Privacy protection key distribution protocol for edge computing
Aiming at the privacy protection problem in the multi-application scenarios of edge computing, two policy-based key distribution protocols were proposed.The proposed protocols are based on the concept of constrained pseudo-random functions to achieve efficient and flexible policy selection.Specifica...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2021-02-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021010 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841529933749288960 |
---|---|
author | Jian SHEN Tianqi ZHOU Chen WANG Huijie YANG |
author_facet | Jian SHEN Tianqi ZHOU Chen WANG Huijie YANG |
author_sort | Jian SHEN |
collection | DOAJ |
description | Aiming at the privacy protection problem in the multi-application scenarios of edge computing, two policy-based key distribution protocols were proposed.The proposed protocols are based on the concept of constrained pseudo-random functions to achieve efficient and flexible policy selection.Specifically, based on the GGM pseudo-random number generator, the key distribution protocol with a prefix-predicate is constructed, which can effectively support lightweight and efficient key distribution.Moreover, based on the multilinear pairing, the key distribution protocol with a bit fixing predicate is constructed.This protocol can support flexible and fine-grained strategy selection and is suitable for dynamic and flexible multi-device scenarios in heterogeneous networks.Finally, the security proof of the proposed protocols is presented. |
format | Article |
id | doaj-art-fd5ce5388d1d4e9381a67b475b3b8c2d |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2021-02-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-fd5ce5388d1d4e9381a67b475b3b8c2d2025-01-15T03:14:41ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2021-02-0179310059562814Privacy protection key distribution protocol for edge computingJian SHENTianqi ZHOUChen WANGHuijie YANGAiming at the privacy protection problem in the multi-application scenarios of edge computing, two policy-based key distribution protocols were proposed.The proposed protocols are based on the concept of constrained pseudo-random functions to achieve efficient and flexible policy selection.Specifically, based on the GGM pseudo-random number generator, the key distribution protocol with a prefix-predicate is constructed, which can effectively support lightweight and efficient key distribution.Moreover, based on the multilinear pairing, the key distribution protocol with a bit fixing predicate is constructed.This protocol can support flexible and fine-grained strategy selection and is suitable for dynamic and flexible multi-device scenarios in heterogeneous networks.Finally, the security proof of the proposed protocols is presented.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021010edge computingprivacy protectionconstrained pseudorandom functionkey distribution |
spellingShingle | Jian SHEN Tianqi ZHOU Chen WANG Huijie YANG Privacy protection key distribution protocol for edge computing 网络与信息安全学报 edge computing privacy protection constrained pseudorandom function key distribution |
title | Privacy protection key distribution protocol for edge computing |
title_full | Privacy protection key distribution protocol for edge computing |
title_fullStr | Privacy protection key distribution protocol for edge computing |
title_full_unstemmed | Privacy protection key distribution protocol for edge computing |
title_short | Privacy protection key distribution protocol for edge computing |
title_sort | privacy protection key distribution protocol for edge computing |
topic | edge computing privacy protection constrained pseudorandom function key distribution |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021010 |
work_keys_str_mv | AT jianshen privacyprotectionkeydistributionprotocolforedgecomputing AT tianqizhou privacyprotectionkeydistributionprotocolforedgecomputing AT chenwang privacyprotectionkeydistributionprotocolforedgecomputing AT huijieyang privacyprotectionkeydistributionprotocolforedgecomputing |