SM9‑based CP‑ABE Access Control Scheme under Power IoT
[Purposes] This work has been carried out to achieve fine-grained access control based on the existing power IoT. [Methods] A ciphertext policy attribute based encryption (CPABE) scheme for power IoT scenarios based on the SM9 algorithm was proposed. [Results] On one hand, the proposed scheme solves...
Saved in:
| Main Authors: | , , , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Editorial Office of Journal of Taiyuan University of Technology
2025-05-01
|
| Series: | Taiyuan Ligong Daxue xuebao |
| Subjects: | |
| Online Access: | https://tyutjournal.tyut.edu.cn/englishpaper/show-2420.html |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849471913355640832 |
|---|---|
| author | ZHANG Yanjie WANG Hui LI Yan ZHANG Xing ZHANG Liang YUAN Yanfang SHI Zhentong |
| author_facet | ZHANG Yanjie WANG Hui LI Yan ZHANG Xing ZHANG Liang YUAN Yanfang SHI Zhentong |
| author_sort | ZHANG Yanjie |
| collection | DOAJ |
| description | [Purposes] This work has been carried out to achieve fine-grained access control based on the existing power IoT. [Methods] A ciphertext policy attribute based encryption (CPABE) scheme for power IoT scenarios based on the SM9 algorithm was proposed. [Results] On one hand, the proposed scheme solves the key escrow problem easily caused by a single authorized authority by using the multi-authority management mechanism, and achieves the traceability of malicious users and the direct revocation mechanism of agent-based attributes by establishing a two-level key generation architecture. On the other hand, the scheme makes use of the technology of outsourcing encryption and decryption computation to reduce the resource consumption of power terminal equipment in terms of computation, storage, and communication. The security and performance analyses show that the proposed scheme satisfies IND-CPA security under the DBDH assumption, and the resource overhead of the terminals in the scheme is smaller and more fixed compared with that of existing schemes. |
| format | Article |
| id | doaj-art-82ef161cab2e4ac5ad1eb988960eb80e |
| institution | Kabale University |
| issn | 1007-9432 |
| language | English |
| publishDate | 2025-05-01 |
| publisher | Editorial Office of Journal of Taiyuan University of Technology |
| record_format | Article |
| series | Taiyuan Ligong Daxue xuebao |
| spelling | doaj-art-82ef161cab2e4ac5ad1eb988960eb80e2025-08-20T03:24:40ZengEditorial Office of Journal of Taiyuan University of TechnologyTaiyuan Ligong Daxue xuebao1007-94322025-05-0156345346410.16355/j.tyut.1007-9432.202308031007-9432(2025)03-0453-12SM9‑based CP‑ABE Access Control Scheme under Power IoTZHANG Yanjie0WANG Hui1LI Yan2ZHANG Xing3ZHANG Liang4YUAN Yanfang5SHI Zhentong6State Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology, Beijing Smart-Chip Microelectronics Technology Co., Ltd., Beijing, ChinaState Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology, Beijing Smart-Chip Microelectronics Technology Co., Ltd., Beijing, ChinaState Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology, Beijing Smart-Chip Microelectronics Technology Co., Ltd., Beijing, ChinaState Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology, Beijing Smart-Chip Microelectronics Technology Co., Ltd., Beijing, ChinaInformation and Communication Branch of State Grid Anhui Electric Power Co., Ltd., Hefei, Anhui, ChinaState Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology, Beijing Smart-Chip Microelectronics Technology Co., Ltd., Beijing, ChinaState Grid Key Laboratory of Power Industrial Chip Design and Analysis Technology, Beijing Smart-Chip Microelectronics Technology Co., Ltd., Beijing, China[Purposes] This work has been carried out to achieve fine-grained access control based on the existing power IoT. [Methods] A ciphertext policy attribute based encryption (CPABE) scheme for power IoT scenarios based on the SM9 algorithm was proposed. [Results] On one hand, the proposed scheme solves the key escrow problem easily caused by a single authorized authority by using the multi-authority management mechanism, and achieves the traceability of malicious users and the direct revocation mechanism of agent-based attributes by establishing a two-level key generation architecture. On the other hand, the scheme makes use of the technology of outsourcing encryption and decryption computation to reduce the resource consumption of power terminal equipment in terms of computation, storage, and communication. The security and performance analyses show that the proposed scheme satisfies IND-CPA security under the DBDH assumption, and the resource overhead of the terminals in the scheme is smaller and more fixed compared with that of existing schemes.https://tyutjournal.tyut.edu.cn/englishpaper/show-2420.htmlpower iotsm9 algorithmcp-abemulti-authority mechanismoutsourcing computing |
| spellingShingle | ZHANG Yanjie WANG Hui LI Yan ZHANG Xing ZHANG Liang YUAN Yanfang SHI Zhentong SM9‑based CP‑ABE Access Control Scheme under Power IoT Taiyuan Ligong Daxue xuebao power iot sm9 algorithm cp-abe multi-authority mechanism outsourcing computing |
| title | SM9‑based CP‑ABE Access Control Scheme under Power IoT |
| title_full | SM9‑based CP‑ABE Access Control Scheme under Power IoT |
| title_fullStr | SM9‑based CP‑ABE Access Control Scheme under Power IoT |
| title_full_unstemmed | SM9‑based CP‑ABE Access Control Scheme under Power IoT |
| title_short | SM9‑based CP‑ABE Access Control Scheme under Power IoT |
| title_sort | sm9 based cp abe access control scheme under power iot |
| topic | power iot sm9 algorithm cp-abe multi-authority mechanism outsourcing computing |
| url | https://tyutjournal.tyut.edu.cn/englishpaper/show-2420.html |
| work_keys_str_mv | AT zhangyanjie sm9basedcpabeaccesscontrolschemeunderpoweriot AT wanghui sm9basedcpabeaccesscontrolschemeunderpoweriot AT liyan sm9basedcpabeaccesscontrolschemeunderpoweriot AT zhangxing sm9basedcpabeaccesscontrolschemeunderpoweriot AT zhangliang sm9basedcpabeaccesscontrolschemeunderpoweriot AT yuanyanfang sm9basedcpabeaccesscontrolschemeunderpoweriot AT shizhentong sm9basedcpabeaccesscontrolschemeunderpoweriot |