Privacy protection key distribution protocol for edge computing

Aiming at the privacy protection problem in the multi-application scenarios of edge computing, two policy-based key distribution protocols were proposed.The proposed protocols are based on the concept of constrained pseudo-random functions to achieve efficient and flexible policy selection.Specifica...

Full description

Saved in:
Bibliographic Details
Main Authors: Jian SHEN, Tianqi ZHOU, Chen WANG, Huijie YANG
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2021-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021010
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529933749288960
author Jian SHEN
Tianqi ZHOU
Chen WANG
Huijie YANG
author_facet Jian SHEN
Tianqi ZHOU
Chen WANG
Huijie YANG
author_sort Jian SHEN
collection DOAJ
description Aiming at the privacy protection problem in the multi-application scenarios of edge computing, two policy-based key distribution protocols were proposed.The proposed protocols are based on the concept of constrained pseudo-random functions to achieve efficient and flexible policy selection.Specifically, based on the GGM pseudo-random number generator, the key distribution protocol with a prefix-predicate is constructed, which can effectively support lightweight and efficient key distribution.Moreover, based on the multilinear pairing, the key distribution protocol with a bit fixing predicate is constructed.This protocol can support flexible and fine-grained strategy selection and is suitable for dynamic and flexible multi-device scenarios in heterogeneous networks.Finally, the security proof of the proposed protocols is presented.
format Article
id doaj-art-fd5ce5388d1d4e9381a67b475b3b8c2d
institution Kabale University
issn 2096-109X
language English
publishDate 2021-02-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-fd5ce5388d1d4e9381a67b475b3b8c2d2025-01-15T03:14:41ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2021-02-0179310059562814Privacy protection key distribution protocol for edge computingJian SHENTianqi ZHOUChen WANGHuijie YANGAiming at the privacy protection problem in the multi-application scenarios of edge computing, two policy-based key distribution protocols were proposed.The proposed protocols are based on the concept of constrained pseudo-random functions to achieve efficient and flexible policy selection.Specifically, based on the GGM pseudo-random number generator, the key distribution protocol with a prefix-predicate is constructed, which can effectively support lightweight and efficient key distribution.Moreover, based on the multilinear pairing, the key distribution protocol with a bit fixing predicate is constructed.This protocol can support flexible and fine-grained strategy selection and is suitable for dynamic and flexible multi-device scenarios in heterogeneous networks.Finally, the security proof of the proposed protocols is presented.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021010edge computingprivacy protectionconstrained pseudorandom functionkey distribution
spellingShingle Jian SHEN
Tianqi ZHOU
Chen WANG
Huijie YANG
Privacy protection key distribution protocol for edge computing
网络与信息安全学报
edge computing
privacy protection
constrained pseudorandom function
key distribution
title Privacy protection key distribution protocol for edge computing
title_full Privacy protection key distribution protocol for edge computing
title_fullStr Privacy protection key distribution protocol for edge computing
title_full_unstemmed Privacy protection key distribution protocol for edge computing
title_short Privacy protection key distribution protocol for edge computing
title_sort privacy protection key distribution protocol for edge computing
topic edge computing
privacy protection
constrained pseudorandom function
key distribution
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021010
work_keys_str_mv AT jianshen privacyprotectionkeydistributionprotocolforedgecomputing
AT tianqizhou privacyprotectionkeydistributionprotocolforedgecomputing
AT chenwang privacyprotectionkeydistributionprotocolforedgecomputing
AT huijieyang privacyprotectionkeydistributionprotocolforedgecomputing