Efficient Hierarchical Identity-Based Encryption System for Internet of Things Infrastructure

Security is a main concern for the Internet of Things (IoT) infrastructure as large volumes of data are collected and processed in the systems. Due to the limited resources of interconnected sensors and devices in the IoT systems, efficiency is one of the key considerations when deploying security solutions (e.g., symmetric/asymmetric encryption, authentication, etc.) in IoT. In this paper, we present an efficient Hierarchical Identity-Based Encryption (HIBE) system with short parameters for protecting data confidentiality in distributed IoT infrastructure. Our proposed HIBE system has the public parameters, private key, and ciphertext, each consisting of a constant number of group elements. We prove the full security of the HIBE system in the standard model using the dual system encryption technique. We also implement the proposed scheme and compare the performance with the original Lewko–Waters HIBE. To the best of our knowledge, our construction is the first HIBE system that achieves both full security in the standard model and short parameters in terms of the public parameters, private key, and ciphertext.

[1]  Xiaoming Hu,et al.  Constant Size Ciphertext and Private Key HIBE without Random Oracles , 2014, J. Inf. Sci. Eng..

[2]  Laurence T. Yang,et al.  Cyberentity Security in the Internet of Things , 2013, Computer.

[3]  Tomás Cerný,et al.  Survey of Authentication and Authorization for the Internet of Things , 2018, Secur. Commun. Networks.

[4]  Elaine Shi,et al.  Delegating Capabilities in Predicate Encryption Systems , 2008, ICALP.

[5]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[6]  Laurence T. Yang,et al.  Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things , 2015, IEEE Transactions on Parallel and Distributed Systems.

[7]  Craig Gentry,et al.  Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.

[8]  Jun Wang,et al.  Efficient revocable hierarchical identity-based encryption using cryptographic accumulators , 2017, International Journal of Information Security.

[9]  Elijah Blessing Rajsingh,et al.  Analysis of hierarchical identity based encryption schemes and its applicability to computing environments , 2017, J. Inf. Secur. Appl..

[10]  Ben Lynn,et al.  Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.

[11]  Dong Hoon Lee,et al.  Anonymous HIBE with short ciphertexts: full security in prime order groups , 2013, Designs, Codes and Cryptography.

[12]  Weisong Shi,et al.  On security challenges and open issues in Internet of Things , 2018, Future Gener. Comput. Syst..

[13]  Keita Emura,et al.  Revocable hierarchical identity-based encryption , 2014, Theor. Comput. Sci..

[14]  Sanjit Chatterjee,et al.  Construction of a Hybrid HIBE Protocol Secure Against Adaptive Attacks , 2007, ProvSec.

[15]  Dan Boneh,et al.  Evaluating 2-DNF Formulas on Ciphertexts , 2005, TCC.

[16]  Yuan Li,et al.  An Efficient Adaptive-ID Secure Revocable Hierarchical Identity-Based Encryption Scheme , 2016, SmartCom.

[17]  Sanjit Chatterjee,et al.  HIBE With Short Public Parameters Without Random Oracle , 2006, ASIACRYPT.

[18]  Hoeteck Wee,et al.  Dual System Groups and its Applications - Compact HIBE and More , 2014, IACR Cryptol. ePrint Arch..

[19]  Kwangsu Lee,et al.  Revocable hierarchical identity-based encryption with shorter private keys and update keys , 2018, Designs, Codes and Cryptography.

[20]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[21]  Dong Hoon Lee,et al.  Revocable Hierarchical Identity-Based Encryption from Multilinear Maps , 2016, ArXiv.

[22]  Brent Waters,et al.  Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions , 2009, IACR Cryptol. ePrint Arch..

[23]  Yuan Zhang,et al.  SecHome: A Secure Large-Scale Smart Home System Using Hierarchical Identity Based Encryption , 2017, ICICS.

[24]  A. Lewko,et al.  Fully Secure HIBE with Short Ciphertexts , 2009 .

[25]  Angelo De Caro,et al.  Fully Secure Anonymous HIBE and Secret-Key Anonymous IBE with Short Ciphertexts , 2010, Pairing.

[26]  Dan Boneh,et al.  Secure Identity Based Encryption Without Random Oracles , 2004, CRYPTO.

[27]  Fei Wang,et al.  A hierarchical identity based key management scheme in tactical Mobile Ad Hoc Networks , 2009 .

[28]  Xiaofeng Wang,et al.  Unbounded and revocable hierarchical identity-based encryption with adaptive security, decryption key exposure resistant, and short public parameters , 2018, PloS one.

[29]  Craig Gentry,et al.  Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.

[30]  Yong Tang,et al.  Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security , 2016, 2016 IEEE 18th International Conference on High Performance Computing and Communications; IEEE 14th International Conference on Smart City; IEEE 2nd International Conference on Data Science and Systems (HPCC/SmartCity/DSS).

[31]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[32]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[33]  Yi Mu,et al.  Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys , 2016, Comput. J..

[34]  Dong Hoon Lee,et al.  Anonymous HIBE: Compact Construction Over Prime-Order Groups , 2013, IEEE Trans. Inf. Theory.