Parallel Key-Insulated Multiuser Searchable Encryption for Industrial Internet of Things
نویسندگان
چکیده
With the rapid development of industrial Internet Things (IIoT) and cloud computing, an increasing number companies outsource their data to servers save costs. To protect privacy, sensitive must be encrypted before being outsourced servers. A multiuser searchable encryption (MUSE) scheme was introduced ensure high efficiency retrieval. In IIoT system with numerous users, existing MUSE schemes suffer from certain key exposure problems owing limited protection smart devices frequent queries by users. this article, we propose a parallel key-insulated for IIoT. This utilizes broadcast technology implement MUSE. addition, our introduces primitive improve tolerance exposure. The security is proved in random oracle model. experimental results show that achieves computational efficiency.
منابع مشابه
Parallel Key-Insulated Public Key Encryption
Security is constantly been infringed by inadvertent loss of secret keys, and as a solution, Dodis, Katz, Xu, and Yung [11], in Eurocrypt 2002, proposed a new paradigm called key-insulated security which provides tolerance against key exposures. Their scheme introduces a “helper key” which is used to periodically update the decryption key. The most attractive part of this scheme is that even if...
متن کاملParallel Key-Insulated Public Key Encryption Without Random Oracles
Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently introduced the idea of parallel key-insulated encryption (PKIE) where distinct physically-secure devices (called helpers) are independently used in key updates. Their motivation was to reduce the risk of exposure for helpers by ...
متن کاملMulti-Key Searchable Encryption
We construct a searchable encryption scheme that enables keyword search over data encrypted with different keys. The scheme is practical and was designed to be included in a new system for protecting data confidentiality in client-server applications against attacks on the server.
متن کاملAttribute-Based Key-Insulated Encryption
Attribute-based encryption (ABE) is an exciting alternative to public-key encryption, as ABE develops encryption systems with high expressiveness, without the need for a public key infrastructure (PKI) that makes publicly available the mapping between identities (sets of attributes), public keys, and validity of the latter. Any setting, PKI or attribute-based, must provide a means to revoke use...
متن کاملPublic Key Searchable Encryption without Random Oracle ⋆
This article is described a new Public Key Encryption with Keyword Search (PEKS) scheme, which is semantically secure against chosen keyword attack, without assuming random oracle. The security of our scheme depends on the complexity assumption of Strong Diffie-Hellman (SDH). The computation operation for constructing cipher text and trapdoor of keyword is simpler than the most schemes introduc...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Industrial Informatics
سال: 2022
ISSN: ['1551-3203', '1941-0050']
DOI: https://doi.org/10.1109/tii.2021.3110193