Privacy-Preserving and Verifiable Outsourcing Message Transmission and Authentication Protocol in IoT

被引:1
|
作者
Li, Hongjun [1 ,2 ]
Kong, Fanyu [1 ]
Yu, Jia [2 ]
Zhang, Hanlin [2 ]
Diao, Luhong [3 ]
Tao, Yunting [1 ]
机构
[1] Shandong Univ, Sch Software, Jinan 250101, Peoples R China
[2] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
[3] Beijing Univ Technol, Coll Math, Fac Sci, Beijing 100022, Peoples R China
基金
中国国家自然科学基金;
关键词
IoT; edge computing; secure outsourcing computation; authentication protocol; privacy-preserving; SECURE; ALGORITHMS; EFFICIENT;
D O I
10.1109/TrustCom56396.2022.00082
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the popularity of Internet of Things (IoT) and 5G, privacy-preserving message transmission and authentication have become an indispensable part in the field of data collection and analysis. There exist many protocols based on the public key cryptosystem, which allow the users to utilize their own identity as the public key to carry out data encryption and digital signature, which is very suitable for applying in the IoT environment with a large number of terminal devices. However, these protocols usually involve some complex cryptographic operations, which hinder their application on the resource-constrained IoT devices. In this paper, we design a privacy-preserving and verifiable outsourcing message transmission and authentication protocol, which allows the resource-constrained users to delegate some complex operations to the two untrusted edge servers and reduce the computational burden on the users side. The designed protocol contains several secure and novel outsourcing algorithms for modular exponentiation, bilinear pairing and scalar multiplication. For the different operations in the different situations, we design several different blinding techniques and verification methods, which not only protect the users' private information, but also ensure the users can verify the correctness of results. Finally, we carry out some experiments to show that our proposed protocol is efficient.
引用
收藏
页码:556 / 564
页数:9
相关论文
共 50 条
  • [1] Privacy-Preserving and Publicly Verifiable Protocol for Outsourcing Polynomials Evaluation to a Malicious Cloud
    Xie, Dawei
    Yang, Haining
    Qin, Jing
    Ma, Jixin
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2019, 11 (04) : 14 - 27
  • [2] A Lightweight and Privacy-Preserving Authentication Protocol for Healthcare in an IoT Environment
    Xie, Qingyun
    Ding, Zixuan
    Xie, Qi
    [J]. MATHEMATICS, 2023, 11 (18)
  • [3] Trinocchio: Privacy-Preserving Outsourcing by Distributed Verifiable Computation
    Schoenmakers, Berry
    Veeningen, Meilof
    de Vreede, Niels
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2016, 2016, 9696 : 346 - 366
  • [4] VEPP: A Verifiable, Highly Efficient and Privacy-Preserving Protocol for Outsourcing Large Matrix Multiplication
    Hui, Liang
    Dong, Xiaolei
    Shen, Jiachen
    Cao, Zhenfu
    Chen, Hongyuan
    Liang, Yunong
    [J]. 2018 THIRD INTERNATIONAL CONFERENCE ON SECURITY OF SMART CITIES, INDUSTRIAL CONTROL SYSTEM AND COMMUNICATIONS (SSIC), 2018,
  • [5] Privacy-Preserving and Verifiable Outsourcing Linear Inference Computing Framework
    Liu, Jiao
    Li, Xinghua
    Liu, Ximeng
    Tang, Jiawei
    Wang, Yunwei
    Tong, Qiuyun
    Ma, Jianfeng
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (06) : 4591 - 4604
  • [6] Privacy-preserving and verifiable protocols for scientific computation outsourcing to the cloud
    Chen, Fei
    Xiang, Tao
    Yang, Yuanyuan
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2014, 74 (03) : 2141 - 2151
  • [7] Privacy-preserving and Verifiable Outsourcing Inference Against Malicious Servers
    Liu, Yiyao
    Li, Hongwei
    Hao, Meng
    Zhang, Xilin
    Hu, Guiqiang
    [J]. IEEE CONFERENCE ON GLOBAL COMMUNICATIONS, GLOBECOM, 2023, : 5001 - 5006
  • [8] Lightweight authentication protocol for connected medical IoT through privacy-preserving access
    Tanveer, Muhammad
    Chelloug, Samia Allaoua
    Alabdulhafith, Maali
    Abd El-Latif, Ahmed A.
    [J]. EGYPTIAN INFORMATICS JOURNAL, 2024, 26
  • [9] An Efficient Privacy-preserving Authentication Protocol in VANETs
    Zhang, Jianhong
    Zhen, Weina
    Xu, Min
    [J]. 2013 IEEE NINTH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR NETWORKS (MSN 2013), 2013, : 272 - 277
  • [10] Publicly verifiable privacy-preserving aggregation and its application in IoT
    Li, Tong
    Gao, Chongzhi
    Jiang, Liaoliang
    Pedrycz, Witold
    Shen, Jian
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2019, 126 : 39 - 44