TY - JOUR
T1 - 边云协同场景中基于动态属性权限的群组密钥协商协议
AU - Zhang, Qi Kun
AU - Zhu, Liang
AU - Han, Gui Feng
AU - Liu, Meng Qi
AU - Jin, Bao Hua
AU - Li, Yuan Zhang
N1 - Publisher Copyright:
© 2024 Chinese Institute of Electronics. All rights reserved.
PY - 2024/6/25
Y1 - 2024/6/25
N2 - In the edge-cloud collaborative application scenario, there are many problems in the secure communication, information security exchange and secure resource sharing of multi domain terminals. In order to solve these problems, a group key agreement (GKA) protocol based on dynamic attribute permissions is proposed. In the protocol, a key verification algorithm is proposed to solve the security problems caused by key generation and key distribution in the traditional scheme. The hidden attribute authentication technology is adopted to realize terminal identity authentication. At the same time, hidden attribute authentication technology ensures that the terminal identity and attribute information are not disclosed. In the protocol, the combination of attribute-based encryption (ABE) and Newton interpolation polynomial is adopted, which can support secure fine-grained group key agreement. By adopting asymmetric computing, the computing tasks are transferred to the edge server for execution to reduce the computing load of the terminal. The tamper-proof characteristics of blockchain technology are applied to realize the integrity verification of terminal identity and communication information so that the data can be traced. In addition, the protocol supports dynamic updating of attribute permissions to ensure the freshness of groups. Compared with the applied literature, this protocol has good performance in computing time, computing energy consumption and communication energy consumption.
AB - In the edge-cloud collaborative application scenario, there are many problems in the secure communication, information security exchange and secure resource sharing of multi domain terminals. In order to solve these problems, a group key agreement (GKA) protocol based on dynamic attribute permissions is proposed. In the protocol, a key verification algorithm is proposed to solve the security problems caused by key generation and key distribution in the traditional scheme. The hidden attribute authentication technology is adopted to realize terminal identity authentication. At the same time, hidden attribute authentication technology ensures that the terminal identity and attribute information are not disclosed. In the protocol, the combination of attribute-based encryption (ABE) and Newton interpolation polynomial is adopted, which can support secure fine-grained group key agreement. By adopting asymmetric computing, the computing tasks are transferred to the edge server for execution to reduce the computing load of the terminal. The tamper-proof characteristics of blockchain technology are applied to realize the integrity verification of terminal identity and communication information so that the data can be traced. In addition, the protocol supports dynamic updating of attribute permissions to ensure the freshness of groups. Compared with the applied literature, this protocol has good performance in computing time, computing energy consumption and communication energy consumption.
KW - attribute-based encryption
KW - dynamic attribute permissions
KW - edge-cloud collaboration
KW - group key agreement
KW - hidden attribute authentication
KW - Newton interpolating polynomial
UR - http://www.scopus.com/inward/record.url?scp=85200414252&partnerID=8YFLogxK
U2 - 10.12263/DZXB.20220727
DO - 10.12263/DZXB.20220727
M3 - 文章
AN - SCOPUS:85200414252
SN - 0372-2112
VL - 52
SP - 1911
EP - 1924
JO - Tien Tzu Hsueh Pao/Acta Electronica Sinica
JF - Tien Tzu Hsueh Pao/Acta Electronica Sinica
IS - 6
ER -