Anonymous identity-based broadcast encryption technology for smart city information system

作者: Kai He , Jian Weng , Yijun Mao , Huaqiang Yuan , None

DOI: 10.1007/S00779-017-1053-X

关键词: Smart cityComputer securityBroadcast encryptionInformation sensitivityUbiquitous networkComputer sciencePublic-key cryptographyMobile computingInformation systemInternet privacyAnonymity

摘要: A smart city can utilize information and communication technologies to minimize energy, waste, resource consumption attain high-efficiency services, so it directly improves the life quality of all residents. However, also brings about some security privacy challenges. For instance, once ubiquitous network in is attacked, sensitive residents' identities will be revealed. In many application scenarios, anonymity residents a desirable property. After all, nobody wants traced for his daily activity or personal habits. this paper, we propose generic identity-based broadcast encryption scheme which satisfy information's confidentiality users' simultaneously under chosen-ciphertext attacks. What different from our previous work was published ACISP 2016 that present proof focus on environment. The IBBE construction has property its public parameter size private key are constant as well decryption cost independent number receivers. Thus, no matter point views, very appropriate system.

参考文章(48)
Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin, Hierarchical Identity-Based Broadcast Encryption Information Security and Privacy. pp. 242- 257 ,(2014) , 10.1007/978-3-319-08344-5_16
Dan Boneh, Brent Waters, Adam Barth, Privacy in Encrypted Content Distribution Using Private Broadcast Encryption Financial Cryptography and Data Security. pp. 52- 64 ,(2006) , 10.1007/11889663_4
Tsz Hon Yuen, Cong Zhang, Sherman S. M. Chow, Joseph K. Liu, Towards Anonymous Ciphertext Indistinguishability with Identity Leakage Provable Security. pp. 139- 153 ,(2013) , 10.1007/978-3-642-41227-1_8
Jianhong Zhang, Jian Mao, An improved anonymous multi‐receiver identity‐based encryption scheme International Journal of Communication Systems. ,vol. 28, pp. 645- 658 ,(2015) , 10.1002/DAC.2693
M. Barbosa, P. Farshim, Efficient Identity-Based Key Encapsulation to Multiple Parties Cryptography and Coding. ,vol. 3796, pp. 428- 441 ,(2005) , 10.1007/11586821_28
Sanjit Chatterjee, Palash Sarkar, Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext Progress in Cryptology - INDOCRYPT 2006. pp. 394- 408 ,(2006) , 10.1007/11941378_28
Cécile Delerablée, Identity-based broadcast encryption with constant size ciphertexts and private keys international conference on the theory and application of cryptology and information security. pp. 200- 215 ,(2007) , 10.1007/978-3-540-76900-2_12
Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo, Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption Public Key Cryptography - PKC 2005. pp. 380- 397 ,(2005) , 10.1007/978-3-540-30580-4_26
Craig Gentry, Brent Waters, Adaptive Security in Broadcast Encryption Systems (with Short Ciphertexts) international cryptology conference. pp. 171- 188 ,(2009) , 10.1007/978-3-642-01001-9_10
Felipe Silva Ferraz, Carlos Andre Guimaraes Ferraz, More than Meets the Eye in Smart City Information Security: Exploring Security Issues Far beyond Privacy Concerns 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops. pp. 677- 685 ,(2014) , 10.1109/UIC-ATC-SCALCOM.2014.143