Suppr超能文献

基于身份的代理重加密方案,利用雾计算和匿名密钥生成。

Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation.

机构信息

Department of Computer Science and Engineering, National Taiwan Ocean University, Keelung 202, Taiwan.

出版信息

Sensors (Basel). 2023 Mar 1;23(5):2706. doi: 10.3390/s23052706.

Abstract

In the fog computing architecture, a fog is a node closer to clients and responsible for responding to users' requests as well as forwarding messages to clouds. In some medical applications such as the remote healthcare, a sensor of patients will first send encrypted data of sensed information to a nearby fog such that the fog acting as a re-encryption proxy could generate a re-encrypted ciphertext designated for requested data users in the cloud. Specifically, a data user can request access to cloud ciphertexts by sending a query to the fog node that will forward this query to the corresponding data owner who preserves the right to grant or deny the permission to access his/her data. When the access request is granted, the fog node will obtain a unique re-encryption key for carrying out the re-encryption process. Although some previous concepts have been proposed to fulfill these application requirements, they either have known security flaws or incur higher computational complexity. In this work, we present an identity-based proxy re-encryption scheme on the basis of the fog computing architecture. Our identity-based mechanism uses public channels for key distribution and avoids the troublesome problem of key escrow. We also formally prove that the proposed protocol is secure in the IND-PrID-CPA notion. Furthermore, we show that our work exhibits better performance in terms of computational complexity.

摘要

在雾计算架构中,雾是靠近客户端的节点,负责响应用户的请求以及将消息转发到云。在一些医疗应用中,如远程医疗,患者的传感器将首先将感知信息的加密数据发送到附近的雾,以便充当重新加密代理的雾可以为云中请求数据用户生成指定的重新加密密文。具体来说,数据用户可以通过向雾节点发送查询来请求访问云密文,该雾节点将转发此查询到相应的数据所有者,数据所有者有权授予或拒绝访问其数据的权限。当访问请求被授予时,雾节点将获得用于执行重新加密过程的唯一重新加密密钥。虽然已经提出了一些先前的概念来满足这些应用要求,但它们要么存在已知的安全缺陷,要么导致更高的计算复杂度。在这项工作中,我们提出了一种基于雾计算架构的基于身份的代理重加密方案。我们的基于身份的机制使用公共通道进行密钥分发,并避免了密钥托管的麻烦问题。我们还正式证明了所提出的协议在 IND-PrID-CPA 意义上是安全的。此外,我们表明我们的工作在计算复杂性方面表现出更好的性能。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/d288/10007563/0ff1437ef211/sensors-23-02706-g001.jpg

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验