  • [7] A quantum secure ID-based cryptographic encryption based on group rings
    Mittal, Gaurav
    Kumar, Sunil
    Kumar, Sandeep
    [J]. SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2022, 47 (01):
  • [8] Proxy Re-Encryption Based on Homomorphic Encryption
    Bellafqira, Reda
    Coatrieux, Gouenou
    Bouslimi, Dalel
    Quellec, Gwenole
    Cozic, Michel
    [J]. 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161
  • [9] ID-based secure group communication in grid computing
    Chen, L
    Huang, XQ
    You, JY
    [J]. CURRENT TRENDS IN HIGH PERFORMANCE COMPUTING AND ITS APPLICATIONS, PROCEEDINGS, 2005, : 245 - 250
  • [10] A proxy re-encryption scheme based on elliptic curve group
    [J]. Yin, Shou-Lin (352720214@qq.com), 1600, Ubiquitous International (08):