Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation

With the development and application of the Internet of Things (IoT), the volume of data generated daily by IoT devices is growing exponentially. These IoT devices, such as smart wearable devices, produce data containing sensitive personal information. However, since IoT devices and users often oper...

Full description

Saved in:
Bibliographic Details
Main Authors: Yuan Zhai, Tao Wang, Yanwei Zhou, Feng Zhu, Bo Yang
Format: Article
Language:English
Published: MDPI AG 2025-01-01
Series:Entropy
Subjects:
Online Access:https://www.mdpi.com/1099-4300/27/1/32
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832588557798080512
author Yuan Zhai
Tao Wang
Yanwei Zhou
Feng Zhu
Bo Yang
author_facet Yuan Zhai
Tao Wang
Yanwei Zhou
Feng Zhu
Bo Yang
author_sort Yuan Zhai
collection DOAJ
description With the development and application of the Internet of Things (IoT), the volume of data generated daily by IoT devices is growing exponentially. These IoT devices, such as smart wearable devices, produce data containing sensitive personal information. However, since IoT devices and users often operate in untrusted external environments, their encrypted data remain vulnerable to potential privacy leaks and security threats from malicious coercion. Additionally, access control and management of these data remain critical issues. To address these challenges, this paper proposes a novel coercion-resistant ciphertext-policy attribute-based encryption scheme. The scheme leverages chameleon hashing to enhance deniable encryption, achieving coercion resistance, thereby enabling IoT data to resist coercion attacks. Moreover, the scheme employs attribute-based encryption to secure IoT data, enabling fine-grained access control and dynamic user access management, providing a secure and flexible solution for vast IoT data. We construct the scheme on a composite order bilinear group and provide formal proofs for its coercion resistance, correctness, and security. Finally, through experimental comparisons, we demonstrate the efficiency and feasibility of the proposed scheme.
format Article
id doaj-art-74a56ddf6aca498ea162d25def9fe06c
institution Kabale University
issn 1099-4300
language English
publishDate 2025-01-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj-art-74a56ddf6aca498ea162d25def9fe06c2025-01-24T13:31:44ZengMDPI AGEntropy1099-43002025-01-012713210.3390/e27010032Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy RevocationYuan Zhai0Tao Wang1Yanwei Zhou2Feng Zhu3Bo Yang4School of Computer Science, Shaanxi Normal University, Xi’an 710062, ChinaSchool of Computer Science, Shaanxi Normal University, Xi’an 710062, ChinaSchool of Computer Science, Shaanxi Normal University, Xi’an 710062, ChinaKoal Software Co., Ltd., 299, Jiangchang West Road, Jing’an District, Shanghai 200436, ChinaSchool of Computer Science, Shaanxi Normal University, Xi’an 710062, ChinaWith the development and application of the Internet of Things (IoT), the volume of data generated daily by IoT devices is growing exponentially. These IoT devices, such as smart wearable devices, produce data containing sensitive personal information. However, since IoT devices and users often operate in untrusted external environments, their encrypted data remain vulnerable to potential privacy leaks and security threats from malicious coercion. Additionally, access control and management of these data remain critical issues. To address these challenges, this paper proposes a novel coercion-resistant ciphertext-policy attribute-based encryption scheme. The scheme leverages chameleon hashing to enhance deniable encryption, achieving coercion resistance, thereby enabling IoT data to resist coercion attacks. Moreover, the scheme employs attribute-based encryption to secure IoT data, enabling fine-grained access control and dynamic user access management, providing a secure and flexible solution for vast IoT data. We construct the scheme on a composite order bilinear group and provide formal proofs for its coercion resistance, correctness, and security. Finally, through experimental comparisons, we demonstrate the efficiency and feasibility of the proposed scheme.https://www.mdpi.com/1099-4300/27/1/32internet of thingsdata privacydeniable encryptionciphertext-policy attribute-based encryption
spellingShingle Yuan Zhai
Tao Wang
Yanwei Zhou
Feng Zhu
Bo Yang
Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation
Entropy
internet of things
data privacy
deniable encryption
ciphertext-policy attribute-based encryption
title Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation
title_full Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation
title_fullStr Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation
title_full_unstemmed Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation
title_short Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation
title_sort towards secure internet of things a coercion resistant attribute based encryption scheme with policy revocation
topic internet of things
data privacy
deniable encryption
ciphertext-policy attribute-based encryption
url https://www.mdpi.com/1099-4300/27/1/32
work_keys_str_mv AT yuanzhai towardssecureinternetofthingsacoercionresistantattributebasedencryptionschemewithpolicyrevocation
AT taowang towardssecureinternetofthingsacoercionresistantattributebasedencryptionschemewithpolicyrevocation
AT yanweizhou towardssecureinternetofthingsacoercionresistantattributebasedencryptionschemewithpolicyrevocation
AT fengzhu towardssecureinternetofthingsacoercionresistantattributebasedencryptionschemewithpolicyrevocation
AT boyang towardssecureinternetofthingsacoercionresistantattributebasedencryptionschemewithpolicyrevocation