Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation
With the development and application of the Internet of Things (IoT), the volume of data generated daily by IoT devices is growing exponentially. These IoT devices, such as smart wearable devices, produce data containing sensitive personal information. However, since IoT devices and users often oper...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2025-01-01
|
Series: | Entropy |
Subjects: | |
Online Access: | https://www.mdpi.com/1099-4300/27/1/32 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832588557798080512 |
---|---|
author | Yuan Zhai Tao Wang Yanwei Zhou Feng Zhu Bo Yang |
author_facet | Yuan Zhai Tao Wang Yanwei Zhou Feng Zhu Bo Yang |
author_sort | Yuan Zhai |
collection | DOAJ |
description | With the development and application of the Internet of Things (IoT), the volume of data generated daily by IoT devices is growing exponentially. These IoT devices, such as smart wearable devices, produce data containing sensitive personal information. However, since IoT devices and users often operate in untrusted external environments, their encrypted data remain vulnerable to potential privacy leaks and security threats from malicious coercion. Additionally, access control and management of these data remain critical issues. To address these challenges, this paper proposes a novel coercion-resistant ciphertext-policy attribute-based encryption scheme. The scheme leverages chameleon hashing to enhance deniable encryption, achieving coercion resistance, thereby enabling IoT data to resist coercion attacks. Moreover, the scheme employs attribute-based encryption to secure IoT data, enabling fine-grained access control and dynamic user access management, providing a secure and flexible solution for vast IoT data. We construct the scheme on a composite order bilinear group and provide formal proofs for its coercion resistance, correctness, and security. Finally, through experimental comparisons, we demonstrate the efficiency and feasibility of the proposed scheme. |
format | Article |
id | doaj-art-74a56ddf6aca498ea162d25def9fe06c |
institution | Kabale University |
issn | 1099-4300 |
language | English |
publishDate | 2025-01-01 |
publisher | MDPI AG |
record_format | Article |
series | Entropy |
spelling | doaj-art-74a56ddf6aca498ea162d25def9fe06c2025-01-24T13:31:44ZengMDPI AGEntropy1099-43002025-01-012713210.3390/e27010032Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy RevocationYuan Zhai0Tao Wang1Yanwei Zhou2Feng Zhu3Bo Yang4School of Computer Science, Shaanxi Normal University, Xi’an 710062, ChinaSchool of Computer Science, Shaanxi Normal University, Xi’an 710062, ChinaSchool of Computer Science, Shaanxi Normal University, Xi’an 710062, ChinaKoal Software Co., Ltd., 299, Jiangchang West Road, Jing’an District, Shanghai 200436, ChinaSchool of Computer Science, Shaanxi Normal University, Xi’an 710062, ChinaWith the development and application of the Internet of Things (IoT), the volume of data generated daily by IoT devices is growing exponentially. These IoT devices, such as smart wearable devices, produce data containing sensitive personal information. However, since IoT devices and users often operate in untrusted external environments, their encrypted data remain vulnerable to potential privacy leaks and security threats from malicious coercion. Additionally, access control and management of these data remain critical issues. To address these challenges, this paper proposes a novel coercion-resistant ciphertext-policy attribute-based encryption scheme. The scheme leverages chameleon hashing to enhance deniable encryption, achieving coercion resistance, thereby enabling IoT data to resist coercion attacks. Moreover, the scheme employs attribute-based encryption to secure IoT data, enabling fine-grained access control and dynamic user access management, providing a secure and flexible solution for vast IoT data. We construct the scheme on a composite order bilinear group and provide formal proofs for its coercion resistance, correctness, and security. Finally, through experimental comparisons, we demonstrate the efficiency and feasibility of the proposed scheme.https://www.mdpi.com/1099-4300/27/1/32internet of thingsdata privacydeniable encryptionciphertext-policy attribute-based encryption |
spellingShingle | Yuan Zhai Tao Wang Yanwei Zhou Feng Zhu Bo Yang Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation Entropy internet of things data privacy deniable encryption ciphertext-policy attribute-based encryption |
title | Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation |
title_full | Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation |
title_fullStr | Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation |
title_full_unstemmed | Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation |
title_short | Towards Secure Internet of Things: A Coercion-Resistant Attribute-Based Encryption Scheme with Policy Revocation |
title_sort | towards secure internet of things a coercion resistant attribute based encryption scheme with policy revocation |
topic | internet of things data privacy deniable encryption ciphertext-policy attribute-based encryption |
url | https://www.mdpi.com/1099-4300/27/1/32 |
work_keys_str_mv | AT yuanzhai towardssecureinternetofthingsacoercionresistantattributebasedencryptionschemewithpolicyrevocation AT taowang towardssecureinternetofthingsacoercionresistantattributebasedencryptionschemewithpolicyrevocation AT yanweizhou towardssecureinternetofthingsacoercionresistantattributebasedencryptionschemewithpolicyrevocation AT fengzhu towardssecureinternetofthingsacoercionresistantattributebasedencryptionschemewithpolicyrevocation AT boyang towardssecureinternetofthingsacoercionresistantattributebasedencryptionschemewithpolicyrevocation |