Revocable certificate-based broadcast signcryption scheme for edge-enabled IIoT

被引:0
|
作者
Gao, Yan [1 ]
Deng, Lunzhi [1 ]
Liu, Huan [1 ]
Li, Binhan [1 ]
Wang, Na [2 ]
机构
[1] Guizhou Normal Univ, Guizhou Prov Specialized Key Lab Informat Secur Te, Sch Math Sci, Guiyang 550001, Peoples R China
[2] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100191, Peoples R China
基金
中国国家自然科学基金;
关键词
Certificate-based cryptography; Broadcast signcryption; Revocable; Edge-enabled IIoT; Random oracle model; ENCRYPTION; EFFICIENT;
D O I
10.1016/j.ins.2024.121540
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In edge computing-enabled Industrial Internet of Things (edge-enabled IIoT), edge computing facilitates data processing with reduced latency, enhanced reliability, and optimized realtime resource use. With the rapid increase in connected devices, ensuring secure data sharing among them is crucial. Broadcast signcryption technology is an excellent choice for achieving data confidentiality and authentication while enhancing operational efficiency. With devices potentially expiring, aging, or suffering damage, the prompt revocation of their decryption privileges is essential. Currently, there is a lack of research that simultaneously integrates broadcast signcryption with a revocation mechanism. In this paper, we propose a revocable certificate-based broadcast signcryption (RCB-BSC) scheme tailored for edge-enabled IIoT. In our work, base station generates a signcrypted ciphertext for multiple edge computing nodes (ECNs), and sends it to edge service (ES). The ES revokes the access of illegitimate ECNs and generates a new ciphertext for those ECNs with non-revoked decryption privileges, allowing them to decrypt the message using their private keys. Under the random oracle model (ROM), our scheme achieves plaintext confidentiality, ensures anonymity of receivers, and authenticates the legitimacy of the broadcaster. Moreover, the performance analysis shows our scheme excels in computation and communication efficiency, making it ideal for edge-enabled IIoT.
引用
收藏
页数:20
相关论文
共 50 条
  • [41] An ID-based broadcast signcryption scheme
    Qi, Zheng-Hua
    Ren, Xun-Yi
    Yang, Geng
    Yao, Zhuo-Yu
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2012, 44 (01): : 118 - 122
  • [42] Trust-AoI-Aware Codesign of Scheduling and Control for Edge-Enabled IIoT Systems
    Wang, Xiaolin
    Zhang, Jinglong
    Chen, Cailian
    He, Jianping
    Ma, Yehan
    Guan, Xinping
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (02) : 2833 - 2842
  • [43] An Efficient and Secure Data Sharing Scheme for Edge-Enabled IoT
    Yu, Jiguo
    Yan, Biwei
    Qi, Huayi
    Wang, Shengling
    Cheng, Wei
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (01) : 178 - 191
  • [44] An Efficient and Provably Secure Certificate-Based Encryption Scheme
    Lu, Yang
    THEORETICAL AND MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE, 2011, 164 : 54 - 61
  • [45] A Short Certificate-based Signature Scheme with Provable Security
    Hung, Ying-Hao
    Huang, Sen-Shan
    Tseng, Yuh-Min
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (03): : 243 - 253
  • [46] An efficient certificate-based designated verifier signature scheme
    1600, Slovak Academy of Sciences (35):
  • [47] Certificate-Based Signature Scheme with Continuous Leakage Resilience
    Zhou Y.-W.
    Ma K.
    Qiao Z.-R.
    Yang B.
    Gu C.-X.
    Jisuanji Xuebao/Chinese Journal of Computers, 2022, 45 (11): : 2363 - 2376
  • [48] Certificate-Based Encryption Scheme with General Access Structure
    Hyla, Tomasz
    Pejas, Jerzy
    COMPUTER INFORMATION SYSTEMS AND INDUSTRIAL MANAGEMENT (CISIM), 2012, 7564 : 41 - 55
  • [49] Efficient certificate-based verifiable encrypted signature scheme
    Huang, Rufen
    Nong, Qiang
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2014, 13 (3-4) : 257 - 267
  • [50] An Efficient Certificate-Based Signature Scheme in the Standard Model
    Wang, Guoqiang
    Cao, Yanmei
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2021), PT I, 2021, 12726 : 313 - 329