Guo et al., 2019 - Google Patents
Efficient hierarchical identity-based encryption system for internet of things infrastructureGuo et al., 2019
View HTML- Document ID
- 9225884206108909686
- Author
- Guo L
- Wang J
- Yau W
- Publication year
- Publication venue
- Symmetry
External Links
Snippet
Security is a main concern for the Internet of Things (IoT) infrastructure as large volumes of data are collected and processed in the systems. Due to the limited resources of interconnected sensors and devices in the IoT systems, efficiency is one of the key …
- 238000000034 method 0 abstract description 16
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
- H04L9/3073—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves involving pairings, e.g. identity based encryption [IBE], bilinear mappings or bilinear pairings, e.g. Weil or Tate pairing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
- H04L2209/805—Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fan et al. | Decentralized privacy-preserving data aggregation scheme for smart grid based on blockchain | |
Wu et al. | Hidden policy attribute-based data sharing with direct revocation and keyword search in cloud computing | |
Zhou et al. | Public key encryption with keyword search in cloud: a survey | |
Luo et al. | Secure and efficient data sharing scheme based on certificateless hybrid signcryption for cloud storage | |
Ming et al. | Identity-based encryption with filtered equality test for smart city applications | |
Fan et al. | Anonymous multi-receiver identity-based authenticated encryption with CCA security | |
Li et al. | A novel lattice-based CP-ABPRE scheme for cloud sharing | |
Jiao et al. | A computation-efficient group key distribution protocol based on a new secret sharing scheme | |
Guo et al. | Efficient hierarchical identity-based encryption system for internet of things infrastructure | |
Jemihin et al. | Attribute-based encryption in securing big data from post-quantum perspective: a survey | |
Shah et al. | Enhancing security and efficiency in underwater wireless sensor networks: a lightweight key management framework | |
Chen et al. | An identity-based cross-domain authenticated asymmetric group key agreement | |
Sun et al. | A secure and computable blockchain-based data sharing scheme in IoT system | |
Lin et al. | Identity-based proxy re-encryption scheme using fog computing and anonymous key generation | |
Xie et al. | Privacy-preserving location-based service scheme for mobile sensing data | |
Zhang et al. | Privacy-preserving multi-receiver certificateless broadcast encryption scheme with de-duplication | |
Cai et al. | Two-party privacy-preserving set intersection with FHE | |
Ren et al. | Clap-pre: certificateless autonomous path proxy re-encryption for data sharing in the cloud | |
Meshram et al. | A provably secure IBE transformation model for PKC using conformable Chebyshev chaotic maps under human-centered IoT environments | |
Zhang et al. | Adaptively secure efficient (H) IBE over ideal lattice with short parameters | |
Li | Efficient equality test on identity-based ciphertexts supporting flexible authorization | |
Antony et al. | Implementation of Elliptic Curves in the Polynomial Blom Key Pre-Distribution Scheme for Wireless Sensor Networks and Distributed Ledger Technology | |
Zheng et al. | A secure data-sharing scheme for privacy-preserving supporting node–edge–cloud collaborative computation | |
Yao et al. | A CP-ABE Scheme Based on Lattice LWE and Its Security Analysis | |
Feng et al. | A blockchain-based efficient and verifiable attribute-based proxy re-encryption cloud sharing scheme |