SM9‑based CP‑ABE Access Control Scheme under Power IoT

[Purposes] This work has been carried out to achieve fine-grained access control based on the existing power IoT. [Methods] A ciphertext policy attribute based encryption (CPABE) scheme for power IoT scenarios based on the SM9 algorithm was proposed. [Results] On one hand, the proposed scheme solves...

Full description

Saved in:
Bibliographic Details
Main Authors: ZHANG Yanjie, WANG Hui, LI Yan, ZHANG Xing, ZHANG Liang, YUAN Yanfang, SHI Zhentong
Format: Article
Language:English
Published: Editorial Office of Journal of Taiyuan University of Technology 2025-05-01
Series:Taiyuan Ligong Daxue xuebao
Subjects:
Online Access:https://tyutjournal.tyut.edu.cn/englishpaper/show-2420.html
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849471913355640832
author ZHANG Yanjie
WANG Hui
LI Yan
ZHANG Xing
ZHANG Liang
YUAN Yanfang
SHI Zhentong
author_facet ZHANG Yanjie
WANG Hui
LI Yan
ZHANG Xing
ZHANG Liang
YUAN Yanfang
SHI Zhentong
author_sort ZHANG Yanjie
collection DOAJ
description [Purposes] This work has been carried out to achieve fine-grained access control based on the existing power IoT. [Methods] A ciphertext policy attribute based encryption (CPABE) scheme for power IoT scenarios based on the SM9 algorithm was proposed. [Results] On one hand, the proposed scheme solves the key escrow problem easily caused by a single authorized authority by using the multi-authority management mechanism, and achieves the traceability of malicious users and the direct revocation mechanism of agent-based attributes by establishing a two-level key generation architecture. On the other hand, the scheme makes use of the technology of outsourcing encryption and decryption computation to reduce the resource consumption of power terminal equipment in terms of computation, storage, and communication. The security and performance analyses show that the proposed scheme satisfies IND-CPA security under the DBDH assumption, and the resource overhead of the terminals in the scheme is smaller and more fixed compared with that of existing schemes.
format Article
id doaj-art-82ef161cab2e4ac5ad1eb988960eb80e
institution Kabale University
issn 1007-9432
language English
publishDate 2025-05-01
publisher Editorial Office of Journal of Taiyuan University of Technology
record_format Article
series Taiyuan Ligong Daxue xuebao
spelling doaj-art-82ef161cab2e4ac5ad1eb988960eb80e2025-08-20T03:24:40ZengEditorial Office of Journal of Taiyuan University of TechnologyTaiyuan Ligong Daxue xuebao1007-94322025-05-0156345346410.16355/j.tyut.1007-9432.202308031007-9432(2025)03-0453-12SM9‑based CP‑ABE Access Control Scheme under Power IoTZHANG Yanjie0WANG Hui1LI Yan2ZHANG Xing3ZHANG Liang4YUAN Yanfang5SHI Zhentong6State Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology, Beijing Smart-Chip Microelectronics Technology Co., Ltd., Beijing, ChinaState Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology, Beijing Smart-Chip Microelectronics Technology Co., Ltd., Beijing, ChinaState Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology, Beijing Smart-Chip Microelectronics Technology Co., Ltd., Beijing, ChinaState Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology, Beijing Smart-Chip Microelectronics Technology Co., Ltd., Beijing, ChinaInformation and Communication Branch of State Grid Anhui Electric Power Co., Ltd., Hefei, Anhui, ChinaState Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology, Beijing Smart-Chip Microelectronics Technology Co., Ltd., Beijing, ChinaState Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology, Beijing Smart-Chip Microelectronics Technology Co., Ltd., Beijing, China[Purposes] This work has been carried out to achieve fine-grained access control based on the existing power IoT. [Methods] A ciphertext policy attribute based encryption (CPABE) scheme for power IoT scenarios based on the SM9 algorithm was proposed. [Results] On one hand, the proposed scheme solves the key escrow problem easily caused by a single authorized authority by using the multi-authority management mechanism, and achieves the traceability of malicious users and the direct revocation mechanism of agent-based attributes by establishing a two-level key generation architecture. On the other hand, the scheme makes use of the technology of outsourcing encryption and decryption computation to reduce the resource consumption of power terminal equipment in terms of computation, storage, and communication. The security and performance analyses show that the proposed scheme satisfies IND-CPA security under the DBDH assumption, and the resource overhead of the terminals in the scheme is smaller and more fixed compared with that of existing schemes.https://tyutjournal.tyut.edu.cn/englishpaper/show-2420.htmlpower iotsm9 algorithmcp-abemulti-authority mechanismoutsourcing computing
spellingShingle ZHANG Yanjie
WANG Hui
LI Yan
ZHANG Xing
ZHANG Liang
YUAN Yanfang
SHI Zhentong
SM9‑based CP‑ABE Access Control Scheme under Power IoT
Taiyuan Ligong Daxue xuebao
power iot
sm9 algorithm
cp-abe
multi-authority mechanism
outsourcing computing
title SM9‑based CP‑ABE Access Control Scheme under Power IoT
title_full SM9‑based CP‑ABE Access Control Scheme under Power IoT
title_fullStr SM9‑based CP‑ABE Access Control Scheme under Power IoT
title_full_unstemmed SM9‑based CP‑ABE Access Control Scheme under Power IoT
title_short SM9‑based CP‑ABE Access Control Scheme under Power IoT
title_sort sm9 based cp abe access control scheme under power iot
topic power iot
sm9 algorithm
cp-abe
multi-authority mechanism
outsourcing computing
url https://tyutjournal.tyut.edu.cn/englishpaper/show-2420.html
work_keys_str_mv AT zhangyanjie sm9basedcpabeaccesscontrolschemeunderpoweriot
AT wanghui sm9basedcpabeaccesscontrolschemeunderpoweriot
AT liyan sm9basedcpabeaccesscontrolschemeunderpoweriot
AT zhangxing sm9basedcpabeaccesscontrolschemeunderpoweriot
AT zhangliang sm9basedcpabeaccesscontrolschemeunderpoweriot
AT yuanyanfang sm9basedcpabeaccesscontrolschemeunderpoweriot
AT shizhentong sm9basedcpabeaccesscontrolschemeunderpoweriot