A Blockchain-Based Proxy Re-Encryption Scheme With Cryptographic Reverse Firewall for IoV

被引:0
|
作者
Jin, Chunhua [1 ]
Chen, Zhiwei [1 ]
Qin, Wenyu [1 ]
Sun, Kaijun [1 ]
Chen, Guanhua [1 ]
Chen, Liqing [1 ,2 ]
机构
[1] Huaiyin Inst Technol, Fac Comp & Software Engn, Huaian, Peoples R China
[2] Fujian Normal Univ, Fujian Prov Key Lab Network Secur & Cryptol, Fuzhou, Fujian, Peoples R China
关键词
blockchain-based; cryptographic reverse firewall; internet of vehicles; proxy re-encryption; security; TECHNOLOGY; SECURITY;
D O I
10.1002/nem.2305
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the internet of vehicles (IoV) technology develops, it promotes the intelligent interaction among vehicles, roadside units, and the environment. Nevertheless, it also brings vehicle information security challenges. In recent years, vehicle data sharing is suffering to algorithm substitution attacks (ASA), which means backdoor adversaries can carry out filtering attacks through data sharing. Therefore, this paper designs a blockchain-based proxy re-encryption (PRE) scheme with cryptographic reverse firewall (BIBPR-CRF) for IoV. In our proposal, CRF can promise the internal safety of vehicle units. More specifically, it can prevent ASA attacks while ensuring chosen plaintext attack (CPA)-security. Meanwhile, the PRE algorithm can provide the confidential sharing and secure operation of data. Moreover, we use a consortium blockchain service center (CBSC) to store the first ciphertext and re-encrypt it with smart contracts on the blockchain, which can avoid single point of failure and achieve higher efficiency compared to proxy servers. Finally, we evaluate the performance of BIBPR-CRF with regard to communication cost, computational cost, and energy consumption. Our proposal is the most fitting for IoV application, in contrast with the other three schemes. image
引用
收藏
页数:18
相关论文
共 50 条
  • [31] A new RSA-based proxy re-encryption scheme
    Wang, Liangliang
    Chen, Kefei
    Long, Yu
    Mao, Xianping
    Journal of Computational Information Systems, 2015, 11 (02): : 567 - 575
  • [32] A proxy re-encryption scheme based on elliptic curve group
    Yin, Shou-Lin (352720214@qq.com), 1600, Ubiquitous International (08):
  • [33] Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 564 - 575
  • [34] Group-based unidirectional proxy re-encryption scheme
    School of Information and Communication, Guilin University of Electronic and Technology, Guilin, Guangxi, 541004, China
    Inf. Technol. J., 2009, 1 (83-88):
  • [35] Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
    Jhong-Ting Lou
    Showkat Ahmad Bhat
    Nen-Fu Huang
    Peer-to-Peer Networking and Applications, 2023, 16 : 2415 - 2437
  • [36] Identity Based Proxy Re-encryption Scheme under LWE
    Yin, Wei
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zheng Ping
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 6116 - 6132
  • [37] Proxy Re-Encryption Based on Homomorphic Encryption
    Bellafqira, Reda
    Coatrieux, Gouenou
    Bouslimi, Dalel
    Quellec, Gwenole
    Cozic, Michel
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161
  • [38] Threshold Proxy Re-encryption and Its Application in Blockchain
    Chen, Xi
    Liu, Yun
    Li, Yong
    Lin, Changlu
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 16 - 25
  • [39] Secure bidirectional proxy re-encryption for cryptographic cloud storage
    Shao, Jun
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Kaitai
    PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 113 - 121
  • [40] Blockchain-based privacy-preserving data-sharing framework using proxy re-encryption scheme and interplanetary file system
    Lou, Jhong-Ting
    Bhat, Showkat Ahmad
    Huang, Nen-Fu
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2023, 16 (05) : 2415 - 2437