An ID-based Broadcast Encryption Scheme for Cloud-network Integration in Smart Grid

被引:3
|
作者
Niu, Shufen [1 ]
Fang, Lizhi [1 ]
Song, Mi [1 ]
Yu, Fei [1 ]
Han, Song [1 ]
机构
[1] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Peoples R China
基金
中国国家自然科学基金;
关键词
Smart grid; IoT; Identity-based; Broadcast encryption; Privacy-preserving; CHALLENGES; INTERNET; THINGS;
D O I
10.3837/tiis.2021.09.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth of data has successfully promoted the development of modern information and communication technologies, which are used to process data generated by public urban departments and citizens in modern cities. In specific application areas where the ciphertext of messages generated by different users' needs to be transmitted, the concept of broadcast encryption is important. It can not only improve the transmission efficiency but also reduce the cost. However, the existing schemes cannot entirely ensure the privacy of receivers and dynamically adjust the user authorization. To mitigate these deficiencies, we propose an efficient, secure identity-based broadcast encryption scheme that achieves direct revocation and receiver anonymity, along with the analysis of smart grid solutions. Moreover, we constructed a security model to ensure wireless data transmission under cloud computing and internet of things integrated devices. The achieved results reveal that the proposed scheme is semantically secure in the random oracle model. The performance of the proposed scheme is evaluated through theoretical analysis and numerical experiments.
引用
收藏
页码:3365 / 3383
页数:19
相关论文
共 50 条
  • [1] A new ID-based broadcast encryption scheme
    Yang, Chen
    Cheng, Xiangguo
    Ma, Wenping
    Wang, Xinmei
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2006, 4158 : 487 - 492
  • [2] An ID-based broadcast encryption scheme for key distribution
    Du, XJ
    Wang, Y
    Ge, JH
    Wang, YM
    IEEE TRANSACTIONS ON BROADCASTING, 2005, 51 (02) : 264 - 266
  • [3] An ID-based Broadcast Encryption Scheme for Collaborative Design
    Zhang, Ya-ling
    Zhang, Jing
    Zhang, Yi-kun
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 699 - 702
  • [4] Efficient ID-based broadcast encryption scheme - Comments
    Chien, Hung-Yu
    IEEE TRANSACTIONS ON BROADCASTING, 2007, 53 (04) : 809 - 810
  • [5] Self-enforcing ID-based broadcast encryption scheme
    Ministry of Education Key Lab. of Computer Networks and Info. Security, Xidian Univ., Xi'an710071, China
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban), 2007, 3 (133-135):
  • [6] An ID-based broadcast signcryption scheme
    Qi, Zheng-Hua
    Ren, Xun-Yi
    Yang, Geng
    Yao, Zhuo-Yu
    Sichuan Daxue Xuebao (Gongcheng Kexue Ban)/Journal of Sichuan University (Engineering Science Edition), 2012, 44 (01): : 118 - 122
  • [7] ID-based Encryption Scheme with Revocation
    Othman, Hafizul Azrie
    Ismail, Eddie Shahril
    4TH INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES (ICMS4): MATHEMATICAL SCIENCES: CHAMPIONING THE WAY IN A PROBLEM BASED AND DATA DRIVEN SOCIETY, 2017, 1830
  • [8] Comment on an ID-based Broadcast Signcryption Scheme
    Zhang, Jianhong
    Geng, Qin
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 37 - 40
  • [9] Efficient ID-Based Proxy Pre-Encryption Scheme for Data Sharing in Cloud
    Zhang, Jian-Hong
    Zhen, Wei-Na
    Zhao, Xu-Bing
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 378 - 383
  • [10] Fully Privacy-Preserving ID-Based Broadcast Encryption with Authorization
    Lai, Jianchang
    Mu, Yi
    Guo, Fuchun
    Chen, Rongmao
    COMPUTER JOURNAL, 2017, 60 (12): : 1809 - 1821