Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Lightweight attribute-based signcryption method for cloud and fog assisted Internet of Things

An Internet of Things, lightweight technology, applied in user identity/authority verification, key distribution, and can solve problems such as difficult load, difficult mathematical assumptions about attribute encryption security, and access control rights are not directly handed over.

Active Publication Date: 2020-07-24
QILU UNIV OF TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, outsourcing storage will inevitably cause a series of security problems, and the confidentiality and reliability of data are difficult to guarantee. There are two direct methods to solve these problems: first encrypt and then sign, or first sign and then encrypt
The basic attribute encryption scheme will encounter many problems when it is applied to the IoT scenario. First, the signature scheme of the ciphertext policy means that the device can define its own access structure, which is inconsistent with the reality. Generally speaking, in the IoT scenario, the Most of the anonymous authentication is controlled by the central organization; secondly, the encryption of the key policy makes it impossible for the data owner to define the access structure, which means that the access control right is not directly handed over to the data owner
Furthermore, the security of attribute encryption is mostly based on difficult mathematical assumptions, which means that the burden of decryption is overwhelming for resource-constrained IoT devices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight attribute-based signcryption method for cloud and fog assisted Internet of Things
  • Lightweight attribute-based signcryption method for cloud and fog assisted Internet of Things
  • Lightweight attribute-based signcryption method for cloud and fog assisted Internet of Things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0120] as attached figure 1 As shown, the light-weight attribute-based signcryption method for the cloud and fog to assist the Internet of Things of the present invention includes the following steps:

[0121] S100, the central organization performs system initialization, generates a system key pair, and discloses the public key, and the public key includes a symmetric encryption algorithm and a key generation function;

[0122] S200. The central agency specifies a decryption attribute set for the registered data user, and generates a decryption key and an outsourced decryption key corresponding to the data user based on the decryption attribute set, and the central agency specifies a signature for the data owner access structure, and generate a signature key and an outsourced signature key corresponding to the data owner based on the signature access structure;

[0123] S300. The data owner selects a set of attributes that satisfy the signature access structure, and calls th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a lightweight attribute-based signcryption method for cloud-assisted Internet of Things, belongs to the field of attribute-based signcryption, and aims to solve the technical problem of how to reduce the calculation burden required by signature and decryption on the basis of realizing data confidentiality and reliability. The method comprises the following steps that: a central mechanism initializes a system to generate a system key pair and discloses a public key in the system key pair, wherein the public key comprises a symmetric encryption algorithm and a key generation function; the central mechanism generates a decryption key and an outsourcing decryption key for a data user based on the decryption attribute set of the data user, and generates a signature key and an outsourcing signature key for the data user based on the signature access structure; a data owner calls a fog node to perform outsourcing signature, performs symmetric encryption on the plaintext based on the symmetric key, and signcrypts the symmetric key based on the self-defined encryption access structure attribute; and the data user calls the fog node to carry out outsourcing signatureverification, calls the fog node to carry out outsourcing decryption, and finally carries out symmetric decryption on the ciphertext based on an outsourcing decryption result.

Description

technical field [0001] The invention relates to the field of attribute-based signcryption, in particular to a lightweight attribute-based signcryption method used for cloud-fog-assisted Internet of Things. Background technique [0002] The Internet of Things is the development and extension of the traditional Internet. It connects physical objects in the real world with the online world, and provides more efficient and intelligent services for people's lives. Compared with traditional networks, the Internet of Things has two major differences: First, there are many IoT devices. According to Cisco’s annual Visual Networking Index, by 2022, machine-to-machine (M2M) connections supporting IoT applications will account for 28.5 billion worldwide. Second, IoT devices are heterogeneous, and resources (storage and computing, etc.) are very limited. Hence, the issue of data management in IoT is gaining in importance. [0003] In order to solve the contradiction between the large a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L63/0435H04L9/3247H04L9/0825H04L63/12H04L63/126H04L63/123H04L2209/72H04L9/0894H04L9/088H04L9/3073H04L9/0618H04L9/0869
Inventor 禹继国刘苏慧董安明王英龙
Owner QILU UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products