4.8 Article

Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things

Journal

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
Volume 14, Issue 2, Pages 759-767

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2017.2703922

Keywords

Certificateless public key encryption; Industrial Internet of Things (IIoT); privacy; security

Funding

  1. National Natural Science Foundation of China [61572379, 61501333, 61402339, U1536204]
  2. National High-Tech Research and Development Program of China (863 Program) [2015AA016004]
  3. State Key Laboratory of Cryptology
  4. Natural Science Foundation of Hubei Province of China [2015CFB257]

Ask authors/readers for more resources

With the widespread adoption of Internet of Things and cloud computing in different industry sectors, an increasing number of individuals or organizations are outsourcing their Industrial Internet of Things (IIoT) data in the cloud server to achieve cost saving and collaboration (e.g., data sharing). However, in this environment, preserving the privacy of data remains a key challenge and inhibiting factor to an even wider adoption of IIoT in the cloud environment. To mitigate these issues, in this paper, we design a new secure channel-free certificateless search-able public key encryption with multiple keywords scheme for IIoT deployment. We then demonstrate the security of the scheme in the random oracle model against two types of adversaries, where one adversary is given the power to choose a random public key instead of any user's public key and another adversary is allowed to learn the system master key. In the presence of these types of adversaries, we evaluate the performance of the proposed scheme and demonstrate that it achieves computational) efficiency with low communication cost.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available