Parallel Key-Insulated Multiuser Searchable Encryption for Industrial Internet of Things

نویسندگان

چکیده

With the rapid development of industrial Internet Things (IIoT) and cloud computing, an increasing number companies outsource their data to servers save costs. To protect privacy, sensitive must be encrypted before being outsourced servers. A multiuser searchable encryption (MUSE) scheme was introduced ensure high efficiency retrieval. In IIoT system with numerous users, existing MUSE schemes suffer from certain key exposure problems owing limited protection smart devices frequent queries by users. this article, we propose a parallel key-insulated for IIoT. This utilizes broadcast technology implement MUSE. addition, our introduces primitive improve tolerance exposure. The security is proved in random oracle model. experimental results show that achieves computational efficiency.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Parallel Key-Insulated Public Key Encryption

Security is constantly been infringed by inadvertent loss of secret keys, and as a solution, Dodis, Katz, Xu, and Yung [11], in Eurocrypt 2002, proposed a new paradigm called key-insulated security which provides tolerance against key exposures. Their scheme introduces a “helper key” which is used to periodically update the decryption key. The most attractive part of this scheme is that even if...

متن کامل

Parallel Key-Insulated Public Key Encryption Without Random Oracles

Key-insulated cryptography is a crucial technique for protecting private keys. To strengthen the security of key-insulated protocols, Hanaoka, Hanaoka and Imai recently introduced the idea of parallel key-insulated encryption (PKIE) where distinct physically-secure devices (called helpers) are independently used in key updates. Their motivation was to reduce the risk of exposure for helpers by ...

متن کامل

Multi-Key Searchable Encryption

We construct a searchable encryption scheme that enables keyword search over data encrypted with different keys. The scheme is practical and was designed to be included in a new system for protecting data confidentiality in client-server applications against attacks on the server.

متن کامل

Attribute-Based Key-Insulated Encryption

Attribute-based encryption (ABE) is an exciting alternative to public-key encryption, as ABE develops encryption systems with high expressiveness, without the need for a public key infrastructure (PKI) that makes publicly available the mapping between identities (sets of attributes), public keys, and validity of the latter. Any setting, PKI or attribute-based, must provide a means to revoke use...

متن کامل

Public Key Searchable Encryption without Random Oracle ⋆

This article is described a new Public Key Encryption with Keyword Search (PEKS) scheme, which is semantically secure against chosen keyword attack, without assuming random oracle. The security of our scheme depends on the complexity assumption of Strong Diffie-Hellman (SDH). The computation operation for constructing cipher text and trapdoor of keyword is simpler than the most schemes introduc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Industrial Informatics

سال: 2022

ISSN: ['1551-3203', '1941-0050']

DOI: https://doi.org/10.1109/tii.2021.3110193