基于可撤销证书的边缘启用 IIoT 广播签名加密方案

IF 8.1 1区 计算机科学 0 COMPUTER SCIENCE, INFORMATION SYSTEMS Information Sciences Pub Date : 2024-10-10 DOI:10.1016/j.ins.2024.121540
Yan Gao , Lunzhi Deng , Shuai Feng , Huan Liu , Binhan Li , Na Wang
{"title":"基于可撤销证书的边缘启用 IIoT 广播签名加密方案","authors":"Yan Gao ,&nbsp;Lunzhi Deng ,&nbsp;Shuai Feng ,&nbsp;Huan Liu ,&nbsp;Binhan Li ,&nbsp;Na Wang","doi":"10.1016/j.ins.2024.121540","DOIUrl":null,"url":null,"abstract":"<div><div>In edge computing-enabled Industrial Internet of Things (edge-enabled IIoT), edge computing facilitates data processing with reduced latency, enhanced reliability, and optimized real-time resource use. With the rapid increase in connected devices, ensuring secure data sharing among them is crucial. Broadcast signcryption technology is an excellent choice for achieving data confidentiality and authentication while enhancing operational efficiency. With devices potentially expiring, aging, or suffering damage, the prompt revocation of their decryption privileges is essential. Currently, there is a lack of research that simultaneously integrates broadcast signcryption with a revocation mechanism. In this paper, we propose a revocable certificate-based broadcast signcryption (RCB-BSC) scheme tailored for edge-enabled IIoT. In our work, base station generates a signcrypted ciphertext for multiple edge computing nodes (ECNs), and sends it to edge service (ES). The ES revokes the access of illegitimate ECNs and generates a new ciphertext for those ECNs with non-revoked decryption privileges, allowing them to decrypt the message using their private keys. Under the random oracle model (ROM), our scheme achieves plaintext confidentiality, ensures anonymity of receivers, and authenticates the legitimacy of the broadcaster. Moreover, the performance analysis shows our scheme excels in computation and communication efficiency, making it ideal for edge-enabled IIoT.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"690 ","pages":"Article 121540"},"PeriodicalIF":8.1000,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Revocable certificate-based broadcast signcryption scheme for edge-enabled IIoT\",\"authors\":\"Yan Gao ,&nbsp;Lunzhi Deng ,&nbsp;Shuai Feng ,&nbsp;Huan Liu ,&nbsp;Binhan Li ,&nbsp;Na Wang\",\"doi\":\"10.1016/j.ins.2024.121540\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>In edge computing-enabled Industrial Internet of Things (edge-enabled IIoT), edge computing facilitates data processing with reduced latency, enhanced reliability, and optimized real-time resource use. With the rapid increase in connected devices, ensuring secure data sharing among them is crucial. Broadcast signcryption technology is an excellent choice for achieving data confidentiality and authentication while enhancing operational efficiency. With devices potentially expiring, aging, or suffering damage, the prompt revocation of their decryption privileges is essential. Currently, there is a lack of research that simultaneously integrates broadcast signcryption with a revocation mechanism. In this paper, we propose a revocable certificate-based broadcast signcryption (RCB-BSC) scheme tailored for edge-enabled IIoT. In our work, base station generates a signcrypted ciphertext for multiple edge computing nodes (ECNs), and sends it to edge service (ES). The ES revokes the access of illegitimate ECNs and generates a new ciphertext for those ECNs with non-revoked decryption privileges, allowing them to decrypt the message using their private keys. Under the random oracle model (ROM), our scheme achieves plaintext confidentiality, ensures anonymity of receivers, and authenticates the legitimacy of the broadcaster. Moreover, the performance analysis shows our scheme excels in computation and communication efficiency, making it ideal for edge-enabled IIoT.</div></div>\",\"PeriodicalId\":51063,\"journal\":{\"name\":\"Information Sciences\",\"volume\":\"690 \",\"pages\":\"Article 121540\"},\"PeriodicalIF\":8.1000,\"publicationDate\":\"2024-10-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Sciences\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0020025524014543\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"0\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Sciences","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0020025524014543","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"0","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

在支持边缘计算的工业物联网(edge-enabled IIoT)中,边缘计算通过减少延迟、提高可靠性和优化实时资源使用来促进数据处理。随着联网设备的迅速增加,确保这些设备之间的安全数据共享至关重要。广播式签名加密技术是在提高运行效率的同时实现数据保密性和身份验证的绝佳选择。由于设备有可能过期、老化或损坏,因此及时撤销其解密权限至关重要。目前,还缺乏将广播式签名加密与撤销机制同时集成的研究。在本文中,我们提出了一种基于证书的可撤销广播加密(RCB-BSC)方案,该方案专为边缘启用的物联网量身定制。在我们的工作中,基站为多个边缘计算节点(ECN)生成签名加密密文,并将其发送给边缘服务(ES)。ES 会撤销非法 ECN 的访问权限,并为那些拥有未撤销解密权限的 ECN 生成新的密文,允许它们使用自己的私钥解密信息。在随机甲骨文模型(ROM)下,我们的方案实现了明文保密性,确保了接收者的匿名性,并验证了广播者的合法性。此外,性能分析表明,我们的方案在计算和通信效率方面表现出色,因此非常适合支持边缘的物联网。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Revocable certificate-based broadcast signcryption scheme for edge-enabled IIoT
In edge computing-enabled Industrial Internet of Things (edge-enabled IIoT), edge computing facilitates data processing with reduced latency, enhanced reliability, and optimized real-time resource use. With the rapid increase in connected devices, ensuring secure data sharing among them is crucial. Broadcast signcryption technology is an excellent choice for achieving data confidentiality and authentication while enhancing operational efficiency. With devices potentially expiring, aging, or suffering damage, the prompt revocation of their decryption privileges is essential. Currently, there is a lack of research that simultaneously integrates broadcast signcryption with a revocation mechanism. In this paper, we propose a revocable certificate-based broadcast signcryption (RCB-BSC) scheme tailored for edge-enabled IIoT. In our work, base station generates a signcrypted ciphertext for multiple edge computing nodes (ECNs), and sends it to edge service (ES). The ES revokes the access of illegitimate ECNs and generates a new ciphertext for those ECNs with non-revoked decryption privileges, allowing them to decrypt the message using their private keys. Under the random oracle model (ROM), our scheme achieves plaintext confidentiality, ensures anonymity of receivers, and authenticates the legitimacy of the broadcaster. Moreover, the performance analysis shows our scheme excels in computation and communication efficiency, making it ideal for edge-enabled IIoT.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Information Sciences
Information Sciences 工程技术-计算机:信息系统
CiteScore
14.00
自引率
17.30%
发文量
1322
审稿时长
10.4 months
期刊介绍: Informatics and Computer Science Intelligent Systems Applications is an esteemed international journal that focuses on publishing original and creative research findings in the field of information sciences. We also feature a limited number of timely tutorial and surveying contributions. Our journal aims to cater to a diverse audience, including researchers, developers, managers, strategic planners, graduate students, and anyone interested in staying up-to-date with cutting-edge research in information science, knowledge engineering, and intelligent systems. While readers are expected to share a common interest in information science, they come from varying backgrounds such as engineering, mathematics, statistics, physics, computer science, cell biology, molecular biology, management science, cognitive science, neurobiology, behavioral sciences, and biochemistry.
期刊最新文献
Editorial Board Community structure testing by counting frequent common neighbor sets Finite-time secure synchronization for stochastic complex networks with delayed coupling under deception attacks: A two-step switching control scheme Adaptive granular data compression and interval granulation for efficient classification Introducing fairness in network visualization
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1