An ID-based Broadcast Encryption Scheme for Cloud-network Integration in Smart Grid

被引:3
|
作者
Niu, Shufen [1 ]
Fang, Lizhi [1 ]
Song, Mi [1 ]
Yu, Fei [1 ]
Han, Song [1 ]
机构
[1] Northwest Normal Univ, Coll Comp Sci & Engn, Lanzhou 730070, Peoples R China
基金
中国国家自然科学基金;
关键词
Smart grid; IoT; Identity-based; Broadcast encryption; Privacy-preserving; CHALLENGES; INTERNET; THINGS;
D O I
10.3837/tiis.2021.09.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The rapid growth of data has successfully promoted the development of modern information and communication technologies, which are used to process data generated by public urban departments and citizens in modern cities. In specific application areas where the ciphertext of messages generated by different users' needs to be transmitted, the concept of broadcast encryption is important. It can not only improve the transmission efficiency but also reduce the cost. However, the existing schemes cannot entirely ensure the privacy of receivers and dynamically adjust the user authorization. To mitigate these deficiencies, we propose an efficient, secure identity-based broadcast encryption scheme that achieves direct revocation and receiver anonymity, along with the analysis of smart grid solutions. Moreover, we constructed a security model to ensure wireless data transmission under cloud computing and internet of things integrated devices. The achieved results reveal that the proposed scheme is semantically secure in the random oracle model. The performance of the proposed scheme is evaluated through theoretical analysis and numerical experiments.
引用
收藏
页码:3365 / 3383
页数:19
相关论文
共 50 条
  • [31] Efficient hybrid encryption from ID-based encryption
    Abe, Masayuki
    Cui, Yang
    Imai, Hideki
    Kiltz, Eike
    DESIGNS CODES AND CRYPTOGRAPHY, 2010, 54 (03) : 205 - 240
  • [32] Modified ID-based threshold decryption and its application to mediated ID-based encryption
    Ju, HS
    Kim, DY
    Lee, DH
    Park, H
    Chun, K
    FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 720 - 725
  • [33] A proposal of efficient scheme of key management using ID-based encryption and biometrics
    Izumi, Akitoshi
    Ueshige, Yoshifumi
    Sakurai, Kouichi
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 29 - +
  • [34] ID-based authentication scheme combined with identity-based encryption with fingerprint hashing
    Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China
    不详
    J. China Univ. Post Telecom., 2008, 4 (75-80,120):
  • [36] Accelerated Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks
    Benzaid, Chafika
    Medjadba, Sana
    Al-Nemrat, Ameer
    Badache, Nadjib
    15TH IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE 2012) / 10TH IEEE/IFIP INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING (EUC 2012), 2012, : 633 - 639
  • [37] Fast Verification of an ID-based Signature Scheme for Broadcast Authentication in Wireless Sensor Networks
    Benzaid, Chafika
    Medjadba, Sana
    Badache, Nadjib
    2012 IEEE 9TH INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS (MASS): WORKSHOPS, 2012,
  • [38] ID-based key agreement for multimedia encryption
    Yi, X
    Tan, CH
    Siew, CK
    Syed, MR
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2002, 48 (02) : 298 - 303
  • [39] Group ID-Based Encryption with Equality Test
    Ling, Yunhao
    Ma, Sha
    Huang, Qiong
    Xiang, Ru
    Li, Ximing
    INFORMATION SECURITY AND PRIVACY, ACISP 2019, 2019, 11547 : 39 - 57
  • [40] An Efficient Attribute Based Encryption Scheme in Smart Grid
    Yang, Wenti
    Guan, Zhitao
    CYBERSPACE SAFETY AND SECURITY, PT I, 2020, 11982 : 159 - 172